Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
0PQIHAmzn4.exe

Overview

General Information

Sample name:0PQIHAmzn4.exe
renamed because original name is a hash value
Original sample name:5A368A7453B7507D44D607E8E96B4382.exe
Analysis ID:1516700
MD5:5a368a7453b7507d44d607e8e96b4382
SHA1:58ca3039a3d9849b7c3b16c34fce69c8a9b36d65
SHA256:0226012d07469431fc88548fecdd4cc6e38bde912dfbdd0fd943402717b494cb
Tags:exeRedLineStealeruser-abuse_ch
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected RedLine Stealer
.NET source code contains very large array initializations
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops VBS files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Enables security privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Installs a raw input device (often for capturing keystrokes)
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 0PQIHAmzn4.exe (PID: 7252 cmdline: "C:\Users\user\Desktop\0PQIHAmzn4.exe" MD5: 5A368A7453B7507D44D607E8E96B4382)
    • name.exe (PID: 7344 cmdline: "C:\Users\user\Desktop\0PQIHAmzn4.exe" MD5: 5A368A7453B7507D44D607E8E96B4382)
      • RegSvcs.exe (PID: 7400 cmdline: "C:\Users\user\Desktop\0PQIHAmzn4.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
        • conhost.exe (PID: 7408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • wscript.exe (PID: 7740 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • name.exe (PID: 7816 cmdline: "C:\Users\user\AppData\Local\directory\name.exe" MD5: 5A368A7453B7507D44D607E8E96B4382)
      • RegSvcs.exe (PID: 7880 cmdline: "C:\Users\user\AppData\Local\directory\name.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
        • conhost.exe (PID: 7888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["204.10.160.224:27667"], "Bot Id": "button1"}
SourceRuleDescriptionAuthorStrings
Process Memory Space: RegSvcs.exe PID: 7400JoeSecurity_RedLineYara detected RedLine StealerJoe Security

    System Summary

    barindex
    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2592, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , ProcessId: 7740, ProcessName: wscript.exe
    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2592, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , ProcessId: 7740, ProcessName: wscript.exe

    Data Obfuscation

    barindex
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\directory\name.exe, ProcessId: 7344, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 3.2.RegSvcs.exe.7c0000.0.unpackMalware Configuration Extractor: RedLine {"C2 url": ["204.10.160.224:27667"], "Bot Id": "button1"}
    Source: C:\Users\user\AppData\Local\directory\name.exeReversingLabs: Detection: 68%
    Source: 0PQIHAmzn4.exeReversingLabs: Detection: 68%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.5% probability
    Source: C:\Users\user\AppData\Local\directory\name.exeJoe Sandbox ML: detected
    Source: 0PQIHAmzn4.exeJoe Sandbox ML: detected
    Source: 0PQIHAmzn4.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: Binary string: wntdll.pdbUGP source: name.exe, 00000002.00000003.1444421259.0000000004720000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000002.00000003.1447833005.0000000004610000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000008.00000003.1598165064.0000000004650000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000008.00000003.1598460905.00000000047F0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: wntdll.pdb source: name.exe, 00000002.00000003.1444421259.0000000004720000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000002.00000003.1447833005.0000000004610000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000008.00000003.1598165064.0000000004650000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000008.00000003.1598460905.00000000047F0000.00000004.00001000.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,2_2_00452492
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00442886
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,2_2_004788BD
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,2_2_004339B6
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,2_2_0045CAFA
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00431A86
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,2_2_0044BD27
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0045DE8F FindFirstFileW,FindClose,2_2_0045DE8F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_0044BF8B
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,8_2_00452492
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_00442886
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,8_2_004788BD
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,8_2_004339B6
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,8_2_0045CAFA
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_00431A86
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,8_2_0044BD27
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0045DE8F FindFirstFileW,FindClose,8_2_0045DE8F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_0044BF8B
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior

    Networking

    barindex
    Source: Malware configuration extractorURLs: 204.10.160.224:27667
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
    Source: RegSvcs.exe, 00000003.00000002.1464233094.000000000286B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1605066432.0000000002D0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $tq3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\tq equals www.youtube.com (Youtube)
    Source: RegSvcs.exe, 00000003.00000002.1464233094.000000000286B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1605066432.0000000002D0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
    Source: RegSvcs.exe, 00000009.00000002.1605066432.0000000002D0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb8 equals www.youtube.com (Youtube)
    Source: RegSvcs.exe, 00000003.00000002.1464233094.000000000286B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1605066432.0000000002D0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\tq equals www.youtube.com (Youtube)
    Source: RegSvcs.exe, 00000003.00000002.1464233094.000000000286B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1605066432.0000000002D0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: `,tq#www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
    Source: RegSvcs.exe, 00000003.00000002.1464233094.000000000282A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1605066432.0000000002CCA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.s
    Source: RegSvcs.exe, 00000009.00000002.1605066432.0000000002CCA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
    Source: RegSvcs.exe, 00000009.00000002.1605066432.0000000002D61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,2_2_0045A10F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,8_2_0045A10F
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
    Source: RegSvcs.exe, 00000003.00000002.1464233094.00000000029B7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_049d718f-d
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,2_2_0047C81C
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,8_2_0047C81C

    System Summary

    barindex
    Source: 2.2.name.exe.3ed0000.1.raw.unpack, Strings.csLarge array initialization: Strings: array initializer size 6160
    Source: 8.2.name.exe.3f30000.1.raw.unpack, Strings.csLarge array initialization: Strings: array initializer size 6160
    Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,2_2_004333BE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,8_2_004333BE
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_004096A00_2_004096A0
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0042200C0_2_0042200C
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0041A2170_2_0041A217
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_004122160_2_00412216
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0042435D0_2_0042435D
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_004033C00_2_004033C0
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0044F4300_2_0044F430
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_004125E80_2_004125E8
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0044663B0_2_0044663B
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_004138010_2_00413801
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0042096F0_2_0042096F
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_004129D00_2_004129D0
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_004119E30_2_004119E3
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0041C9AE0_2_0041C9AE
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0047EA6F0_2_0047EA6F
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0040FA100_2_0040FA10
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0044EB5F0_2_0044EB5F
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00423C810_2_00423C81
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00411E780_2_00411E78
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00442E0C0_2_00442E0C
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00420EC00_2_00420EC0
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0044CF170_2_0044CF17
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00444FD20_2_00444FD2
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_042626000_2_04262600
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_004096A02_2_004096A0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0042200C2_2_0042200C
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0041A2172_2_0041A217
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_004122162_2_00412216
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0042435D2_2_0042435D
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_004033C02_2_004033C0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0044F4302_2_0044F430
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_004125E82_2_004125E8
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0044663B2_2_0044663B
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_004138012_2_00413801
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0042096F2_2_0042096F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_004129D02_2_004129D0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_004119E32_2_004119E3
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0041C9AE2_2_0041C9AE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0047EA6F2_2_0047EA6F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0040FA102_2_0040FA10
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0044EB5F2_2_0044EB5F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00423C812_2_00423C81
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00411E782_2_00411E78
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00442E0C2_2_00442E0C
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00420EC02_2_00420EC0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0044CF172_2_0044CF17
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00444FD22_2_00444FD2
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_043B46002_2_043B4600
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_00EBA4373_2_00EBA437
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004096A08_2_004096A0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0042200C8_2_0042200C
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0041A2178_2_0041A217
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004122168_2_00412216
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0042435D8_2_0042435D
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004033C08_2_004033C0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0044F4308_2_0044F430
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004125E88_2_004125E8
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0044663B8_2_0044663B
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004138018_2_00413801
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0042096F8_2_0042096F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004129D08_2_004129D0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004119E38_2_004119E3
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0041C9AE8_2_0041C9AE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0047EA6F8_2_0047EA6F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0040FA108_2_0040FA10
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0044EB5F8_2_0044EB5F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00423C818_2_00423C81
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00411E788_2_00411E78
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00442E0C8_2_00442E0C
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00420EC08_2_00420EC0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0044CF178_2_0044CF17
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00444FD28_2_00444FD2
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0433A6E88_2_0433A6E8
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0132A4379_2_0132A437
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess token adjusted: SecurityJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 0040E710 appears 44 times
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 00401B10 appears 50 times
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 00408F40 appears 38 times
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 004301F8 appears 36 times
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 004115D7 appears 72 times
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 00416C70 appears 78 times
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 004181F2 appears 42 times
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 00445AE0 appears 130 times
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 0041341F appears 36 times
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 00422240 appears 38 times
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: String function: 004115D7 appears 36 times
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: String function: 00416C70 appears 39 times
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: String function: 00445AE0 appears 65 times
    Source: 0PQIHAmzn4.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: 2.2.name.exe.3ed0000.1.raw.unpack, PBE.csCryptographic APIs: 'TransformFinalBlock'
    Source: 2.2.name.exe.3ed0000.1.raw.unpack, Strings.csCryptographic APIs: 'CreateDecryptor'
    Source: 8.2.name.exe.3f30000.1.raw.unpack, PBE.csCryptographic APIs: 'TransformFinalBlock'
    Source: 8.2.name.exe.3f30000.1.raw.unpack, Strings.csCryptographic APIs: 'CreateDecryptor'
    Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@12/4@0/0
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,2_2_004333BE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,2_2_00464EAE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,8_2_004333BE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,8_2_00464EAE
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0046CB5F OleInitialize,CLSIDFromProgID,CLSIDFromString,CoCreateInstance,CoInitializeSecurity,_wcslen,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_0046CB5F
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeFile created: C:\Users\user\AppData\Local\directoryJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7888:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7408:120:WilError_03
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeFile created: C:\Users\user\AppData\Local\Temp\murkyJump to behavior
    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCommand line argument: ou0_2_0040D6B0
    Source: C:\Users\user\AppData\Local\directory\name.exeCommand line argument: ou2_2_0040D6B0
    Source: C:\Users\user\AppData\Local\directory\name.exeCommand line argument: ou8_2_0040D6B0
    Source: 0PQIHAmzn4.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 0PQIHAmzn4.exeReversingLabs: Detection: 68%
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeFile read: C:\Users\user\Desktop\0PQIHAmzn4.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\0PQIHAmzn4.exe "C:\Users\user\Desktop\0PQIHAmzn4.exe"
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\Desktop\0PQIHAmzn4.exe"
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\0PQIHAmzn4.exe"
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe"
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\directory\name.exe"
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\Desktop\0PQIHAmzn4.exe"Jump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\0PQIHAmzn4.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeSection loaded: msdart.dllJump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: msdart.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: msdart.dllJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: 0PQIHAmzn4.exeStatic file information: File size 1541907 > 1048576
    Source: Binary string: wntdll.pdbUGP source: name.exe, 00000002.00000003.1444421259.0000000004720000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000002.00000003.1447833005.0000000004610000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000008.00000003.1598165064.0000000004650000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000008.00000003.1598460905.00000000047F0000.00000004.00001000.00020000.00000000.sdmp
    Source: Binary string: wntdll.pdb source: name.exe, 00000002.00000003.1444421259.0000000004720000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000002.00000003.1447833005.0000000004610000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000008.00000003.1598165064.0000000004650000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000008.00000003.1598460905.00000000047F0000.00000004.00001000.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
    Source: 0PQIHAmzn4.exeStatic PE information: real checksum: 0xa961f should be: 0x17e9ab
    Source: name.exe.0.drStatic PE information: real checksum: 0xa961f should be: 0x17e9ab
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00416CB5 push ecx; ret 2_2_00416CC8
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00416CB5 push ecx; ret 8_2_00416CC8
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeFile created: C:\Users\user\AppData\Local\directory\name.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to dropped file
    Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,2_2_0047A330
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,2_2_00434418
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,8_2_0047A330
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,8_2_00434418
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\AppData\Local\directory\name.exeAPI/Special instruction interceptor: Address: 43B4224
    Source: C:\Users\user\AppData\Local\directory\name.exeAPI/Special instruction interceptor: Address: 433A30C
    Source: RegSvcs.exe, 00000003.00000002.1464233094.00000000028BE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1605066432.0000000002D61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE`,TQ
    Source: RegSvcs.exe, 00000003.00000002.1464233094.00000000028BE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1605066432.0000000002D61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE@\TQ
    Source: RegSvcs.exe, 00000003.00000002.1464233094.00000000028BE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1605066432.0000000002D61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-87555
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeAPI coverage: 3.8 %
    Source: C:\Users\user\AppData\Local\directory\name.exeAPI coverage: 4.0 %
    Source: C:\Users\user\AppData\Local\directory\name.exeAPI coverage: 3.9 %
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,2_2_00452492
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00442886
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,2_2_004788BD
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,2_2_004339B6
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,2_2_0045CAFA
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00431A86
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,2_2_0044BD27
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0045DE8F FindFirstFileW,FindClose,2_2_0045DE8F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_0044BF8B
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,8_2_00452492
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_00442886
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,8_2_004788BD
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,8_2_004339B6
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,8_2_0045CAFA
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_00431A86
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,8_2_0044BD27
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0045DE8F FindFirstFileW,FindClose,8_2_0045DE8F
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_0044BF8B
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
    Source: RegSvcs.exe, 00000003.00000002.1464233094.00000000028BE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1605066432.0000000002D61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe@\tq
    Source: RegSvcs.exe, 00000003.00000002.1464233094.00000000028BE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1605066432.0000000002D61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe`,tq
    Source: name.exe, 00000008.00000002.1600306043.0000000000C38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\
    Source: RegSvcs.exe, 00000003.00000002.1464233094.00000000028BE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1605066432.0000000002D61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe
    Source: wscript.exe, 00000007.00000002.1543154030.0000020556154000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
    Source: wscript.exe, 00000007.00000002.1543154030.0000020556154000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeAPI call chain: ExitProcess graph end nodegraph_0-86675
    Source: C:\Users\user\AppData\Local\directory\name.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\AppData\Local\directory\name.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_04262490 mov eax, dword ptr fs:[00000030h]0_2_04262490
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_042624F0 mov eax, dword ptr fs:[00000030h]0_2_042624F0
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_04260E70 mov eax, dword ptr fs:[00000030h]0_2_04260E70
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_043B4490 mov eax, dword ptr fs:[00000030h]2_2_043B4490
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_043B44F0 mov eax, dword ptr fs:[00000030h]2_2_043B44F0
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_043B2E70 mov eax, dword ptr fs:[00000030h]2_2_043B2E70
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0433A578 mov eax, dword ptr fs:[00000030h]8_2_0433A578
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0433A5D8 mov eax, dword ptr fs:[00000030h]8_2_0433A5D8
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_04338F58 mov eax, dword ptr fs:[00000030h]8_2_04338F58
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0041F250 SetUnhandledExceptionFilter,2_2_0041F250
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0041A208
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00417DAA
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0041F250 SetUnhandledExceptionFilter,8_2_0041F250
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_0041A208
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00417DAA
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 4F3008Jump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: A1F008Jump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\0PQIHAmzn4.exe"Jump to behavior
    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
    Source: name.exeBinary or memory string: Shell_TrayWnd
    Source: RegSvcs.exe, 00000003.00000002.1464233094.00000000029B7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
    Source: 0PQIHAmzn4.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
    Source: RegSvcs.exe, 00000003.00000002.1464233094.00000000029B7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1605066432.0000000002E63000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7400, type: MEMORYSTR
    Source: name.exeBinary or memory string: WIN_XP
    Source: 0PQIHAmzn4.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
    Source: name.exeBinary or memory string: WIN_XPe
    Source: name.exeBinary or memory string: WIN_VISTA
    Source: name.exeBinary or memory string: WIN_7
    Source: name.exeBinary or memory string: WIN_8

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7400, type: MEMORYSTR
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
    Source: C:\Users\user\Desktop\0PQIHAmzn4.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,2_2_004652BE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,2_2_00476619
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,2_2_0046CEF3
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,8_2_004652BE
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,8_2_00476619
    Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,8_2_0046CEF3
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information111
    Scripting
    2
    Valid Accounts
    2
    Native API
    111
    Scripting
    1
    Exploitation for Privilege Escalation
    11
    Disable or Modify Tools
    31
    Input Capture
    2
    System Time Discovery
    Remote Services11
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts2
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    11
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Account Discovery
    Remote Desktop Protocol31
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAt2
    Valid Accounts
    2
    Valid Accounts
    2
    Obfuscated Files or Information
    Security Account Manager3
    File and Directory Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    1
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCron2
    Registry Run Keys / Startup Folder
    21
    Access Token Manipulation
    1
    DLL Side-Loading
    NTDS116
    System Information Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
    Process Injection
    1
    Masquerading
    LSA Secrets321
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
    Registry Run Keys / Startup Folder
    2
    Valid Accounts
    Cached Domain Credentials11
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
    Virtualization/Sandbox Evasion
    DCSync2
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
    Access Token Manipulation
    Proc Filesystem1
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
    Process Injection
    /etc/passwd and /etc/shadow1
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1516700 Sample: 0PQIHAmzn4.exe Startdate: 24/09/2024 Architecture: WINDOWS Score: 100 33 Found malware configuration 2->33 35 Multi AV Scanner detection for submitted file 2->35 37 Yara detected RedLine Stealer 2->37 39 6 other signatures 2->39 8 0PQIHAmzn4.exe 3 2->8         started        11 wscript.exe 1 2->11         started        process3 file4 29 C:\Users\user\AppData\Local\...\name.exe, PE32 8->29 dropped 14 name.exe 1 8->14         started        43 Windows Scripting host queries suspicious COM object (likely to drop second stage) 11->43 18 name.exe 11->18         started        signatures5 process6 file7 31 C:\Users\user\AppData\Roaming\...\name.vbs, data 14->31 dropped 45 Multi AV Scanner detection for dropped file 14->45 47 Machine Learning detection for dropped file 14->47 49 Drops VBS files to the startup folder 14->49 51 Switches to a custom stack to bypass stack traces 14->51 20 RegSvcs.exe 4 14->20         started        53 Writes to foreign memory regions 18->53 55 Maps a DLL or memory area into another process 18->55 23 RegSvcs.exe 3 18->23         started        signatures8 process9 signatures10 41 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 20->41 25 conhost.exe 20->25         started        27 conhost.exe 23->27         started        process11

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    0PQIHAmzn4.exe68%ReversingLabsWin32.Trojan.Autoitinject
    0PQIHAmzn4.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\directory\name.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\directory\name.exe68%ReversingLabsWin32.Trojan.Autoitinject
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://api.ip.sb/ip0%URL Reputationsafe
    https://discord.com/api/v9/users/0%Avira URL Cloudsafe
    https://api.ip.s0%Avira URL Cloudsafe
    204.10.160.224:276670%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    204.10.160.224:27667true
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://api.ip.sb/ipRegSvcs.exe, 00000009.00000002.1605066432.0000000002CCA000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://api.ip.sRegSvcs.exe, 00000003.00000002.1464233094.000000000282A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.1605066432.0000000002CCA000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://discord.com/api/v9/users/RegSvcs.exe, 00000009.00000002.1605066432.0000000002D61000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1516700
    Start date and time:2024-09-24 14:39:49 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 8m 55s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:14
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:0PQIHAmzn4.exe
    renamed because original name is a hash value
    Original Sample Name:5A368A7453B7507D44D607E8E96B4382.exe
    Detection:MAL
    Classification:mal100.troj.expl.evad.winEXE@12/4@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 61
    • Number of non-executed functions: 298
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report creation exceeded maximum time and may have missing disassembly code information.
    • Report size exceeded maximum capacity and may have missing behavior information.
    • Report size exceeded maximum capacity and may have missing disassembly code.
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: 0PQIHAmzn4.exe
    TimeTypeDescription
    14:41:00AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):1119
    Entropy (8bit):5.345080863654519
    Encrypted:false
    SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0Hj
    MD5:88593431AEF401417595E7A00FE86E5F
    SHA1:1714B8F6F6DCAAB3F3853EDABA7687F16DD331F4
    SHA-256:ED5E60336FB00579E0867B9615CBD0C560BB667FE3CEE0674F690766579F1032
    SHA-512:1D442441F96E69D8A6D5FB7E8CF01F13AF88CA2C2D0960120151B15505DD1CADC607EF9983373BA8E422C65FADAB04A615968F335A875B5C075BB9A6D0F346C9
    Malicious:false
    Reputation:moderate, very likely benign file
    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
    Process:C:\Users\user\Desktop\0PQIHAmzn4.exe
    File Type:data
    Category:dropped
    Size (bytes):550912
    Entropy (8bit):6.865747949194651
    Encrypted:false
    SSDEEP:12288:nAss2E2h+nP/M1PHU8buRoRVQArY+jRwhF:ATl24k1/U8bu+MoYORw/
    MD5:96D66CD150BAD55D3C072A66DFB97589
    SHA1:9F7F079011BE28DDE57E639C54AE181572B92B1A
    SHA-256:086A9A480CEC1F434A1F1A57824D73FA0E6886BDF40FC44ABA445B966BDFFC69
    SHA-512:058FACC5BB941CF3F01C01CE2C2967B7F1EC4D7684523336EEB3EAD53D444C923DF5677F08BB77C0EF494026F68A5AFA483984616BC955D3CCCA10FDC563CF35
    Malicious:false
    Reputation:low
    Preview:.o.AD6WX=58V..VB.G5EAG6W.958VOTVBWG5EAG6WX958VOTVBWG5EAG6WX9.8VOZI.YG.L.f.V...l>&'v2%(R7 *.49W[W"o63b%2[e()...j.U9+1xOZM.EAG6WX9e}VO.WAW..+.G6WX958V.TXC\F.EA.4WX.08VOTV..E5EaG6W.;58V.TVbWG5GAG2WX958VOPVBWG5EAG._X978VOTVBTGu.AG&WX)58VODVBGG5EAG6GX958VOTVBWGA.CGaWX95.TO6.GWG5EAG6WX958VOTVBW.=EMG6WX958VOTVBWG5EAG6WX958VOTVBWG5EAG6WX958VOTVBWG5EAG.WX158VOTVBWG5EIg6W.958VOTVBWG5k5"N#X95..MTVbWG5.CG6UX958VOTVBWG5EAg6W8.GK$,TVB5.0EA.4WX.08V.VVBWG5EAG6WX95xVO.x02+Z&AG:WX95.^OTTBWGSMAG6WX958VOTVB.G5.AG6WX958VOTVBWG5..E6WX95pVOTTBRG..@G.~Y9<8VO.UBQK.DA.(WXi.8V.TVBWG5EAG6WX958VOTVBWG5EAG6WX958VOTVBWG5EAG6WX958VOTVBWG5EAG6WX958VOTVBWG5EAG6WX958VOTVBWG5EAG6WX958VOTVBWG5EAG6WX958VOTVBWG5EAG6WX958VOTVBWG5EAG6WX958VOTVBWG5EAG6..G.8m.T...v...f~.>{.......YP.....S.)/P.nJ.._h...z..^...-$B.....g.=jK/.Nq..}...|...&.`..U..w..a1[...C..M.s.....k..m}..4........Z ..V.p...y7U.y.S.p......$...T..T*L..kl....{.#f........q...>#..?...,..)........@...'..m.D.rN,Ng....%..I.:]B..$.....).Il...QmH..M.;..>..d$...sT.&
    Process:C:\Users\user\Desktop\0PQIHAmzn4.exe
    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):1541907
    Entropy (8bit):7.622094939850083
    Encrypted:false
    SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCjIAH2fO9TnVfzAlV119we25peho8gRGkd:7JZoQrbTFZY1iaCMTO9TlzAlDLwx5peo
    MD5:5A368A7453B7507D44D607E8E96B4382
    SHA1:58CA3039A3D9849B7C3B16C34FCE69C8A9B36D65
    SHA-256:0226012D07469431FC88548FECDD4CC6E38BDE912DFBDD0FD943402717B494CB
    SHA-512:5E3EE520284ED564E7298BA52DBBF6383F51FF301BE5E981F5D233972FC96C966A45D6E88BBCF4B32D1DD94F08BF0E8F2ACE8D606CD1988127EFF68F21FC0B77
    Malicious:true
    Antivirus:
    • Antivirus: Joe Sandbox ML, Detection: 100%
    • Antivirus: ReversingLabs, Detection: 68%
    Reputation:low
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......................1b.....P.)....Q.....y.....i.......}...N......d.....`.....m.....g....Rich............PE..L....%O..........#..................e....... ....@..........................P................@.......@.........................T.......(............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.data...X........h..................@....rsrc...(............T..............@..@........................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Users\user\AppData\Local\directory\name.exe
    File Type:data
    Category:dropped
    Size (bytes):268
    Entropy (8bit):3.4102991750143654
    Encrypted:false
    SSDEEP:6:DMM8lfm3OOQdUfclmVzUEZ+lX1Al1AE6nriIM8lfQVn:DsO+vNlGQ1A1z4mA2n
    MD5:9F688C6FC524E0C17750F87F1DCF7495
    SHA1:969EE4665133CBF08F925C341520550D399B74B9
    SHA-256:E62968165163820785045CA39FF39BB8D0E2359D8216D924686C01E68BD8EE66
    SHA-512:D3E99D291F27BC2030D50D75776FC64E4EF7E08D0BAA4587B21881EE960C5DF7A10244ED0DCFE85583CF82516B72725A5AB44D83639695A424E151D270C681A5
    Malicious:true
    Reputation:low
    Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.t.o.t.t.i.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.d.i.r.e.c.t.o.r.y.\.n.a.m.e...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):7.622094939850083
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:0PQIHAmzn4.exe
    File size:1'541'907 bytes
    MD5:5a368a7453b7507d44d607e8e96b4382
    SHA1:58ca3039a3d9849b7c3b16c34fce69c8a9b36d65
    SHA256:0226012d07469431fc88548fecdd4cc6e38bde912dfbdd0fd943402717b494cb
    SHA512:5e3ee520284ed564e7298ba52dbbf6383f51ff301be5e981f5d233972fc96c966a45d6e88bbcf4b32d1dd94f08bf0e8f2ace8d606cd1988127eff68f21fc0b77
    SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCjIAH2fO9TnVfzAlV119we25peho8gRGkd:7JZoQrbTFZY1iaCMTO9TlzAlDLwx5peo
    TLSH:5765F122B5C68076C1B333B19E7EF7AA963D79360326D2D727C82D315E605816B29733
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
    Icon Hash:1733312925935517
    Entrypoint:0x4165c1
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    DLL Characteristics:TERMINAL_SERVER_AWARE
    Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
    Instruction
    call 00007F32CD409CCBh
    jmp 00007F32CD400B3Eh
    int3
    int3
    int3
    int3
    int3
    push ebp
    mov ebp, esp
    push edi
    push esi
    mov esi, dword ptr [ebp+0Ch]
    mov ecx, dword ptr [ebp+10h]
    mov edi, dword ptr [ebp+08h]
    mov eax, ecx
    mov edx, ecx
    add eax, esi
    cmp edi, esi
    jbe 00007F32CD400CBAh
    cmp edi, eax
    jc 00007F32CD400E56h
    cmp ecx, 00000080h
    jc 00007F32CD400CCEh
    cmp dword ptr [004A9724h], 00000000h
    je 00007F32CD400CC5h
    push edi
    push esi
    and edi, 0Fh
    and esi, 0Fh
    cmp edi, esi
    pop esi
    pop edi
    jne 00007F32CD400CB7h
    jmp 00007F32CD401092h
    test edi, 00000003h
    jne 00007F32CD400CC6h
    shr ecx, 02h
    and edx, 03h
    cmp ecx, 08h
    jc 00007F32CD400CDBh
    rep movsd
    jmp dword ptr [00416740h+edx*4]
    mov eax, edi
    mov edx, 00000003h
    sub ecx, 04h
    jc 00007F32CD400CBEh
    and eax, 03h
    add ecx, eax
    jmp dword ptr [00416654h+eax*4]
    jmp dword ptr [00416750h+ecx*4]
    nop
    jmp dword ptr [004166D4h+ecx*4]
    nop
    inc cx
    add byte ptr [eax-4BFFBE9Ah], dl
    inc cx
    add byte ptr [ebx], ah
    ror dword ptr [edx-75F877FAh], 1
    inc esi
    add dword ptr [eax+468A0147h], ecx
    add al, cl
    jmp 00007F32CF8794B7h
    add esi, 03h
    add edi, 03h
    cmp ecx, 08h
    jc 00007F32CD400C7Eh
    rep movsd
    jmp dword ptr [00000000h+edx*4]
    Programming Language:
    • [ C ] VS2010 SP1 build 40219
    • [C++] VS2010 SP1 build 40219
    • [ C ] VS2008 SP1 build 30729
    • [IMP] VS2008 SP1 build 30729
    • [ASM] VS2010 SP1 build 40219
    • [RES] VS2010 SP1 build 40219
    • [LNK] VS2010 SP1 build 40219
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
    RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
    RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
    RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
    RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
    RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
    RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
    RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
    RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
    RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
    RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
    RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
    RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
    RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
    RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
    RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
    RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
    RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
    RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
    RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
    RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
    RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
    RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
    RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
    RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
    RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
    RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
    DLLImport
    WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
    VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
    COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
    MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
    WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
    PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
    USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
    KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
    USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
    GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
    COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
    ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
    SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
    ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
    OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
    Language of compilation systemCountry where language is spokenMap
    EnglishGreat Britain
    EnglishUnited States
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:08:40:51
    Start date:24/09/2024
    Path:C:\Users\user\Desktop\0PQIHAmzn4.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\0PQIHAmzn4.exe"
    Imagebase:0x400000
    File size:1'541'907 bytes
    MD5 hash:5A368A7453B7507D44D607E8E96B4382
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:2
    Start time:08:40:55
    Start date:24/09/2024
    Path:C:\Users\user\AppData\Local\directory\name.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\0PQIHAmzn4.exe"
    Imagebase:0x400000
    File size:1'541'907 bytes
    MD5 hash:5A368A7453B7507D44D607E8E96B4382
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Antivirus matches:
    • Detection: 100%, Joe Sandbox ML
    • Detection: 68%, ReversingLabs
    Reputation:low
    Has exited:true

    Target ID:3
    Start time:08:40:59
    Start date:24/09/2024
    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\0PQIHAmzn4.exe"
    Imagebase:0x3f0000
    File size:45'984 bytes
    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:4
    Start time:08:41:00
    Start date:24/09/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff68cce0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:7
    Start time:08:41:08
    Start date:24/09/2024
    Path:C:\Windows\System32\wscript.exe
    Wow64 process (32bit):false
    Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
    Imagebase:0x7ff6d07d0000
    File size:170'496 bytes
    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:8
    Start time:08:41:09
    Start date:24/09/2024
    Path:C:\Users\user\AppData\Local\directory\name.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\AppData\Local\directory\name.exe"
    Imagebase:0x400000
    File size:1'541'907 bytes
    MD5 hash:5A368A7453B7507D44D607E8E96B4382
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:9
    Start time:08:41:14
    Start date:24/09/2024
    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\AppData\Local\directory\name.exe"
    Imagebase:0x9b0000
    File size:45'984 bytes
    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:10
    Start time:08:41:14
    Start date:24/09/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff68cce0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:false
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:3.3%
      Dynamic/Decrypted Code Coverage:0.4%
      Signature Coverage:7.9%
      Total number of Nodes:2000
      Total number of Limit Nodes:57
      execution_graph 86099 4010e0 86102 401100 86099->86102 86101 4010f8 86103 401113 86102->86103 86104 401184 86103->86104 86105 40114c 86103->86105 86107 401120 86103->86107 86134 401182 86103->86134 86140 401250 86104->86140 86108 401151 86105->86108 86109 40119d 86105->86109 86106 40112c DefWindowProcW 86106->86101 86107->86106 86161 401000 Shell_NotifyIconW __gmtime64_s 86107->86161 86111 401219 86108->86111 86112 40115d 86108->86112 86114 4011a3 86109->86114 86115 42afb4 86109->86115 86111->86107 86118 401225 86111->86118 86116 401163 86112->86116 86117 42b01d 86112->86117 86113 401193 86113->86101 86114->86107 86124 4011b6 KillTimer 86114->86124 86125 4011db SetTimer RegisterWindowMessageW 86114->86125 86156 40f190 10 API calls 86115->86156 86121 42afe9 86116->86121 86122 40116c 86116->86122 86117->86106 86160 4370f4 52 API calls 86117->86160 86163 468b0e 74 API calls __gmtime64_s 86118->86163 86158 40f190 10 API calls 86121->86158 86122->86107 86129 401174 86122->86129 86123 42b04f 86162 40e0c0 74 API calls __gmtime64_s 86123->86162 86155 401000 Shell_NotifyIconW __gmtime64_s 86124->86155 86125->86113 86127 401204 CreatePopupMenu 86125->86127 86127->86101 86157 45fd57 65 API calls __gmtime64_s 86129->86157 86133 4011c9 PostQuitMessage 86133->86101 86134->86106 86135 42afe4 86135->86113 86136 42b00e 86159 401a50 335 API calls 86136->86159 86139 42afdc 86139->86106 86139->86135 86141 401262 __gmtime64_s 86140->86141 86142 4012e8 86140->86142 86164 401b80 86141->86164 86142->86113 86144 40128c 86145 4012d1 KillTimer SetTimer 86144->86145 86146 4012bb 86144->86146 86147 4272ec 86144->86147 86145->86142 86148 4012c5 86146->86148 86149 42733f 86146->86149 86150 4272f4 Shell_NotifyIconW 86147->86150 86151 42731a Shell_NotifyIconW 86147->86151 86148->86145 86152 427393 Shell_NotifyIconW 86148->86152 86153 427348 Shell_NotifyIconW 86149->86153 86154 42736e Shell_NotifyIconW 86149->86154 86150->86145 86151->86145 86152->86145 86153->86145 86154->86145 86155->86133 86156->86113 86157->86139 86158->86136 86159->86134 86160->86134 86161->86123 86162->86134 86163->86135 86165 401b9c 86164->86165 86166 401c7e 86164->86166 86186 4013c0 52 API calls 86165->86186 86166->86144 86168 401bac 86169 42722b LoadStringW 86168->86169 86170 401bb9 86168->86170 86172 427246 86169->86172 86187 402160 86170->86187 86201 40e0a0 52 API calls 86172->86201 86173 401bcd 86175 427258 86173->86175 86176 401bda 86173->86176 86202 40d200 52 API calls 2 library calls 86175->86202 86176->86172 86177 401be4 86176->86177 86200 40d200 52 API calls 2 library calls 86177->86200 86180 427267 86181 42727b 86180->86181 86183 401bf3 __gmtime64_s _wcscpy _wcsncpy 86180->86183 86203 40d200 52 API calls 2 library calls 86181->86203 86184 401c62 Shell_NotifyIconW 86183->86184 86184->86166 86185 427289 86186->86168 86188 426daa 86187->86188 86189 40216b _wcslen 86187->86189 86217 40c600 86188->86217 86192 402180 86189->86192 86193 40219e 86189->86193 86191 426db5 86191->86173 86204 403bd0 52 API calls moneypunct 86192->86204 86205 4013a0 52 API calls 86193->86205 86196 4021a5 86198 426db7 86196->86198 86206 4115d7 86196->86206 86197 402187 _memmove 86197->86173 86200->86183 86201->86183 86202->86180 86203->86185 86204->86197 86205->86196 86208 4115e1 _malloc 86206->86208 86209 4115fb 86208->86209 86212 4115fd std::exception::exception 86208->86212 86222 4135bb 86208->86222 86209->86197 86210 41163b 86237 4180af 46 API calls std::exception::operator= 86210->86237 86212->86210 86236 41130a 51 API calls __cinit 86212->86236 86213 411645 86238 418105 RaiseException 86213->86238 86216 411656 86218 40c619 86217->86218 86219 40c60a 86217->86219 86218->86191 86219->86218 86245 4026f0 86219->86245 86221 426d7a _memmove 86221->86191 86223 413638 _malloc 86222->86223 86231 4135c9 _malloc 86222->86231 86244 417f77 46 API calls __getptd_noexit 86223->86244 86224 4135d4 86224->86231 86239 418901 46 API calls __NMSG_WRITE 86224->86239 86240 418752 46 API calls 7 library calls 86224->86240 86241 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86224->86241 86227 4135f7 RtlAllocateHeap 86228 413630 86227->86228 86227->86231 86228->86208 86230 413624 86242 417f77 46 API calls __getptd_noexit 86230->86242 86231->86224 86231->86227 86231->86230 86234 413622 86231->86234 86243 417f77 46 API calls __getptd_noexit 86234->86243 86236->86210 86237->86213 86238->86216 86239->86224 86240->86224 86242->86234 86243->86228 86244->86228 86246 426873 86245->86246 86247 4026ff 86245->86247 86252 4013a0 52 API calls 86246->86252 86247->86221 86249 42687b 86250 4115d7 52 API calls 86249->86250 86251 42689e _memmove 86250->86251 86251->86221 86252->86249 86253 40bd20 86254 428194 86253->86254 86255 40bd2d 86253->86255 86257 40bd43 86254->86257 86259 4281bc 86254->86259 86261 4281b2 86254->86261 86256 40bd37 86255->86256 86276 4531b1 85 API calls 5 library calls 86255->86276 86265 40bd50 86256->86265 86275 45e987 86 API calls moneypunct 86259->86275 86274 40b510 VariantClear 86261->86274 86264 4281ba 86266 426cf1 86265->86266 86267 40bd63 86265->86267 86286 44cde9 52 API calls _memmove 86266->86286 86277 40bd80 86267->86277 86270 40bd73 86270->86257 86271 426cfc 86287 40e0a0 52 API calls 86271->86287 86273 426d02 86274->86264 86275->86255 86276->86256 86278 40bd8e 86277->86278 86282 40bdb7 _memmove 86277->86282 86279 40bded 86278->86279 86280 40bdad 86278->86280 86278->86282 86283 4115d7 52 API calls 86279->86283 86288 402f00 86280->86288 86282->86270 86284 40bdf6 86283->86284 86284->86282 86285 4115d7 52 API calls 86284->86285 86285->86282 86286->86271 86287->86273 86289 402f10 86288->86289 86290 402f0c 86288->86290 86291 4115d7 52 API calls 86289->86291 86292 4268c3 86289->86292 86290->86282 86293 402f51 moneypunct _memmove 86291->86293 86293->86282 86294 425ba2 86299 40e360 86294->86299 86296 425bb4 86315 41130a 51 API calls __cinit 86296->86315 86298 425bbe 86300 4115d7 52 API calls 86299->86300 86301 40e3ec GetModuleFileNameW 86300->86301 86316 413a0e 86301->86316 86303 40e421 _wcsncat 86319 413a9e 86303->86319 86306 4115d7 52 API calls 86307 40e45e _wcscpy 86306->86307 86322 40bc70 86307->86322 86311 40e4a9 86311->86296 86312 401c90 52 API calls 86313 40e4a1 _wcscat _wcslen _wcsncpy 86312->86313 86313->86311 86313->86312 86314 4115d7 52 API calls 86313->86314 86314->86313 86315->86298 86341 413801 86316->86341 86371 419efd 86319->86371 86323 4115d7 52 API calls 86322->86323 86324 40bc98 86323->86324 86325 4115d7 52 API calls 86324->86325 86326 40bca6 86325->86326 86327 40e4c0 86326->86327 86383 403350 86327->86383 86329 40e4cb RegOpenKeyExW 86330 427190 RegQueryValueExW 86329->86330 86331 40e4eb 86329->86331 86332 4271b0 86330->86332 86333 42721a RegCloseKey 86330->86333 86331->86313 86334 4115d7 52 API calls 86332->86334 86333->86313 86335 4271cb 86334->86335 86390 43652f 52 API calls 86335->86390 86337 4271d8 RegQueryValueExW 86338 42720e 86337->86338 86339 4271f7 86337->86339 86338->86333 86340 402160 52 API calls 86339->86340 86340->86338 86342 41389e 86341->86342 86343 41381a 86341->86343 86344 4139e8 86342->86344 86346 413a00 86342->86346 86343->86342 86355 41388a 86343->86355 86363 419e30 46 API calls __wmakepath_s 86343->86363 86368 417f77 46 API calls __getptd_noexit 86344->86368 86370 417f77 46 API calls __getptd_noexit 86346->86370 86347 4139ed 86369 417f25 10 API calls __wmakepath_s 86347->86369 86350 413967 86350->86303 86352 41396c 86352->86342 86352->86350 86356 41397a 86352->86356 86353 413929 86353->86342 86354 413945 86353->86354 86365 419e30 46 API calls __wmakepath_s 86353->86365 86354->86342 86354->86350 86359 41395b 86354->86359 86355->86342 86362 413909 86355->86362 86364 419e30 46 API calls __wmakepath_s 86355->86364 86367 419e30 46 API calls __wmakepath_s 86356->86367 86366 419e30 46 API calls __wmakepath_s 86359->86366 86362->86352 86362->86353 86363->86355 86364->86362 86365->86354 86366->86350 86367->86350 86368->86347 86369->86350 86370->86350 86372 419f13 86371->86372 86373 419f0e 86371->86373 86380 417f77 46 API calls __getptd_noexit 86372->86380 86373->86372 86374 419f2b 86373->86374 86378 40e454 86374->86378 86382 417f77 46 API calls __getptd_noexit 86374->86382 86376 419f18 86381 417f25 10 API calls __wmakepath_s 86376->86381 86378->86306 86380->86376 86381->86378 86382->86376 86384 403367 86383->86384 86385 403358 86383->86385 86386 4115d7 52 API calls 86384->86386 86385->86329 86387 403370 86386->86387 86388 4115d7 52 API calls 86387->86388 86389 40339e 86388->86389 86389->86329 86390->86337 86391 437081 VariantClear 86392 416454 86429 416c70 86392->86429 86394 416460 GetStartupInfoW 86395 416474 86394->86395 86430 419d5a HeapCreate 86395->86430 86397 4164cd 86398 4164d8 86397->86398 86513 41642b 46 API calls 3 library calls 86397->86513 86431 417c20 GetModuleHandleW 86398->86431 86401 4164de 86402 4164e9 __RTC_Initialize 86401->86402 86514 41642b 46 API calls 3 library calls 86401->86514 86450 41aaa1 GetStartupInfoW 86402->86450 86406 416503 GetCommandLineW 86463 41f584 GetEnvironmentStringsW 86406->86463 86410 416513 86469 41f4d6 GetModuleFileNameW 86410->86469 86412 41651d 86413 416528 86412->86413 86516 411924 46 API calls 3 library calls 86412->86516 86473 41f2a4 86413->86473 86416 41652e 86417 416539 86416->86417 86517 411924 46 API calls 3 library calls 86416->86517 86487 411703 86417->86487 86420 416541 86422 41654c __wwincmdln 86420->86422 86518 411924 46 API calls 3 library calls 86420->86518 86491 40d6b0 86422->86491 86425 41657c 86520 411906 46 API calls _doexit 86425->86520 86428 416581 __close 86429->86394 86430->86397 86432 417c34 86431->86432 86433 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86431->86433 86521 4178ff 49 API calls _free 86432->86521 86435 417c87 TlsAlloc 86433->86435 86438 417cd5 TlsSetValue 86435->86438 86439 417d96 86435->86439 86436 417c39 86436->86401 86438->86439 86440 417ce6 __init_pointers 86438->86440 86439->86401 86522 418151 InitializeCriticalSectionAndSpinCount 86440->86522 86442 417d91 86530 4178ff 49 API calls _free 86442->86530 86444 417d2a 86444->86442 86523 416b49 86444->86523 86447 417d76 86529 41793c 46 API calls 4 library calls 86447->86529 86449 417d7e GetCurrentThreadId 86449->86439 86451 416b49 __calloc_crt 46 API calls 86450->86451 86460 41aabf 86451->86460 86452 41ac6a GetStdHandle 86457 41ac34 86452->86457 86453 416b49 __calloc_crt 46 API calls 86453->86460 86454 41acce SetHandleCount 86462 4164f7 86454->86462 86455 41abb4 86455->86457 86458 41abe0 GetFileType 86455->86458 86459 41abeb InitializeCriticalSectionAndSpinCount 86455->86459 86456 41ac7c GetFileType 86456->86457 86457->86452 86457->86454 86457->86456 86461 41aca2 InitializeCriticalSectionAndSpinCount 86457->86461 86458->86455 86458->86459 86459->86455 86459->86462 86460->86453 86460->86455 86460->86457 86460->86462 86461->86457 86461->86462 86462->86406 86515 411924 46 API calls 3 library calls 86462->86515 86464 41f595 86463->86464 86465 41f599 86463->86465 86464->86410 86540 416b04 86465->86540 86467 41f5bb _memmove 86468 41f5c2 FreeEnvironmentStringsW 86467->86468 86468->86410 86471 41f50b _wparse_cmdline 86469->86471 86470 41f54e _wparse_cmdline 86470->86412 86471->86470 86472 416b04 __malloc_crt 46 API calls 86471->86472 86472->86470 86474 41f2bc _wcslen 86473->86474 86478 41f2b4 86473->86478 86475 416b49 __calloc_crt 46 API calls 86474->86475 86480 41f2e0 _wcslen 86475->86480 86476 41f336 86547 413748 86476->86547 86478->86416 86479 416b49 __calloc_crt 46 API calls 86479->86480 86480->86476 86480->86478 86480->86479 86481 41f35c 86480->86481 86484 41f373 86480->86484 86546 41ef12 46 API calls __wmakepath_s 86480->86546 86483 413748 _free 46 API calls 86481->86483 86483->86478 86553 417ed3 86484->86553 86486 41f37f 86486->86416 86488 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 86487->86488 86490 411750 __IsNonwritableInCurrentImage 86488->86490 86572 41130a 51 API calls __cinit 86488->86572 86490->86420 86492 42e2f3 86491->86492 86493 40d6cc 86491->86493 86573 408f40 86493->86573 86495 40d707 86577 40ebb0 86495->86577 86498 40d737 86580 411951 86498->86580 86503 40d751 86592 40f4e0 SystemParametersInfoW SystemParametersInfoW 86503->86592 86505 40d75f 86593 40d590 GetCurrentDirectoryW 86505->86593 86507 40d767 SystemParametersInfoW 86508 40d78d 86507->86508 86509 408f40 VariantClear 86508->86509 86510 40d79d 86509->86510 86511 408f40 VariantClear 86510->86511 86512 40d7a6 86511->86512 86512->86425 86519 4118da 46 API calls _doexit 86512->86519 86513->86398 86514->86402 86519->86425 86520->86428 86521->86436 86522->86444 86525 416b52 86523->86525 86526 416b8f 86525->86526 86527 416b70 Sleep 86525->86527 86531 41f677 86525->86531 86526->86442 86526->86447 86528 416b85 86527->86528 86528->86525 86528->86526 86529->86449 86530->86439 86532 41f683 86531->86532 86536 41f69e _malloc 86531->86536 86533 41f68f 86532->86533 86532->86536 86539 417f77 46 API calls __getptd_noexit 86533->86539 86535 41f6b1 HeapAlloc 86535->86536 86538 41f6d8 86535->86538 86536->86535 86536->86538 86537 41f694 86537->86525 86538->86525 86539->86537 86543 416b0d 86540->86543 86541 4135bb _malloc 45 API calls 86541->86543 86542 416b43 86542->86467 86543->86541 86543->86542 86544 416b24 Sleep 86543->86544 86545 416b39 86544->86545 86545->86542 86545->86543 86546->86480 86548 413753 RtlFreeHeap 86547->86548 86552 41377c __dosmaperr 86547->86552 86549 413768 86548->86549 86548->86552 86556 417f77 46 API calls __getptd_noexit 86549->86556 86551 41376e GetLastError 86551->86552 86552->86478 86557 417daa 86553->86557 86556->86551 86558 417dc9 __gmtime64_s __call_reportfault 86557->86558 86559 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 86558->86559 86560 417eb5 __call_reportfault 86559->86560 86563 41a208 86560->86563 86562 417ed1 GetCurrentProcess TerminateProcess 86562->86486 86564 41a210 86563->86564 86565 41a212 IsDebuggerPresent 86563->86565 86564->86562 86571 41fe19 86565->86571 86568 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 86569 421ff0 __call_reportfault 86568->86569 86570 421ff8 GetCurrentProcess TerminateProcess 86568->86570 86569->86570 86570->86562 86571->86568 86572->86490 86575 408f48 moneypunct 86573->86575 86574 4265c7 VariantClear 86576 408f55 moneypunct 86574->86576 86575->86574 86575->86576 86576->86495 86633 40ebd0 86577->86633 86637 4182cb 86580->86637 86582 41195e 86644 4181f2 LeaveCriticalSection 86582->86644 86584 40d748 86585 4119b0 86584->86585 86586 4119d6 86585->86586 86587 4119bc 86585->86587 86586->86503 86587->86586 86679 417f77 46 API calls __getptd_noexit 86587->86679 86589 4119c6 86680 417f25 10 API calls __wmakepath_s 86589->86680 86591 4119d1 86591->86503 86592->86505 86681 401f20 86593->86681 86595 40d5b6 IsDebuggerPresent 86596 40d5c4 86595->86596 86597 42e1bb MessageBoxA 86595->86597 86598 42e1d4 86596->86598 86599 40d5e3 86596->86599 86597->86598 86854 403a50 52 API calls 3 library calls 86598->86854 86751 40f520 86599->86751 86603 40d5fd GetFullPathNameW 86763 401460 86603->86763 86605 40d63b 86606 40d643 86605->86606 86607 42e231 SetCurrentDirectoryW 86605->86607 86608 40d64c 86606->86608 86855 432fee 6 API calls 86606->86855 86607->86606 86778 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 86608->86778 86611 42e252 86611->86608 86613 42e25a GetModuleFileNameW 86611->86613 86615 42e274 86613->86615 86616 42e2cb GetForegroundWindow ShellExecuteW 86613->86616 86856 401b10 86615->86856 86618 40d688 86616->86618 86617 40d656 86620 40d669 86617->86620 86852 40e0c0 74 API calls __gmtime64_s 86617->86852 86625 40d692 SetCurrentDirectoryW 86618->86625 86786 4091e0 86620->86786 86625->86507 86627 42e28d 86863 40d200 52 API calls 2 library calls 86627->86863 86630 42e299 GetForegroundWindow ShellExecuteW 86631 42e2c6 86630->86631 86631->86618 86632 40ec00 LoadLibraryA GetProcAddress 86632->86498 86634 40d72e 86633->86634 86635 40ebd6 LoadLibraryA 86633->86635 86634->86498 86634->86632 86635->86634 86636 40ebe7 GetProcAddress 86635->86636 86636->86634 86638 4182e0 86637->86638 86639 4182f3 EnterCriticalSection 86637->86639 86645 418209 86638->86645 86639->86582 86641 4182e6 86641->86639 86672 411924 46 API calls 3 library calls 86641->86672 86644->86584 86646 418215 __close 86645->86646 86647 418225 86646->86647 86648 41823d 86646->86648 86673 418901 46 API calls __NMSG_WRITE 86647->86673 86651 416b04 __malloc_crt 45 API calls 86648->86651 86654 41824b __close 86648->86654 86650 41822a 86674 418752 46 API calls 7 library calls 86650->86674 86653 418256 86651->86653 86656 41825d 86653->86656 86657 41826c 86653->86657 86654->86641 86655 418231 86675 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86655->86675 86676 417f77 46 API calls __getptd_noexit 86656->86676 86658 4182cb __lock 45 API calls 86657->86658 86661 418273 86658->86661 86663 4182a6 86661->86663 86664 41827b InitializeCriticalSectionAndSpinCount 86661->86664 86667 413748 _free 45 API calls 86663->86667 86665 418297 86664->86665 86666 41828b 86664->86666 86678 4182c2 LeaveCriticalSection _doexit 86665->86678 86668 413748 _free 45 API calls 86666->86668 86667->86665 86669 418291 86668->86669 86677 417f77 46 API calls __getptd_noexit 86669->86677 86673->86650 86674->86655 86676->86654 86677->86665 86678->86654 86679->86589 86680->86591 86864 40e6e0 86681->86864 86685 401f41 GetModuleFileNameW 86882 410100 86685->86882 86687 401f5c 86894 410960 86687->86894 86690 401b10 52 API calls 86691 401f81 86690->86691 86897 401980 86691->86897 86693 401f8e 86694 408f40 VariantClear 86693->86694 86695 401f9d 86694->86695 86696 401b10 52 API calls 86695->86696 86697 401fb4 86696->86697 86698 401980 53 API calls 86697->86698 86699 401fc3 86698->86699 86700 401b10 52 API calls 86699->86700 86701 401fd2 86700->86701 86905 40c2c0 86701->86905 86703 401fe1 86704 40bc70 52 API calls 86703->86704 86705 401ff3 86704->86705 86923 401a10 86705->86923 86707 401ffe 86930 4114ab 86707->86930 86710 428b05 86712 401a10 52 API calls 86710->86712 86711 402017 86713 4114ab __wcsicoll 58 API calls 86711->86713 86714 428b18 86712->86714 86715 402022 86713->86715 86717 401a10 52 API calls 86714->86717 86715->86714 86716 40202d 86715->86716 86718 4114ab __wcsicoll 58 API calls 86716->86718 86719 428b33 86717->86719 86720 402038 86718->86720 86722 428b3b GetModuleFileNameW 86719->86722 86721 402043 86720->86721 86720->86722 86723 4114ab __wcsicoll 58 API calls 86721->86723 86724 401a10 52 API calls 86722->86724 86725 40204e 86723->86725 86726 428b6c 86724->86726 86731 401a10 52 API calls 86725->86731 86733 428b90 _wcscpy 86725->86733 86743 402092 86725->86743 86942 40e0a0 52 API calls 86726->86942 86728 428b7a 86732 401a10 52 API calls 86728->86732 86729 4020a3 86730 428bc6 86729->86730 86938 40e830 53 API calls 86729->86938 86738 402073 _wcscpy 86731->86738 86735 428b88 86732->86735 86736 401a10 52 API calls 86733->86736 86735->86733 86746 4020d0 86736->86746 86737 4020bb 86939 40cf00 53 API calls 86737->86939 86741 401a10 52 API calls 86738->86741 86740 4020c6 86742 408f40 VariantClear 86740->86742 86741->86743 86742->86746 86743->86729 86743->86733 86744 402110 86748 408f40 VariantClear 86744->86748 86746->86744 86749 401a10 52 API calls 86746->86749 86940 40cf00 53 API calls 86746->86940 86941 40e6a0 53 API calls 86746->86941 86750 402120 moneypunct 86748->86750 86749->86746 86750->86595 86752 4295c9 __gmtime64_s 86751->86752 86753 40f53c 86751->86753 86756 4295d9 GetOpenFileNameW 86752->86756 87622 410120 86753->87622 86755 40f545 87626 4102b0 SHGetMalloc 86755->87626 86756->86753 86758 40d5f5 86756->86758 86758->86603 86758->86605 86759 40f54c 87631 410190 GetFullPathNameW 86759->87631 86761 40f559 87642 40f570 86761->87642 87704 402400 86763->87704 86765 40146f 86768 428c29 _wcscat 86765->86768 87713 401500 86765->87713 86767 40147c 86767->86768 87721 40d440 86767->87721 86770 401489 86770->86768 86771 401491 GetFullPathNameW 86770->86771 86772 402160 52 API calls 86771->86772 86773 4014bb 86772->86773 86774 402160 52 API calls 86773->86774 86775 4014c8 86774->86775 86775->86768 86776 402160 52 API calls 86775->86776 86777 4014ee 86776->86777 86777->86605 86779 428361 86778->86779 86780 4103fc LoadImageW RegisterClassExW 86778->86780 87810 44395e EnumResourceNamesW LoadImageW 86779->87810 87809 410490 7 API calls 86780->87809 86783 40d651 86785 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 86783->86785 86784 428368 86785->86617 86787 409202 86786->86787 86788 42d7ad 86786->86788 86843 409216 moneypunct 86787->86843 88082 410940 335 API calls 86787->88082 88085 45e737 90 API calls 3 library calls 86788->88085 86791 409386 86792 40939c 86791->86792 88083 40f190 10 API calls 86791->88083 86792->86618 86853 401000 Shell_NotifyIconW __gmtime64_s 86792->86853 86794 4095b2 86794->86792 86796 4095bf 86794->86796 86795 409253 PeekMessageW 86795->86843 88084 401a50 335 API calls 86796->88084 86797 40d410 VariantClear 86797->86843 86799 42d8cd Sleep 86799->86843 86800 4095c6 LockWindowUpdate DestroyWindow GetMessageW 86800->86792 86801 4095f9 86800->86801 86805 42e158 TranslateMessage DispatchMessageW GetMessageW 86801->86805 86803 42e13b 88104 40d410 VariantClear 86803->88104 86805->86805 86807 42e188 86805->86807 86807->86792 86809 409567 PeekMessageW 86809->86843 86811 46f3c1 107 API calls 86811->86843 86813 46fdbf 108 API calls 86851 4094e0 86813->86851 86814 409551 TranslateMessage DispatchMessageW 86814->86809 86816 42dcd2 WaitForSingleObject 86818 42dcf0 GetExitCodeProcess CloseHandle 86816->86818 86816->86843 86817 42dd3d Sleep 86817->86851 88093 40d410 VariantClear 86818->88093 86820 44c29d 52 API calls 86820->86851 86823 4094cf Sleep 86823->86851 86826 42d94d timeGetTime 88089 465124 53 API calls 86826->88089 86827 40c620 timeGetTime 86827->86851 86830 465124 53 API calls 86830->86851 86831 42dd89 CloseHandle 86831->86851 86832 47d33e 313 API calls 86832->86843 86834 42de19 GetExitCodeProcess CloseHandle 86834->86851 86835 408f40 VariantClear 86835->86851 86838 42de88 Sleep 86838->86843 86843->86791 86843->86795 86843->86797 86843->86799 86843->86803 86843->86809 86843->86811 86843->86814 86843->86816 86843->86817 86843->86823 86843->86826 86843->86832 86844 42e0cc VariantClear 86843->86844 86845 408f40 VariantClear 86843->86845 86846 45e737 90 API calls 86843->86846 86843->86851 87811 4091b0 86843->87811 87869 40afa0 86843->87869 87895 408fc0 86843->87895 87930 408cc0 86843->87930 87944 40d150 86843->87944 87949 40d170 86843->87949 87955 4096a0 86843->87955 88086 465124 53 API calls 86843->88086 88087 40e0a0 52 API calls 86843->88087 88088 40c620 timeGetTime 86843->88088 88103 40e270 VariantClear moneypunct 86843->88103 86844->86843 86845->86843 86846->86843 86848 401980 53 API calls 86848->86851 86849 401b10 52 API calls 86849->86851 86851->86813 86851->86820 86851->86827 86851->86830 86851->86831 86851->86834 86851->86835 86851->86838 86851->86843 86851->86848 86851->86849 88090 45178a 54 API calls 86851->88090 88091 47d33e 335 API calls 86851->88091 88092 453bc6 54 API calls 86851->88092 88094 40d410 VariantClear 86851->88094 88095 443d19 67 API calls _wcslen 86851->88095 88096 4574b4 VariantClear 86851->88096 88097 403cd0 86851->88097 88101 4731e1 VariantClear 86851->88101 88102 4331a2 6 API calls 86851->88102 86852->86620 86853->86618 86854->86605 86855->86611 86857 401b16 _wcslen 86856->86857 86858 4115d7 52 API calls 86857->86858 86861 401b63 86857->86861 86859 401b4b _memmove 86858->86859 86860 4115d7 52 API calls 86859->86860 86860->86861 86862 40d200 52 API calls 2 library calls 86861->86862 86862->86627 86863->86630 86865 40bc70 52 API calls 86864->86865 86866 401f31 86865->86866 86867 402560 86866->86867 86868 40256d __write_nolock 86867->86868 86869 402160 52 API calls 86868->86869 86871 402593 86869->86871 86874 4025bd 86871->86874 86943 401c90 86871->86943 86872 4026f0 52 API calls 86872->86874 86873 4026a7 86875 401b10 52 API calls 86873->86875 86880 4026db 86873->86880 86874->86872 86874->86873 86876 401b10 52 API calls 86874->86876 86878 401c90 52 API calls 86874->86878 86946 40d7c0 52 API calls 2 library calls 86874->86946 86877 4026d1 86875->86877 86876->86874 86947 40d7c0 52 API calls 2 library calls 86877->86947 86878->86874 86880->86685 86948 40f760 86882->86948 86885 410118 86885->86687 86887 42805d 86888 42806a 86887->86888 87004 431e58 86887->87004 86890 413748 _free 46 API calls 86888->86890 86891 428078 86890->86891 86892 431e58 82 API calls 86891->86892 86893 428084 86892->86893 86893->86687 86895 4115d7 52 API calls 86894->86895 86896 401f74 86895->86896 86896->86690 86898 4019a3 86897->86898 86900 401985 86897->86900 86899 4019b8 86898->86899 86898->86900 87611 403e10 53 API calls 86899->87611 86902 40199f 86900->86902 87610 403e10 53 API calls 86900->87610 86902->86693 86903 4019c4 86903->86693 86906 40c2c7 86905->86906 86907 40c30e 86905->86907 86908 40c2d3 86906->86908 86909 426c79 86906->86909 86910 40c315 86907->86910 86911 426c2b 86907->86911 87612 403ea0 52 API calls __cinit 86908->87612 87617 4534e3 52 API calls 86909->87617 86912 40c321 86910->86912 86920 426c5a 86910->86920 86914 426c4b 86911->86914 86915 426c2e 86911->86915 87613 403ea0 52 API calls __cinit 86912->87613 87615 4534e3 52 API calls 86914->87615 86922 40c2de 86915->86922 87614 4534e3 52 API calls 86915->87614 87616 4534e3 52 API calls 86920->87616 86922->86703 86924 401a30 86923->86924 86925 401a17 86923->86925 86927 402160 52 API calls 86924->86927 86926 401a2d 86925->86926 87618 403c30 52 API calls _memmove 86925->87618 86926->86707 86929 401a3d 86927->86929 86929->86707 86931 411523 86930->86931 86932 4114ba 86930->86932 87621 4113a8 58 API calls 3 library calls 86931->87621 86937 40200c 86932->86937 87619 417f77 46 API calls __getptd_noexit 86932->87619 86935 4114c6 87620 417f25 10 API calls __wmakepath_s 86935->87620 86937->86710 86937->86711 86938->86737 86939->86740 86940->86746 86941->86746 86942->86728 86944 4026f0 52 API calls 86943->86944 86945 401c97 86944->86945 86945->86871 86946->86874 86947->86880 87008 40f6f0 86948->87008 86950 40f77b _strcat moneypunct 87016 40f850 86950->87016 86955 427c2a 87046 414d04 86955->87046 86957 40f7fc 86957->86955 86958 40f804 86957->86958 87033 414a46 86958->87033 86962 40f80e 86962->86885 86967 4528bd 86962->86967 86964 427c59 87052 414fe2 86964->87052 86966 427c79 86968 4150d1 _fseek 81 API calls 86967->86968 86969 452930 86968->86969 87552 452719 86969->87552 86972 452948 86972->86887 86973 414d04 __fread_nolock 61 API calls 86974 452966 86973->86974 86975 414d04 __fread_nolock 61 API calls 86974->86975 86976 452976 86975->86976 86977 414d04 __fread_nolock 61 API calls 86976->86977 86978 45298f 86977->86978 86979 414d04 __fread_nolock 61 API calls 86978->86979 86980 4529aa 86979->86980 86981 4150d1 _fseek 81 API calls 86980->86981 86982 4529c4 86981->86982 86983 4135bb _malloc 46 API calls 86982->86983 86984 4529cf 86983->86984 86985 4135bb _malloc 46 API calls 86984->86985 86986 4529db 86985->86986 86987 414d04 __fread_nolock 61 API calls 86986->86987 86988 4529ec 86987->86988 86989 44afef GetSystemTimeAsFileTime 86988->86989 86990 452a00 86989->86990 86991 452a36 86990->86991 86992 452a13 86990->86992 86994 452aa5 86991->86994 86995 452a3c 86991->86995 86993 413748 _free 46 API calls 86992->86993 86996 452a1c 86993->86996 86998 413748 _free 46 API calls 86994->86998 87558 44b1a9 86995->87558 87000 413748 _free 46 API calls 86996->87000 86999 452aa3 86998->86999 86999->86887 87002 452a25 87000->87002 87001 452a9d 87003 413748 _free 46 API calls 87001->87003 87002->86887 87003->86999 87005 431e64 87004->87005 87006 431e6a 87004->87006 87007 414a46 __fcloseall 82 API calls 87005->87007 87006->86888 87007->87006 87009 425de2 87008->87009 87011 40f6fc _wcslen 87008->87011 87009->86950 87010 40f710 WideCharToMultiByte 87012 40f756 87010->87012 87013 40f728 87010->87013 87011->87010 87012->86950 87014 4115d7 52 API calls 87013->87014 87015 40f735 WideCharToMultiByte 87014->87015 87015->86950 87019 40f85d __gmtime64_s _strlen 87016->87019 87017 426b3b 87019->87017 87020 40f7ab 87019->87020 87065 414db8 87019->87065 87021 4149c2 87020->87021 87080 414904 87021->87080 87023 40f7e9 87023->86955 87024 40f5c0 87023->87024 87029 40f5cd _strcat __write_nolock _memmove 87024->87029 87025 414d04 __fread_nolock 61 API calls 87025->87029 87027 425d11 87028 4150d1 _fseek 81 API calls 87027->87028 87030 425d33 87028->87030 87029->87025 87029->87027 87032 40f691 __tzset_nolock 87029->87032 87168 4150d1 87029->87168 87031 414d04 __fread_nolock 61 API calls 87030->87031 87031->87032 87032->86957 87034 414a52 __close 87033->87034 87035 414a64 87034->87035 87036 414a79 87034->87036 87308 417f77 46 API calls __getptd_noexit 87035->87308 87038 415471 __lock_file 47 API calls 87036->87038 87044 414a74 __close 87036->87044 87040 414a92 87038->87040 87039 414a69 87309 417f25 10 API calls __wmakepath_s 87039->87309 87292 4149d9 87040->87292 87044->86962 87377 414c76 87046->87377 87048 414d1c 87049 44afef 87048->87049 87545 442c5a 87049->87545 87051 44b00d 87051->86964 87053 414fee __close 87052->87053 87054 414ffa 87053->87054 87055 41500f 87053->87055 87549 417f77 46 API calls __getptd_noexit 87054->87549 87057 415471 __lock_file 47 API calls 87055->87057 87058 415017 87057->87058 87060 414e4e __ftell_nolock 51 API calls 87058->87060 87059 414fff 87550 417f25 10 API calls __wmakepath_s 87059->87550 87062 415024 87060->87062 87551 41503d LeaveCriticalSection LeaveCriticalSection _fseek 87062->87551 87064 41500a __close 87064->86966 87066 414dd6 87065->87066 87067 414deb 87065->87067 87076 417f77 46 API calls __getptd_noexit 87066->87076 87067->87066 87069 414df2 87067->87069 87078 41b91b 79 API calls 11 library calls 87069->87078 87070 414ddb 87077 417f25 10 API calls __wmakepath_s 87070->87077 87073 414e18 87074 414de6 87073->87074 87079 418f98 77 API calls 6 library calls 87073->87079 87074->87019 87076->87070 87077->87074 87078->87073 87079->87074 87083 414910 __close 87080->87083 87081 414923 87136 417f77 46 API calls __getptd_noexit 87081->87136 87083->87081 87085 414951 87083->87085 87084 414928 87137 417f25 10 API calls __wmakepath_s 87084->87137 87099 41d4d1 87085->87099 87088 414956 87089 41496a 87088->87089 87090 41495d 87088->87090 87092 414992 87089->87092 87093 414972 87089->87093 87138 417f77 46 API calls __getptd_noexit 87090->87138 87116 41d218 87092->87116 87139 417f77 46 API calls __getptd_noexit 87093->87139 87096 414933 __close @_EH4_CallFilterFunc@8 87096->87023 87100 41d4dd __close 87099->87100 87101 4182cb __lock 46 API calls 87100->87101 87113 41d4eb 87101->87113 87102 41d560 87141 41d5fb 87102->87141 87103 41d567 87105 416b04 __malloc_crt 46 API calls 87103->87105 87107 41d56e 87105->87107 87106 41d5f0 __close 87106->87088 87107->87102 87108 41d57c InitializeCriticalSectionAndSpinCount 87107->87108 87110 41d59c 87108->87110 87111 41d5af EnterCriticalSection 87108->87111 87114 413748 _free 46 API calls 87110->87114 87111->87102 87112 418209 __mtinitlocknum 46 API calls 87112->87113 87113->87102 87113->87103 87113->87112 87144 4154b2 47 API calls __lock 87113->87144 87145 415520 LeaveCriticalSection LeaveCriticalSection _doexit 87113->87145 87114->87102 87117 41d23a 87116->87117 87118 41d255 87117->87118 87129 41d26c __wopenfile 87117->87129 87150 417f77 46 API calls __getptd_noexit 87118->87150 87120 41d25a 87151 417f25 10 API calls __wmakepath_s 87120->87151 87121 41d47a 87155 417f77 46 API calls __getptd_noexit 87121->87155 87122 41d48c 87147 422bf9 87122->87147 87126 41d47f 87156 417f25 10 API calls __wmakepath_s 87126->87156 87127 41499d 87140 4149b8 LeaveCriticalSection LeaveCriticalSection _fseek 87127->87140 87129->87121 87135 41d421 87129->87135 87152 41341f 58 API calls 2 library calls 87129->87152 87131 41d41a 87131->87135 87153 41341f 58 API calls 2 library calls 87131->87153 87133 41d439 87133->87135 87154 41341f 58 API calls 2 library calls 87133->87154 87135->87121 87135->87122 87136->87084 87137->87096 87138->87096 87139->87096 87140->87096 87146 4181f2 LeaveCriticalSection 87141->87146 87143 41d602 87143->87106 87144->87113 87145->87113 87146->87143 87157 422b35 87147->87157 87149 422c14 87149->87127 87150->87120 87151->87127 87152->87131 87153->87133 87154->87135 87155->87126 87156->87127 87159 422b41 __close 87157->87159 87158 422b54 87160 417f77 __wmakepath_s 46 API calls 87158->87160 87159->87158 87161 422b8a 87159->87161 87162 422b59 87160->87162 87163 422400 __tsopen_nolock 109 API calls 87161->87163 87164 417f25 __wmakepath_s 10 API calls 87162->87164 87165 422ba4 87163->87165 87167 422b63 __close 87164->87167 87166 422bcb __wsopen_helper LeaveCriticalSection 87165->87166 87166->87167 87167->87149 87170 4150dd __close 87168->87170 87169 4150e9 87199 417f77 46 API calls __getptd_noexit 87169->87199 87170->87169 87171 41510f 87170->87171 87181 415471 87171->87181 87174 4150ee 87200 417f25 10 API calls __wmakepath_s 87174->87200 87180 4150f9 __close 87180->87029 87182 415483 87181->87182 87183 4154a5 EnterCriticalSection 87181->87183 87182->87183 87184 41548b 87182->87184 87185 415117 87183->87185 87186 4182cb __lock 46 API calls 87184->87186 87187 415047 87185->87187 87186->87185 87188 415067 87187->87188 87189 415057 87187->87189 87194 415079 87188->87194 87202 414e4e 87188->87202 87257 417f77 46 API calls __getptd_noexit 87189->87257 87193 41505c 87201 415143 LeaveCriticalSection LeaveCriticalSection _fseek 87193->87201 87219 41443c 87194->87219 87197 4150b9 87232 41e1f4 87197->87232 87199->87174 87200->87180 87201->87180 87203 414e61 87202->87203 87204 414e79 87202->87204 87258 417f77 46 API calls __getptd_noexit 87203->87258 87205 414139 __fseek_nolock 46 API calls 87204->87205 87207 414e80 87205->87207 87210 41e1f4 __write 51 API calls 87207->87210 87208 414e66 87259 417f25 10 API calls __wmakepath_s 87208->87259 87211 414e97 87210->87211 87212 414f09 87211->87212 87214 414ec9 87211->87214 87218 414e71 87211->87218 87260 417f77 46 API calls __getptd_noexit 87212->87260 87215 41e1f4 __write 51 API calls 87214->87215 87214->87218 87216 414f64 87215->87216 87217 41e1f4 __write 51 API calls 87216->87217 87216->87218 87217->87218 87218->87194 87220 414455 87219->87220 87224 414477 87219->87224 87221 414139 __fseek_nolock 46 API calls 87220->87221 87220->87224 87222 414470 87221->87222 87261 41b7b2 77 API calls 5 library calls 87222->87261 87225 414139 87224->87225 87226 414145 87225->87226 87227 41415a 87225->87227 87262 417f77 46 API calls __getptd_noexit 87226->87262 87227->87197 87229 41414a 87263 417f25 10 API calls __wmakepath_s 87229->87263 87231 414155 87231->87197 87233 41e200 __close 87232->87233 87234 41e223 87233->87234 87235 41e208 87233->87235 87236 41e22f 87234->87236 87241 41e269 87234->87241 87284 417f8a 46 API calls __getptd_noexit 87235->87284 87286 417f8a 46 API calls __getptd_noexit 87236->87286 87239 41e20d 87285 417f77 46 API calls __getptd_noexit 87239->87285 87240 41e234 87287 417f77 46 API calls __getptd_noexit 87240->87287 87264 41ae56 87241->87264 87245 41e23c 87288 417f25 10 API calls __wmakepath_s 87245->87288 87246 41e26f 87248 41e291 87246->87248 87249 41e27d 87246->87249 87289 417f77 46 API calls __getptd_noexit 87248->87289 87274 41e17f 87249->87274 87251 41e215 __close 87251->87193 87253 41e296 87290 417f8a 46 API calls __getptd_noexit 87253->87290 87254 41e289 87291 41e2c0 LeaveCriticalSection __unlock_fhandle 87254->87291 87257->87193 87258->87208 87259->87218 87260->87218 87261->87224 87262->87229 87263->87231 87265 41ae62 __close 87264->87265 87266 41aebc 87265->87266 87267 4182cb __lock 46 API calls 87265->87267 87268 41aec1 EnterCriticalSection 87266->87268 87269 41aede __close 87266->87269 87270 41ae8e 87267->87270 87268->87269 87269->87246 87271 41aeaa 87270->87271 87272 41ae97 InitializeCriticalSectionAndSpinCount 87270->87272 87273 41aeec ___lock_fhandle LeaveCriticalSection 87271->87273 87272->87271 87273->87266 87275 41aded __close_nolock 46 API calls 87274->87275 87276 41e18e 87275->87276 87277 41e1a4 SetFilePointer 87276->87277 87278 41e194 87276->87278 87279 41e1bb GetLastError 87277->87279 87281 41e1c3 87277->87281 87280 417f77 __wmakepath_s 46 API calls 87278->87280 87279->87281 87282 41e199 87280->87282 87281->87282 87283 417f9d __dosmaperr 46 API calls 87281->87283 87282->87254 87283->87282 87284->87239 87285->87251 87286->87240 87287->87245 87288->87251 87289->87253 87290->87254 87291->87251 87293 4149ea 87292->87293 87294 4149fe 87292->87294 87338 417f77 46 API calls __getptd_noexit 87293->87338 87297 41443c __flush 77 API calls 87294->87297 87306 4149fa 87294->87306 87296 4149ef 87339 417f25 10 API calls __wmakepath_s 87296->87339 87299 414a0a 87297->87299 87311 41d8c2 87299->87311 87302 414139 __fseek_nolock 46 API calls 87303 414a18 87302->87303 87315 41d7fe 87303->87315 87305 414a1e 87305->87306 87307 413748 _free 46 API calls 87305->87307 87310 414ab2 LeaveCriticalSection LeaveCriticalSection _fseek 87306->87310 87307->87306 87308->87039 87309->87044 87310->87044 87312 414a12 87311->87312 87313 41d8d2 87311->87313 87312->87302 87313->87312 87314 413748 _free 46 API calls 87313->87314 87314->87312 87316 41d80a __close 87315->87316 87317 41d812 87316->87317 87318 41d82d 87316->87318 87355 417f8a 46 API calls __getptd_noexit 87317->87355 87320 41d839 87318->87320 87323 41d873 87318->87323 87357 417f8a 46 API calls __getptd_noexit 87320->87357 87321 41d817 87356 417f77 46 API calls __getptd_noexit 87321->87356 87326 41ae56 ___lock_fhandle 48 API calls 87323->87326 87325 41d83e 87358 417f77 46 API calls __getptd_noexit 87325->87358 87328 41d879 87326->87328 87330 41d893 87328->87330 87331 41d887 87328->87331 87329 41d846 87359 417f25 10 API calls __wmakepath_s 87329->87359 87360 417f77 46 API calls __getptd_noexit 87330->87360 87340 41d762 87331->87340 87335 41d81f __close 87335->87305 87336 41d88d 87361 41d8ba LeaveCriticalSection __unlock_fhandle 87336->87361 87338->87296 87339->87306 87362 41aded 87340->87362 87342 41d7c8 87375 41ad67 47 API calls 2 library calls 87342->87375 87344 41d772 87344->87342 87345 41d7a6 87344->87345 87347 41aded __close_nolock 46 API calls 87344->87347 87345->87342 87348 41aded __close_nolock 46 API calls 87345->87348 87346 41d7d0 87350 41d7f2 87346->87350 87376 417f9d 46 API calls 3 library calls 87346->87376 87351 41d79d 87347->87351 87349 41d7b2 CloseHandle 87348->87349 87349->87342 87352 41d7be GetLastError 87349->87352 87350->87336 87354 41aded __close_nolock 46 API calls 87351->87354 87352->87342 87354->87345 87355->87321 87356->87335 87357->87325 87358->87329 87359->87335 87360->87336 87361->87335 87363 41ae12 87362->87363 87364 41adfa 87362->87364 87366 417f8a __close 46 API calls 87363->87366 87369 41ae51 87363->87369 87365 417f8a __close 46 API calls 87364->87365 87367 41adff 87365->87367 87368 41ae23 87366->87368 87370 417f77 __wmakepath_s 46 API calls 87367->87370 87371 417f77 __wmakepath_s 46 API calls 87368->87371 87369->87344 87372 41ae07 87370->87372 87373 41ae2b 87371->87373 87372->87344 87374 417f25 __wmakepath_s 10 API calls 87373->87374 87374->87372 87375->87346 87376->87350 87378 414c82 __close 87377->87378 87379 414cc3 87378->87379 87380 414c96 __gmtime64_s 87378->87380 87381 414cbb __close 87378->87381 87382 415471 __lock_file 47 API calls 87379->87382 87404 417f77 46 API calls __getptd_noexit 87380->87404 87381->87048 87383 414ccb 87382->87383 87390 414aba 87383->87390 87386 414cb0 87405 417f25 10 API calls __wmakepath_s 87386->87405 87391 414af2 87390->87391 87395 414ad8 __gmtime64_s 87390->87395 87406 414cfa LeaveCriticalSection LeaveCriticalSection _fseek 87391->87406 87392 414ae2 87457 417f77 46 API calls __getptd_noexit 87392->87457 87394 414ae7 87458 417f25 10 API calls __wmakepath_s 87394->87458 87395->87391 87395->87392 87401 414b2d 87395->87401 87398 414c38 __gmtime64_s 87460 417f77 46 API calls __getptd_noexit 87398->87460 87399 414139 __fseek_nolock 46 API calls 87399->87401 87401->87391 87401->87398 87401->87399 87407 41dfcc 87401->87407 87437 41d8f3 87401->87437 87459 41e0c2 46 API calls 3 library calls 87401->87459 87404->87386 87405->87381 87406->87381 87408 41dfd8 __close 87407->87408 87409 41dfe0 87408->87409 87410 41dffb 87408->87410 87530 417f8a 46 API calls __getptd_noexit 87409->87530 87411 41e007 87410->87411 87416 41e041 87410->87416 87532 417f8a 46 API calls __getptd_noexit 87411->87532 87414 41dfe5 87531 417f77 46 API calls __getptd_noexit 87414->87531 87415 41e00c 87533 417f77 46 API calls __getptd_noexit 87415->87533 87419 41e063 87416->87419 87420 41e04e 87416->87420 87421 41ae56 ___lock_fhandle 48 API calls 87419->87421 87535 417f8a 46 API calls __getptd_noexit 87420->87535 87424 41e069 87421->87424 87422 41e014 87534 417f25 10 API calls __wmakepath_s 87422->87534 87427 41e077 87424->87427 87428 41e08b 87424->87428 87425 41e053 87536 417f77 46 API calls __getptd_noexit 87425->87536 87461 41da15 87427->87461 87537 417f77 46 API calls __getptd_noexit 87428->87537 87430 41dfed __close 87430->87401 87433 41e083 87539 41e0ba LeaveCriticalSection __unlock_fhandle 87433->87539 87434 41e090 87538 417f8a 46 API calls __getptd_noexit 87434->87538 87438 41d900 87437->87438 87442 41d915 87437->87442 87543 417f77 46 API calls __getptd_noexit 87438->87543 87440 41d905 87544 417f25 10 API calls __wmakepath_s 87440->87544 87443 41d94a 87442->87443 87449 41d910 87442->87449 87540 420603 87442->87540 87445 414139 __fseek_nolock 46 API calls 87443->87445 87446 41d95e 87445->87446 87447 41dfcc __read 59 API calls 87446->87447 87448 41d965 87447->87448 87448->87449 87450 414139 __fseek_nolock 46 API calls 87448->87450 87449->87401 87451 41d988 87450->87451 87451->87449 87452 414139 __fseek_nolock 46 API calls 87451->87452 87453 41d994 87452->87453 87453->87449 87454 414139 __fseek_nolock 46 API calls 87453->87454 87455 41d9a1 87454->87455 87456 414139 __fseek_nolock 46 API calls 87455->87456 87456->87449 87457->87394 87458->87391 87459->87401 87460->87394 87462 41da31 87461->87462 87463 41da4c 87461->87463 87464 417f8a __close 46 API calls 87462->87464 87465 41da5b 87463->87465 87467 41da7a 87463->87467 87466 41da36 87464->87466 87468 417f8a __close 46 API calls 87465->87468 87470 417f77 __wmakepath_s 46 API calls 87466->87470 87469 41da98 87467->87469 87483 41daac 87467->87483 87471 41da60 87468->87471 87472 417f8a __close 46 API calls 87469->87472 87484 41da3e 87470->87484 87474 417f77 __wmakepath_s 46 API calls 87471->87474 87476 41da9d 87472->87476 87473 41db02 87475 417f8a __close 46 API calls 87473->87475 87477 41da67 87474->87477 87478 41db07 87475->87478 87479 417f77 __wmakepath_s 46 API calls 87476->87479 87480 417f25 __wmakepath_s 10 API calls 87477->87480 87481 417f77 __wmakepath_s 46 API calls 87478->87481 87482 41daa4 87479->87482 87480->87484 87481->87482 87487 417f25 __wmakepath_s 10 API calls 87482->87487 87483->87473 87483->87484 87485 41dae1 87483->87485 87486 41db1b 87483->87486 87484->87433 87485->87473 87488 41daec ReadFile 87485->87488 87490 416b04 __malloc_crt 46 API calls 87486->87490 87487->87484 87491 41dc17 87488->87491 87492 41df8f GetLastError 87488->87492 87493 41db31 87490->87493 87491->87492 87498 41dc2b 87491->87498 87494 41de16 87492->87494 87495 41df9c 87492->87495 87496 41db59 87493->87496 87497 41db3b 87493->87497 87504 417f9d __dosmaperr 46 API calls 87494->87504 87523 41dd9b 87494->87523 87500 417f77 __wmakepath_s 46 API calls 87495->87500 87499 420494 __lseeki64_nolock 48 API calls 87496->87499 87501 417f77 __wmakepath_s 46 API calls 87497->87501 87514 41dc47 87498->87514 87515 41de5b 87498->87515 87498->87523 87502 41db67 87499->87502 87503 41dfa1 87500->87503 87505 41db40 87501->87505 87502->87488 87507 417f8a __close 46 API calls 87503->87507 87504->87523 87506 417f8a __close 46 API calls 87505->87506 87506->87484 87507->87523 87508 413748 _free 46 API calls 87508->87484 87509 41ded0 ReadFile 87512 41deef GetLastError 87509->87512 87521 41def9 87509->87521 87510 41dcab ReadFile 87511 41dcc9 GetLastError 87510->87511 87520 41dcd3 87510->87520 87511->87514 87511->87520 87512->87515 87512->87521 87513 41ddec MultiByteToWideChar 87516 41de10 GetLastError 87513->87516 87513->87523 87514->87510 87517 41dd28 87514->87517 87515->87509 87515->87523 87516->87494 87518 41dda3 87517->87518 87519 41dd96 87517->87519 87517->87523 87524 41dd60 87517->87524 87518->87524 87525 41ddda 87518->87525 87522 417f77 __wmakepath_s 46 API calls 87519->87522 87520->87514 87526 420494 __lseeki64_nolock 48 API calls 87520->87526 87521->87515 87527 420494 __lseeki64_nolock 48 API calls 87521->87527 87522->87523 87523->87484 87523->87508 87524->87513 87528 420494 __lseeki64_nolock 48 API calls 87525->87528 87526->87520 87527->87521 87529 41dde9 87528->87529 87529->87513 87530->87414 87531->87430 87532->87415 87533->87422 87534->87430 87535->87425 87536->87422 87537->87434 87538->87433 87539->87430 87541 416b04 __malloc_crt 46 API calls 87540->87541 87542 420618 87541->87542 87542->87443 87543->87440 87544->87449 87548 4148b3 GetSystemTimeAsFileTime __aulldiv 87545->87548 87547 442c6b 87547->87051 87548->87547 87549->87059 87550->87064 87551->87064 87556 45272f __tzset_nolock _wcscpy 87552->87556 87553 414d04 61 API calls __fread_nolock 87553->87556 87554 4528a4 87554->86972 87554->86973 87555 44afef GetSystemTimeAsFileTime 87555->87556 87556->87553 87556->87554 87556->87555 87557 4150d1 81 API calls _fseek 87556->87557 87557->87556 87559 44b1bc 87558->87559 87560 44b1ca 87558->87560 87561 4149c2 116 API calls 87559->87561 87562 44b1e1 87560->87562 87563 4149c2 116 API calls 87560->87563 87564 44b1d8 87560->87564 87561->87560 87593 4321a4 87562->87593 87565 44b2db 87563->87565 87564->87001 87565->87562 87568 44b2e9 87565->87568 87567 44b224 87569 44b253 87567->87569 87570 44b228 87567->87570 87571 44b2f6 87568->87571 87573 414a46 __fcloseall 82 API calls 87568->87573 87597 43213d 87569->87597 87572 44b235 87570->87572 87575 414a46 __fcloseall 82 API calls 87570->87575 87571->87001 87576 44b245 87572->87576 87578 414a46 __fcloseall 82 API calls 87572->87578 87573->87571 87575->87572 87576->87001 87577 44b25a 87579 44b260 87577->87579 87580 44b289 87577->87580 87578->87576 87582 44b26d 87579->87582 87584 414a46 __fcloseall 82 API calls 87579->87584 87607 44b0bf 87 API calls 87580->87607 87585 414a46 __fcloseall 82 API calls 87582->87585 87587 44b27d 87582->87587 87583 44b28f 87608 4320f8 46 API calls _free 87583->87608 87584->87582 87585->87587 87587->87001 87588 44b295 87589 44b2a2 87588->87589 87590 414a46 __fcloseall 82 API calls 87588->87590 87591 44b2b2 87589->87591 87592 414a46 __fcloseall 82 API calls 87589->87592 87590->87589 87591->87001 87592->87591 87594 4321cb 87593->87594 87596 4321b4 __tzset_nolock _memmove 87593->87596 87595 414d04 __fread_nolock 61 API calls 87594->87595 87595->87596 87596->87567 87598 4135bb _malloc 46 API calls 87597->87598 87599 432150 87598->87599 87600 4135bb _malloc 46 API calls 87599->87600 87601 432162 87600->87601 87602 4135bb _malloc 46 API calls 87601->87602 87603 432174 87602->87603 87606 432189 87603->87606 87609 4320f8 46 API calls _free 87603->87609 87605 432198 87605->87577 87606->87577 87607->87583 87608->87588 87609->87605 87610->86902 87611->86903 87612->86922 87613->86922 87614->86922 87615->86920 87616->86922 87617->86922 87618->86926 87619->86935 87620->86937 87621->86937 87671 410160 87622->87671 87624 41012f GetFullPathNameW 87625 410147 moneypunct 87624->87625 87625->86755 87627 4102cb SHGetDesktopFolder 87626->87627 87630 410333 _wcsncpy 87626->87630 87628 4102e0 _wcsncpy 87627->87628 87627->87630 87629 41031c SHGetPathFromIDListW 87628->87629 87628->87630 87629->87630 87630->86759 87632 4101bb 87631->87632 87636 425f4a 87631->87636 87633 410160 52 API calls 87632->87633 87634 4101c7 87633->87634 87675 410200 52 API calls 2 library calls 87634->87675 87635 4114ab __wcsicoll 58 API calls 87635->87636 87636->87635 87639 425f6e 87636->87639 87638 4101d6 87676 410200 52 API calls 2 library calls 87638->87676 87639->86761 87641 4101e9 87641->86761 87643 40f760 128 API calls 87642->87643 87644 40f584 87643->87644 87645 429335 87644->87645 87646 40f58c 87644->87646 87649 4528bd 118 API calls 87645->87649 87647 40f598 87646->87647 87648 429358 87646->87648 87701 4033c0 113 API calls 7 library calls 87647->87701 87702 434034 86 API calls _wprintf 87648->87702 87651 42934b 87649->87651 87654 429373 87651->87654 87655 42934f 87651->87655 87653 40f5b4 87653->86758 87657 4115d7 52 API calls 87654->87657 87658 431e58 82 API calls 87655->87658 87656 429369 87656->87654 87670 4293c5 moneypunct 87657->87670 87658->87648 87659 42959c 87660 413748 _free 46 API calls 87659->87660 87661 4295a5 87660->87661 87662 431e58 82 API calls 87661->87662 87663 4295b1 87662->87663 87667 401b10 52 API calls 87667->87670 87670->87659 87670->87667 87677 444af8 87670->87677 87680 44b41c 87670->87680 87687 402780 87670->87687 87695 4022d0 87670->87695 87703 44c7dd 64 API calls 3 library calls 87670->87703 87672 410167 _wcslen 87671->87672 87673 4115d7 52 API calls 87672->87673 87674 41017e _wcscpy 87673->87674 87674->87624 87675->87638 87676->87641 87678 4115d7 52 API calls 87677->87678 87679 444b27 _memmove 87678->87679 87679->87670 87681 44b429 87680->87681 87682 4115d7 52 API calls 87681->87682 87683 44b440 87682->87683 87684 44b45e 87683->87684 87685 401b10 52 API calls 87683->87685 87684->87670 87686 44b453 87685->87686 87686->87670 87688 402827 87687->87688 87691 402790 moneypunct _memmove 87687->87691 87690 4115d7 52 API calls 87688->87690 87689 4115d7 52 API calls 87692 402797 87689->87692 87690->87691 87691->87689 87693 4027bd 87692->87693 87694 4115d7 52 API calls 87692->87694 87693->87670 87694->87693 87696 4022e0 87695->87696 87698 40239d 87695->87698 87697 4115d7 52 API calls 87696->87697 87696->87698 87699 402320 moneypunct 87696->87699 87697->87699 87698->87670 87699->87698 87700 4115d7 52 API calls 87699->87700 87700->87699 87701->87653 87702->87656 87703->87670 87705 402417 87704->87705 87709 402539 moneypunct 87704->87709 87706 4115d7 52 API calls 87705->87706 87705->87709 87707 402443 87706->87707 87708 4115d7 52 API calls 87707->87708 87711 4024b4 87708->87711 87709->86765 87711->87709 87712 4022d0 52 API calls 87711->87712 87733 402880 87711->87733 87712->87711 87718 401566 87713->87718 87714 401794 87802 40e9a0 90 API calls 87714->87802 87717 4010a0 52 API calls 87717->87718 87718->87714 87718->87717 87719 40167a 87718->87719 87720 4017c0 87719->87720 87803 45e737 90 API calls 3 library calls 87719->87803 87720->86767 87722 40bc70 52 API calls 87721->87722 87731 40d451 87722->87731 87723 40d50f 87807 410600 52 API calls 87723->87807 87725 427c01 87808 45e737 90 API calls 3 library calls 87725->87808 87728 40d519 87728->86770 87729 401b10 52 API calls 87729->87731 87731->87723 87731->87725 87731->87728 87731->87729 87804 40e0a0 52 API calls 87731->87804 87805 40f310 53 API calls 87731->87805 87806 40d860 91 API calls 87731->87806 87734 4115d7 52 API calls 87733->87734 87735 4028b3 87734->87735 87736 4115d7 52 API calls 87735->87736 87743 4028c5 moneypunct _memmove 87736->87743 87737 402780 52 API calls 87738 402b1e moneypunct 87737->87738 87738->87711 87739 427d62 87742 403350 52 API calls 87739->87742 87741 402bb6 87791 403060 53 API calls 87741->87791 87746 427d6b 87742->87746 87743->87739 87743->87741 87745 402aeb moneypunct 87743->87745 87751 403350 52 API calls 87743->87751 87756 427fd5 87743->87756 87757 427f2c 87743->87757 87758 402780 52 API calls 87743->87758 87763 427fa5 87743->87763 87764 402f00 52 API calls 87743->87764 87766 428000 87743->87766 87768 4026f0 52 API calls 87743->87768 87774 4115d7 52 API calls 87743->87774 87775 402f80 87743->87775 87790 4031b0 63 API calls 87743->87790 87792 402280 52 API calls 87743->87792 87794 4013a0 52 API calls 87743->87794 87745->87737 87748 42802b moneypunct 87745->87748 87746->87757 87793 403020 52 API calls _memmove 87746->87793 87747 402bca 87749 427f63 87747->87749 87750 402bd4 87747->87750 87796 460879 92 API calls 3 library calls 87749->87796 87753 402780 52 API calls 87750->87753 87751->87743 87755 402bdf 87753->87755 87755->87711 87797 460879 92 API calls 3 library calls 87756->87797 87795 460879 92 API calls 3 library calls 87757->87795 87758->87743 87762 427fe4 87771 402780 52 API calls 87762->87771 87772 402780 52 API calls 87763->87772 87764->87743 87798 460879 92 API calls 3 library calls 87766->87798 87770 402a85 CharUpperBuffW 87768->87770 87769 427f48 87769->87738 87770->87743 87771->87769 87772->87738 87774->87743 87776 403350 52 API calls 87775->87776 87779 402f8f 87776->87779 87778 427d22 87778->87743 87780 403004 87779->87780 87783 427cb8 87779->87783 87786 402f00 52 API calls 87779->87786 87789 402fff _memmove 87779->87789 87781 427cb0 87780->87781 87782 40300e 87780->87782 87799 403020 52 API calls _memmove 87781->87799 87782->87743 87800 4013a0 52 API calls 87783->87800 87786->87779 87787 427cc7 87788 4115d7 52 API calls 87787->87788 87788->87789 87801 460879 92 API calls 3 library calls 87789->87801 87790->87743 87791->87747 87792->87743 87793->87746 87794->87743 87795->87769 87796->87769 87797->87762 87798->87738 87799->87783 87800->87787 87801->87778 87802->87719 87803->87720 87804->87731 87805->87731 87806->87731 87807->87728 87808->87728 87809->86783 87810->86784 87812 42c5fe 87811->87812 87826 4091c6 87811->87826 87813 40bc70 52 API calls 87812->87813 87812->87826 87814 42c64e InterlockedIncrement 87813->87814 87815 42c665 87814->87815 87820 42c697 87814->87820 87817 42c672 InterlockedDecrement Sleep InterlockedIncrement 87815->87817 87815->87820 87816 42c737 InterlockedDecrement 87818 42c74a 87816->87818 87817->87815 87817->87820 87821 408f40 VariantClear 87818->87821 87819 42c731 87819->87816 87820->87816 87820->87819 88105 408e80 87820->88105 87823 42c752 87821->87823 88122 410c60 87823->88122 87826->86843 87828 42c6db 87829 402160 52 API calls 87828->87829 87830 42c6e5 87829->87830 87831 45340c 85 API calls 87830->87831 87832 42c6f1 87831->87832 88115 40d200 52 API calls 2 library calls 87832->88115 87834 42c6fb 88116 465124 53 API calls 87834->88116 87836 42c715 87870 40afc4 87869->87870 87871 40b156 87869->87871 87872 40afd5 87870->87872 87873 42d1e3 87870->87873 88191 45e737 90 API calls 3 library calls 87871->88191 87876 40a780 204 API calls 87872->87876 87894 40b11a moneypunct 87872->87894 88192 45e737 90 API calls 3 library calls 87873->88192 87879 40b00a 87876->87879 87877 40b143 87877->86843 87878 42d1f8 87882 408f40 VariantClear 87878->87882 87879->87878 87883 40b012 87879->87883 87881 42d4db 87881->87881 87882->87877 87884 42d231 VariantClear 87883->87884 87886 40b04a 87883->87886 87892 40b094 moneypunct 87883->87892 87888 40b05c moneypunct 87884->87888 87885 42d45a VariantClear 87885->87894 87886->87888 88193 40e270 VariantClear moneypunct 87886->88193 87887 40b108 87887->87894 88194 40e270 VariantClear moneypunct 87887->88194 87891 4115d7 52 API calls 87888->87891 87888->87892 87891->87892 87892->87887 87893 42d425 moneypunct 87892->87893 87893->87885 87893->87894 87894->87877 88195 45e737 90 API calls 3 library calls 87894->88195 87896 408fff 87895->87896 87899 40900d 87895->87899 88196 403ea0 52 API calls __cinit 87896->88196 87900 42c3f6 87899->87900 87902 40a780 204 API calls 87899->87902 87903 42c44a 87899->87903 87905 42c47b 87899->87905 87907 42c4cb 87899->87907 87908 42c564 87899->87908 87911 42c548 87899->87911 87915 409112 87899->87915 87917 4090df 87899->87917 87919 42c528 87899->87919 87922 4090ea 87899->87922 87929 4090f2 moneypunct 87899->87929 88198 4534e3 52 API calls 87899->88198 88200 40c4e0 204 API calls 87899->88200 88199 45e737 90 API calls 3 library calls 87900->88199 87902->87899 88201 45e737 90 API calls 3 library calls 87903->88201 88202 451b42 61 API calls 87905->88202 88204 47faae 235 API calls 87907->88204 87912 408f40 VariantClear 87908->87912 88207 45e737 90 API calls 3 library calls 87911->88207 87912->87929 87913 42c491 87913->87929 88203 45e737 90 API calls 3 library calls 87913->88203 87914 42c4da 87914->87929 88205 45e737 90 API calls 3 library calls 87914->88205 87915->87911 87920 40912b 87915->87920 87917->87922 87923 408e80 VariantClear 87917->87923 88206 45e737 90 API calls 3 library calls 87919->88206 87920->87929 88197 403e10 53 API calls 87920->88197 87925 408f40 VariantClear 87922->87925 87923->87922 87925->87929 87927 40914b 87928 408f40 VariantClear 87927->87928 87928->87929 87929->86843 88208 408d90 87930->88208 87932 408cf9 87933 429778 87932->87933 87936 42976c 87932->87936 87938 408d2d 87932->87938 87934 410c60 VariantClear 87933->87934 87935 429780 87934->87935 88234 45e737 90 API calls 3 library calls 87936->88234 88224 403d10 87938->88224 87941 408d71 moneypunct 87941->86843 87942 408f40 VariantClear 87943 408d45 moneypunct 87942->87943 87943->87941 87943->87942 87945 425c87 87944->87945 87946 40d15f 87944->87946 87947 425cc7 87945->87947 87948 425ca1 TranslateAcceleratorW 87945->87948 87946->86843 87948->87946 87950 42602f 87949->87950 87952 40d17f 87949->87952 87950->86843 87951 42608e IsDialogMessageW 87951->87952 87953 40d18c 87951->87953 87952->87951 87952->87953 88465 430c46 GetClassLongW 87952->88465 87953->86843 87956 4096c6 _wcslen 87955->87956 87957 40a70c moneypunct _memmove 87956->87957 87958 4115d7 52 API calls 87956->87958 88467 4013a0 52 API calls 87957->88467 87959 4096fa _memmove 87958->87959 87960 4115d7 52 API calls 87959->87960 87962 40971b 87960->87962 87962->87957 87964 409749 CharUpperBuffW 87962->87964 87969 40976a moneypunct 87962->87969 87963 4297aa 87965 4115d7 52 API calls 87963->87965 87964->87969 87966 4297d1 _memmove 87965->87966 88492 45e737 90 API calls 3 library calls 87966->88492 88014 4097e5 moneypunct 87969->88014 88468 47dcbb 206 API calls 87969->88468 87970 42a452 87971 408f40 VariantClear 87970->87971 87972 42ae92 87971->87972 87973 410c60 VariantClear 87972->87973 87974 42aea4 87973->87974 87975 409aa2 87975->87966 87977 4115d7 52 API calls 87975->87977 87982 409afe 87975->87982 87976 40a689 87979 4115d7 52 API calls 87976->87979 87977->87982 87978 4115d7 52 API calls 87978->88014 87999 40a6af moneypunct _memmove 87979->87999 87980 409b2a 87984 429dbe 87980->87984 88047 409b4d moneypunct _memmove 87980->88047 88475 40b400 VariantClear VariantClear moneypunct 87980->88475 87981 40c2c0 52 API calls 87981->88014 87982->87980 87983 4115d7 52 API calls 87982->87983 87985 429d31 87983->87985 87990 429dd3 87984->87990 88476 40b400 VariantClear VariantClear moneypunct 87984->88476 87989 429d42 87985->87989 88471 44a801 52 API calls 87985->88471 87986 429a46 VariantClear 87986->88014 87987 409fd2 87994 40a045 87987->87994 88041 42a3f5 87987->88041 88472 40e0a0 52 API calls 87989->88472 88005 40e1c0 VariantClear 87990->88005 87990->88047 87991 408f40 VariantClear 87991->88014 87995 4115d7 52 API calls 87994->87995 88001 40a04c 87995->88001 88006 4115d7 52 API calls 87999->88006 88007 40a0a7 88001->88007 88010 4091e0 321 API calls 88001->88010 88002 429d57 88473 453443 52 API calls 88002->88473 88003 40ba10 52 API calls 88003->88014 88004 42a42f 88480 45e737 90 API calls 3 library calls 88004->88480 88005->88047 88006->87957 88027 40a0af 88007->88027 88481 40c790 VariantClear moneypunct 88007->88481 88008 4299d9 88012 408f40 VariantClear 88008->88012 88010->88007 88011 429abd 88011->86843 88015 4299e2 88012->88015 88013 429d88 88474 453443 52 API calls 88013->88474 88014->87966 88014->87970 88014->87975 88014->87976 88014->87978 88014->87981 88014->87986 88014->87991 88014->87999 88014->88003 88014->88008 88014->88011 88020 40a780 204 API calls 88014->88020 88469 40c4e0 204 API calls 88014->88469 88470 40e270 VariantClear moneypunct 88014->88470 88024 410c60 VariantClear 88015->88024 88020->88014 88022 4115d7 52 API calls 88022->88047 88023 44a801 52 API calls 88023->88047 88078 40a650 moneypunct 88024->88078 88026 402780 52 API calls 88026->88047 88056 40a162 moneypunct _memmove 88027->88056 88030 40a780 204 API calls 88030->88047 88032 401980 53 API calls 88032->88047 88033 408e80 VariantClear 88033->88047 88039 41130a 51 API calls __cinit 88039->88047 88479 47390f VariantClear 88041->88479 88046 409c95 88046->86843 88047->87957 88047->87987 88047->88004 88047->88022 88047->88023 88047->88026 88047->88030 88047->88032 88047->88033 88047->88039 88047->88041 88047->88046 88477 45f508 52 API calls 88047->88477 88478 403e10 53 API calls 88047->88478 88078->86843 88082->86843 88083->86794 88084->86800 88085->86843 88086->86843 88087->86843 88088->86843 88089->86843 88090->86851 88091->86851 88092->86851 88093->86851 88094->86851 88095->86851 88096->86851 88098 403cdf 88097->88098 88099 408f40 VariantClear 88098->88099 88100 403ce7 88099->88100 88100->86838 88101->86851 88102->86851 88103->86843 88104->86791 88106 408e94 88105->88106 88107 408e88 88105->88107 88109 45340c 88106->88109 88108 408f40 VariantClear 88107->88108 88108->88106 88110 453439 88109->88110 88111 453419 88109->88111 88110->87828 88112 45342f 88111->88112 88178 4531b1 85 API calls 5 library calls 88111->88178 88112->87828 88114 453425 88114->87828 88115->87834 88116->87836 88123 428372 88122->88123 88124 410c73 moneypunct 88122->88124 88125 40e1c0 VariantClear 88123->88125 88126 42838c 88123->88126 88124->87826 88125->88123 88178->88114 88191->87873 88192->87878 88193->87888 88194->87894 88195->87881 88196->87899 88197->87927 88198->87899 88199->87929 88200->87899 88201->87929 88202->87913 88203->87929 88204->87914 88205->87929 88206->87929 88207->87908 88209 4289d2 88208->88209 88210 408db3 88208->88210 88236 45e737 90 API calls 3 library calls 88209->88236 88235 40bec0 90 API calls 88210->88235 88213 4289e5 88237 45e737 90 API calls 3 library calls 88213->88237 88215 40ba10 52 API calls 88221 408dc9 88215->88221 88216 428a05 88217 408f40 VariantClear 88216->88217 88223 408e5a 88217->88223 88218 40a780 204 API calls 88218->88221 88219 408e64 88220 408f40 VariantClear 88219->88220 88220->88223 88221->88213 88221->88215 88221->88216 88221->88218 88221->88219 88222 408f40 VariantClear 88221->88222 88221->88223 88222->88221 88223->87932 88225 408f40 VariantClear 88224->88225 88226 403d20 88225->88226 88227 403cd0 VariantClear 88226->88227 88228 403d4d 88227->88228 88238 46f8cb 88228->88238 88257 4813fa 88228->88257 88267 477145 88228->88267 88272 4755ad 88228->88272 88229 403d76 88229->87933 88229->87943 88234->87933 88235->88221 88236->88213 88237->88216 88239 46f8e7 88238->88239 88240 46f978 88238->88240 88241 46f900 88239->88241 88242 46f8ee 88239->88242 88243 46f93c 88239->88243 88244 46f91a 88239->88244 88240->88229 88245 45340c 85 API calls 88241->88245 88248 45340c 85 API calls 88242->88248 88247 45340c 85 API calls 88243->88247 88246 45340c 85 API calls 88244->88246 88245->88242 88249 46f931 88246->88249 88250 46f958 88247->88250 88251 46f971 88248->88251 88252 45340c 85 API calls 88249->88252 88252->88242 88258 45340c 85 API calls 88257->88258 88259 481438 88258->88259 88260 402880 95 API calls 88259->88260 88261 48143f 88260->88261 88262 481465 88261->88262 88263 40a780 204 API calls 88261->88263 88263->88262 88268 408e80 VariantClear 88267->88268 88269 47715a 88268->88269 88338 467ac4 88269->88338 88271 477160 88271->88229 88361 475077 88272->88361 88339 467bb8 88338->88339 88340 467adc 88338->88340 88339->88271 88341 467c1d 88340->88341 88342 467c16 88340->88342 88343 467b90 88340->88343 88344 467aed 88340->88344 88412 4533eb 88361->88412 88364 4750ee 88367 408f40 VariantClear 88364->88367 88365 475129 88416 4646e0 88365->88416 88413 453404 88412->88413 88414 4533f8 88412->88414 88413->88364 88413->88365 88414->88413 88459 4531b1 85 API calls 5 library calls 88414->88459 88459->88413 88465->87952 88467->87963 88468->87969 88469->88014 88470->88014 88471->87989 88472->88002 88473->88013 88474->87980 88475->87984 88476->87990 88477->88047 88478->88047 88479->88004 88480->87970 88481->88007 88492->87970 88493 42613b0 88507 425f000 88493->88507 88495 4261445 88510 42612a0 88495->88510 88513 4262490 GetPEB 88507->88513 88509 425f68b 88509->88495 88511 42612a9 Sleep 88510->88511 88512 42612b7 88511->88512 88514 42624ba 88513->88514 88514->88509 88515 428905 88516 4115d7 52 API calls 88515->88516 88517 42890c 88516->88517 88518 428945 88517->88518 88519 42891f 88517->88519 88521 4115d7 52 API calls 88518->88521 88520 4115d7 52 API calls 88519->88520 88522 428925 _memmove 88520->88522 88523 42894c 88521->88523 88524 42b14b 88531 40bc10 88524->88531 88526 42b159 88527 4096a0 335 API calls 88526->88527 88528 42b177 88527->88528 88542 44b92d VariantClear 88528->88542 88530 42bc5b 88532 40bc24 88531->88532 88533 40bc17 88531->88533 88535 40bc2a 88532->88535 88536 40bc3c 88532->88536 88534 408e80 VariantClear 88533->88534 88537 40bc1f 88534->88537 88538 408e80 VariantClear 88535->88538 88539 4115d7 52 API calls 88536->88539 88537->88526 88540 40bc33 88538->88540 88541 40bc43 88539->88541 88540->88526 88541->88526 88542->88530 88543 40ad09 88544 40bc10 53 API calls 88543->88544 88545 40ad1f 88544->88545 88547 40ad40 88545->88547 88550 40c1f0 88545->88550 88584 44b92d VariantClear 88547->88584 88549 42bc5b 88551 40c2c0 52 API calls 88550->88551 88552 40c21f 88551->88552 88553 42965b 88552->88553 88554 40c22a 88552->88554 88643 45e737 90 API calls 3 library calls 88553->88643 88556 40c232 88554->88556 88642 40c4e0 204 API calls 88554->88642 88557 40c23e 88556->88557 88562 429673 88556->88562 88559 40c256 88557->88559 88560 4296c7 88557->88560 88561 408e80 VariantClear 88559->88561 88645 45e737 90 API calls 3 library calls 88560->88645 88567 40c25f 88561->88567 88585 47e250 88562->88585 88565 42969a 88580 40c27c 88565->88580 88644 45e737 90 API calls 3 library calls 88565->88644 88568 429721 88567->88568 88567->88580 88646 457f66 87 API calls __write_nolock 88567->88646 88569 429753 88568->88569 88647 472f47 127 API calls 88568->88647 88572 408e80 VariantClear 88569->88572 88571 429708 88574 45340c 85 API calls 88571->88574 88575 42975f 88572->88575 88577 42970e _wcslen 88574->88577 88578 408f40 VariantClear 88575->88578 88576 429734 88579 45340c 85 API calls 88576->88579 88577->88568 88582 408e80 VariantClear 88577->88582 88578->88580 88581 42973d _wcslen 88579->88581 88580->88547 88581->88569 88583 408e80 VariantClear 88581->88583 88582->88568 88583->88569 88584->88549 88586 40bc70 52 API calls 88585->88586 88587 47e28d 88586->88587 88588 47e2ed 88587->88588 88590 47e2ae 88587->88590 88589 46fe32 VariantClear 88588->88589 88591 47e2f6 88589->88591 88592 408e80 VariantClear 88590->88592 88593 47e305 88591->88593 88594 47e319 88591->88594 88595 47e2ba 88592->88595 88596 402160 52 API calls 88593->88596 88687 40e0a0 52 API calls 88594->88687 88599 408f40 VariantClear 88595->88599 88598 47e315 88596->88598 88601 47e38e 88598->88601 88648 475a67 88598->88648 88600 47e2ca 88599->88600 88602 408f40 VariantClear 88600->88602 88676 47b291 88601->88676 88605 47e2d2 88602->88605 88609 410c60 VariantClear 88605->88609 88606 47e346 88606->88601 88607 47e34a 88606->88607 88688 45e538 90 API calls 3 library calls 88607->88688 88608 47e3b7 88612 47e3bb 88608->88612 88633 47e3ed 88608->88633 88610 47e2da 88609->88610 88613 408f40 VariantClear 88610->88613 88614 40e710 53 API calls 88612->88614 88615 47e2e2 88613->88615 88616 47e3c8 88614->88616 88615->88565 88617 40e710 53 API calls 88616->88617 88620 47e358 88617->88620 88618 47e48e 88623 47e250 235 API calls 88618->88623 88619 408f40 VariantClear 88621 47e368 88619->88621 88620->88619 88624 408f40 VariantClear 88621->88624 88622 408e80 VariantClear 88625 47e481 88622->88625 88626 47e4ae 88623->88626 88627 47e370 88624->88627 88628 40e710 53 API calls 88625->88628 88631 408f40 VariantClear 88626->88631 88629 410c60 VariantClear 88627->88629 88628->88618 88630 47e378 88629->88630 88632 408f40 VariantClear 88630->88632 88634 47e4c0 88631->88634 88635 47e380 88632->88635 88633->88618 88633->88622 88633->88633 88636 408f40 VariantClear 88634->88636 88635->88565 88637 47e4c8 88636->88637 88638 410c60 VariantClear 88637->88638 88639 47e4d0 88638->88639 88640 408f40 VariantClear 88639->88640 88641 47e4d8 88640->88641 88641->88565 88642->88556 88643->88562 88644->88580 88645->88580 88646->88571 88647->88576 88649 475ae5 88648->88649 88653 475ac5 88648->88653 88689 45e737 90 API calls 3 library calls 88649->88689 88651 475afe 88652 408f40 VariantClear 88651->88652 88657 475b06 88652->88657 88653->88649 88654 475b42 88653->88654 88655 402780 52 API calls 88653->88655 88656 402780 52 API calls 88654->88656 88655->88653 88662 475b60 88656->88662 88657->88606 88658 475c7c 88659 408f40 VariantClear 88658->88659 88663 475c84 88659->88663 88660 40c2c0 52 API calls 88660->88662 88661 40a780 204 API calls 88661->88662 88662->88658 88662->88660 88662->88661 88664 475cc7 88662->88664 88665 40ba10 52 API calls 88662->88665 88667 475cd5 88662->88667 88668 408f40 VariantClear 88662->88668 88674 475ca0 88662->88674 88690 40c4e0 204 API calls 88662->88690 88663->88606 88666 408f40 VariantClear 88664->88666 88665->88662 88671 475ca8 88666->88671 88691 45e737 90 API calls 3 library calls 88667->88691 88668->88662 88671->88606 88672 475ce8 88673 408f40 VariantClear 88672->88673 88673->88671 88675 408f40 VariantClear 88674->88675 88675->88671 88677 47b2e7 88676->88677 88678 47b2a5 88676->88678 88677->88608 88679 40e710 53 API calls 88678->88679 88680 47b2af 88679->88680 88681 47b2b7 88680->88681 88682 47b2cf 88680->88682 88692 47974b 88681->88692 88684 47974b 144 API calls 88682->88684 88686 47b2df 88684->88686 88685 47b2c7 88685->88608 88686->88608 88687->88598 88688->88620 88689->88651 88690->88662 88691->88672 88693 479786 88692->88693 88694 479aed 88692->88694 88693->88694 88697 479798 88693->88697 88761 451b42 61 API calls 88694->88761 88696 479b00 88696->88685 88698 4797a2 88697->88698 88699 4797be 88697->88699 88754 451b42 61 API calls 88698->88754 88701 4797c7 88699->88701 88702 4797e3 88699->88702 88755 451b42 61 API calls 88701->88755 88732 441eba 88702->88732 88703 4797b5 88703->88685 88706 4797da 88706->88685 88707 4797f7 88708 479815 88707->88708 88709 4797fe 88707->88709 88713 47983c 88708->88713 88737 451d2b 88708->88737 88756 451b42 61 API calls 88709->88756 88711 47980c 88711->88685 88717 4798e6 88713->88717 88748 479714 88713->88748 88714 47994b VariantInit 88719 479980 __gmtime64_s 88714->88719 88717->88714 88718 479916 VariantClear 88717->88718 88718->88717 88720 479a2c 88719->88720 88721 479a44 88719->88721 88722 479a0b 88719->88722 88758 451b42 61 API calls 88720->88758 88759 468070 104 API calls moneypunct 88721->88759 88722->88720 88723 479a12 88722->88723 88757 451b42 61 API calls 88723->88757 88727 479a24 88728 479aca VariantClear 88727->88728 88729 479adb 88728->88729 88729->88685 88730 479a50 88730->88728 88760 468070 104 API calls moneypunct 88730->88760 88733 441f12 88732->88733 88734 441ecc _wcslen 88732->88734 88733->88707 88734->88733 88735 410160 52 API calls 88734->88735 88736 441ede 88735->88736 88736->88707 88738 451d5e 88737->88738 88739 451e93 SysFreeString 88738->88739 88740 451f21 88738->88740 88741 451d68 88738->88741 88742 451ea0 88738->88742 88739->88742 88740->88742 88743 451f6d lstrcmpiW 88740->88743 88744 451f7f SysFreeString 88740->88744 88747 451fab 88740->88747 88741->88713 88742->88741 88762 44a545 RaiseException 88742->88762 88743->88744 88746 451fc7 SysFreeString 88743->88746 88744->88740 88746->88742 88747->88713 88749 479728 88748->88749 88763 479500 VariantInit 88749->88763 88751 479730 88802 437063 VariantClear VariantCopy 88751->88802 88753 47973a VariantClear 88753->88713 88754->88703 88755->88706 88756->88711 88757->88727 88758->88727 88759->88730 88760->88730 88761->88696 88762->88742 88764 47952a 88763->88764 88783 47955c 88763->88783 88765 479597 88764->88765 88766 4795c6 88764->88766 88767 479602 88764->88767 88768 4795b0 88764->88768 88770 479571 88764->88770 88771 479669 88764->88771 88774 479698 88764->88774 88776 4796b4 88764->88776 88777 4795e3 88764->88777 88781 479628 88764->88781 88782 479531 88764->88782 88764->88783 88816 443006 57 API calls 88765->88816 88775 45340c 85 API calls 88766->88775 88778 47960d VariantCopy 88767->88778 88767->88783 88817 44b3ac 57 API calls 88768->88817 88769 408f40 VariantClear 88779 4796d9 88769->88779 88787 408f40 VariantClear 88770->88787 88771->88774 88788 479676 88771->88788 88803 473b76 88774->88803 88784 4795d7 SysAllocString 88775->88784 88820 44ce43 VariantClear SafeArrayCreateVector _memmove 88776->88820 88818 479362 109 API calls 88777->88818 88780 408f40 VariantClear 88778->88780 88779->88751 88785 47961d 88780->88785 88795 479500 105 API calls 88781->88795 88786 408f40 VariantClear 88782->88786 88783->88769 88784->88783 88785->88751 88792 479551 88786->88792 88793 47958c 88787->88793 88794 408f40 VariantClear 88788->88794 88792->88751 88793->88751 88796 47968d 88794->88796 88797 479644 88795->88797 88796->88751 88819 437063 VariantClear VariantCopy 88797->88819 88799 47964b VariantClear 88800 408f40 VariantClear 88799->88800 88801 47965e 88800->88801 88801->88751 88802->88753 88821 443106 88803->88821 88806 473be0 88807 408f40 VariantClear 88806->88807 88808 473be8 88807->88808 88808->88783 88809 473b99 88823 4680ed 55 API calls 88809->88823 88811 473bb8 _memmove 88812 408f40 VariantClear 88811->88812 88813 473bcc 88812->88813 88814 408f40 VariantClear 88813->88814 88815 473bd4 88814->88815 88815->88783 88816->88783 88817->88783 88818->88783 88819->88799 88820->88783 88822 443115 SafeArrayCreateVector 88821->88822 88822->88806 88822->88809 88823->88811 88824 425b2b 88829 40f000 88824->88829 88828 425b3a 88830 4115d7 52 API calls 88829->88830 88831 40f007 88830->88831 88832 4276ea 88831->88832 88838 40f030 88831->88838 88837 41130a 51 API calls __cinit 88837->88828 88839 40f039 88838->88839 88840 40f01a 88838->88840 88868 41130a 51 API calls __cinit 88839->88868 88842 40e500 88840->88842 88843 40bc70 52 API calls 88842->88843 88844 40e515 GetVersionExW 88843->88844 88845 402160 52 API calls 88844->88845 88846 40e557 88845->88846 88869 40e660 88846->88869 88851 427674 88855 4276c6 GetSystemInfo 88851->88855 88854 40e5cd GetCurrentProcess 88890 40ef20 LoadLibraryA GetProcAddress 88854->88890 88857 4276d5 GetSystemInfo 88855->88857 88860 40e5e0 88860->88857 88883 40efd0 88860->88883 88861 40e629 88887 40ef90 88861->88887 88864 40e641 FreeLibrary 88865 40e644 88864->88865 88866 40e653 FreeLibrary 88865->88866 88867 40e656 88865->88867 88866->88867 88867->88837 88868->88840 88870 40e667 88869->88870 88871 42761d 88870->88871 88872 40c600 52 API calls 88870->88872 88873 40e55c 88872->88873 88874 40e680 88873->88874 88875 40e687 88874->88875 88876 427616 88875->88876 88877 40c600 52 API calls 88875->88877 88878 40e566 88877->88878 88878->88851 88879 40ef60 88878->88879 88880 40e5c8 88879->88880 88881 40ef66 LoadLibraryA 88879->88881 88880->88854 88880->88860 88881->88880 88882 40ef77 GetProcAddress 88881->88882 88882->88880 88884 40e620 88883->88884 88885 40efd6 LoadLibraryA 88883->88885 88884->88855 88884->88861 88885->88884 88886 40efe7 GetProcAddress 88885->88886 88886->88884 88891 40efb0 LoadLibraryA GetProcAddress 88887->88891 88889 40e632 GetNativeSystemInfo 88889->88864 88889->88865 88890->88860 88891->88889 88892 425b5e 88897 40c7f0 88892->88897 88896 425b6d 88932 40db10 52 API calls 88897->88932 88899 40c82a 88933 410ab0 6 API calls 88899->88933 88901 40c86d 88902 40bc70 52 API calls 88901->88902 88903 40c877 88902->88903 88904 40bc70 52 API calls 88903->88904 88905 40c881 88904->88905 88906 40bc70 52 API calls 88905->88906 88907 40c88b 88906->88907 88908 40bc70 52 API calls 88907->88908 88909 40c8d1 88908->88909 88910 40bc70 52 API calls 88909->88910 88911 40c991 88910->88911 88934 40d2c0 52 API calls 88911->88934 88913 40c99b 88935 40d0d0 53 API calls 88913->88935 88915 40c9c1 88916 40bc70 52 API calls 88915->88916 88917 40c9cb 88916->88917 88936 40e310 53 API calls 88917->88936 88919 40ca28 88920 408f40 VariantClear 88919->88920 88921 40ca30 88920->88921 88922 408f40 VariantClear 88921->88922 88923 40ca38 GetStdHandle 88922->88923 88924 429630 88923->88924 88925 40ca87 88923->88925 88924->88925 88926 429639 88924->88926 88931 41130a 51 API calls __cinit 88925->88931 88937 4432c0 57 API calls 88926->88937 88928 429641 88938 44b6ab CreateThread 88928->88938 88930 42964f CloseHandle 88930->88925 88931->88896 88932->88899 88933->88901 88934->88913 88935->88915 88936->88919 88937->88928 88938->88930 88939 44b5cb 58 API calls 88938->88939 88940 425b6f 88945 40dc90 88940->88945 88944 425b7e 88946 40bc70 52 API calls 88945->88946 88947 40dd03 88946->88947 88953 40f210 88947->88953 88950 40dd96 88951 40ddb7 88950->88951 88956 40dc00 52 API calls 2 library calls 88950->88956 88952 41130a 51 API calls __cinit 88951->88952 88952->88944 88957 40f250 RegOpenKeyExW 88953->88957 88955 40f230 88955->88950 88956->88950 88958 425e17 88957->88958 88959 40f275 RegQueryValueExW 88957->88959 88958->88955 88960 40f2c3 RegCloseKey 88959->88960 88961 40f298 88959->88961 88960->88955 88962 40f2a9 RegCloseKey 88961->88962 88963 425e1d 88961->88963 88962->88955
      APIs
      • _wcslen.LIBCMT ref: 004096C1
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • _memmove.LIBCMT ref: 0040970C
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
      • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
      • _memmove.LIBCMT ref: 00409D96
      • _memmove.LIBCMT ref: 0040A6C4
      • _memmove.LIBCMT ref: 004297E5
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
      • String ID:
      • API String ID: 2383988440-0
      • Opcode ID: eda493e7f635b4d651ef0572aa73cbf796ade256709b72ea31569c7d9da174e7
      • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
      • Opcode Fuzzy Hash: eda493e7f635b4d651ef0572aa73cbf796ade256709b72ea31569c7d9da174e7
      • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B

      Control-flow Graph

      APIs
      • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
        • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
        • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
        • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
        • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
        • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
        • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
      • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
      • GetFullPathNameW.KERNEL32(004A7F6C,00000104,?,004A7F50,004A7F54), ref: 0040D625
        • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
      • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
      • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
      • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
      • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
      • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
        • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
        • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
        • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
        • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
        • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
        • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
        • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
        • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
        • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
        • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
        • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
        • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
      Strings
      • This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support., xrefs: 0042E1C2
      • runas, xrefs: 0042E2AD, 0042E2DC
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
      • String ID: This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
      • API String ID: 2495805114-3383388033
      • Opcode ID: 41e582475c413773e3743a4b8e51b79ae17ec4e07ea1e63541618b073f9d51de
      • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
      • Opcode Fuzzy Hash: 41e582475c413773e3743a4b8e51b79ae17ec4e07ea1e63541618b073f9d51de
      • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1515 46cb5f-46cbc3 call 40bc70 * 3 call 408f40 1524 46cbd4-46cbe7 CLSIDFromProgID 1515->1524 1525 46cbc5-46cbcd OleInitialize 1515->1525 1526 46cc33-46cc47 1524->1526 1527 46cbe9-46cbf9 CLSIDFromString 1524->1527 1525->1524 1528 46cca6-46ccba call 458651 1526->1528 1529 46cc49-46cc60 CoCreateInstance 1526->1529 1527->1526 1530 46cbfb-46cc05 1527->1530 1533 46cc96-46cca1 1528->1533 1539 46ccbc-46ccf7 CoInitializeSecurity call 412f40 call 4311fc 1528->1539 1529->1533 1534 46cc62-46cc8b call 43119b 1529->1534 1531 46cc06-46cc30 call 451b42 call 402250 * 3 1530->1531 1533->1531 1548 46cc8e-46cc90 1534->1548 1553 46cdf4 1539->1553 1554 46ccfd-46cd1f call 402160 call 431a2b 1539->1554 1548->1533 1551 46ceb7-46cef0 call 468070 call 402250 * 3 1548->1551 1555 46cdfa-46ce4a call 412f40 CoCreateInstanceEx CoTaskMemFree 1553->1555 1567 46cd35-46cd47 call 465177 1554->1567 1568 46cd21-46cd33 1554->1568 1555->1533 1565 46ce50-46ce55 1555->1565 1565->1533 1570 46ce5b-46ce62 1565->1570 1583 46cd4a-46cda3 call 40e0a0 call 402250 call 46150f call 40e0a0 call 402250 1567->1583 1571 46cda5-46cdaa 1568->1571 1574 46ce64-46ce8b CoSetProxyBlanket 1570->1574 1575 46ce8d-46ce9e 1570->1575 1579 46cdac-46cdbb call 4111c1 1571->1579 1580 46cdbd-46cdc0 1571->1580 1574->1575 1575->1548 1578 46cea4-46ceb2 1575->1578 1578->1531 1582 46cdc3-46cdf2 1579->1582 1580->1582 1582->1555 1583->1571
      APIs
      • OleInitialize.OLE32(00000000), ref: 0046CBC7
      • CLSIDFromProgID.COMBASE(?,?), ref: 0046CBDF
      • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
      • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
      • _wcslen.LIBCMT ref: 0046CDB0
      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
      • CoTaskMemFree.OLE32(?), ref: 0046CE42
      • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
        • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
        • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
        • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
      Strings
      • NULL Pointer assignment, xrefs: 0046CEA6
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
      • String ID: NULL Pointer assignment
      • API String ID: 440038798-2785691316
      • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
      • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
      • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
      • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1986 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1995 40e582-40e583 1986->1995 1996 427674-427679 1986->1996 1999 40e585-40e596 1995->1999 2000 40e5ba-40e5cb call 40ef60 1995->2000 1997 427683-427686 1996->1997 1998 42767b-427681 1996->1998 2003 427693-427696 1997->2003 2004 427688-427691 1997->2004 2002 4276b4-4276be 1998->2002 2005 427625-427629 1999->2005 2006 40e59c-40e59f 1999->2006 2017 40e5ec-40e60c 2000->2017 2018 40e5cd-40e5e6 GetCurrentProcess call 40ef20 2000->2018 2019 4276c6-4276ca GetSystemInfo 2002->2019 2003->2002 2007 427698-4276a8 2003->2007 2004->2002 2009 427636-427640 2005->2009 2010 42762b-427631 2005->2010 2011 40e5a5-40e5ae 2006->2011 2012 427654-427657 2006->2012 2015 4276b0 2007->2015 2016 4276aa-4276ae 2007->2016 2009->2000 2010->2000 2013 40e5b4 2011->2013 2014 427645-42764f 2011->2014 2012->2000 2020 42765d-42766f 2012->2020 2013->2000 2014->2000 2015->2002 2016->2002 2022 40e612-40e623 call 40efd0 2017->2022 2023 4276d5-4276df GetSystemInfo 2017->2023 2018->2017 2029 40e5e8 2018->2029 2019->2023 2020->2000 2022->2019 2028 40e629-40e63f call 40ef90 GetNativeSystemInfo 2022->2028 2032 40e641-40e642 FreeLibrary 2028->2032 2033 40e644-40e651 2028->2033 2029->2017 2032->2033 2034 40e653-40e654 FreeLibrary 2033->2034 2035 40e656-40e65d 2033->2035 2034->2035
      APIs
      • GetVersionExW.KERNEL32(?), ref: 0040E52A
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
      • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
      • FreeLibrary.KERNEL32(?), ref: 0040E642
      • FreeLibrary.KERNEL32(?), ref: 0040E654
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
      • String ID: 0SH$ou
      • API String ID: 3363477735-1412203762
      • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
      • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
      • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
      • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
      APIs
      • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
      • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: IsThemeActive$uxtheme.dll
      • API String ID: 2574300362-3542929980
      • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
      • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
      • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
      • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
      APIs
      • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
      • FreeLibrary.KERNEL32(?), ref: 0040D78E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: FreeInfoLibraryParametersSystem
      • String ID: ou
      • API String ID: 3403648963-3837949563
      • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
      • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
      • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
      • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
      APIs
      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
      • Sleep.KERNEL32(0000000A,?), ref: 004094D1
      • TranslateMessage.USER32(?), ref: 00409556
      • DispatchMessageW.USER32(?), ref: 00409561
      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Message$Peek$DispatchSleepTranslate
      • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
      • API String ID: 1762048999-758534266
      • Opcode ID: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
      • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
      • Opcode Fuzzy Hash: f501adada9997479f36eff97a8dbeac7b9e74cdaa6692d9ba2f3cae751283df7
      • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

      Control-flow Graph

      APIs
      • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • __wcsicoll.LIBCMT ref: 00402007
      • __wcsicoll.LIBCMT ref: 0040201D
      • __wcsicoll.LIBCMT ref: 00402033
        • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
      • __wcsicoll.LIBCMT ref: 00402049
      • _wcscpy.LIBCMT ref: 0040207C
      • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104), ref: 00428B5B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
      • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$CMDLINE$CMDLINERAW
      • API String ID: 3948761352-1609664196
      • Opcode ID: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
      • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
      • Opcode Fuzzy Hash: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
      • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

      Control-flow Graph

      APIs
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
      • __wsplitpath.LIBCMT ref: 0040E41C
        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
      • _wcsncat.LIBCMT ref: 0040E433
      • __wmakepath.LIBCMT ref: 0040E44F
        • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
      • _wcscpy.LIBCMT ref: 0040E487
        • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
      • _wcscat.LIBCMT ref: 00427541
      • _wcslen.LIBCMT ref: 00427551
      • _wcslen.LIBCMT ref: 00427562
      • _wcscat.LIBCMT ref: 0042757C
      • _wcsncpy.LIBCMT ref: 004275BC
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
      • String ID: Include$\
      • API String ID: 3173733714-3429789819
      • Opcode ID: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
      • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
      • Opcode Fuzzy Hash: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
      • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

      Control-flow Graph

      APIs
      • _fseek.LIBCMT ref: 0045292B
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
        • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
        • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
      • __fread_nolock.LIBCMT ref: 00452961
      • __fread_nolock.LIBCMT ref: 00452971
      • __fread_nolock.LIBCMT ref: 0045298A
      • __fread_nolock.LIBCMT ref: 004529A5
      • _fseek.LIBCMT ref: 004529BF
      • _malloc.LIBCMT ref: 004529CA
      • _malloc.LIBCMT ref: 004529D6
      • __fread_nolock.LIBCMT ref: 004529E7
      • _free.LIBCMT ref: 00452A17
      • _free.LIBCMT ref: 00452A20
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
      • String ID:
      • API String ID: 1255752989-0
      • Opcode ID: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
      • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
      • Opcode Fuzzy Hash: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
      • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __fread_nolock$_fseek_wcscpy
      • String ID: FILE
      • API String ID: 3888824918-3121273764
      • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
      • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
      • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
      • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

      Control-flow Graph

      APIs
      • GetSysColorBrush.USER32(0000000F), ref: 004104C3
      • RegisterClassExW.USER32(00000030), ref: 004104ED
      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
      • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
      • LoadIconW.USER32(00400000,000000A9), ref: 00410542
      • ImageList_ReplaceIcon.COMCTL32(00941038,000000FF,00000000), ref: 00410552
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
      • API String ID: 2914291525-1005189915
      • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
      • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
      • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
      • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

      Control-flow Graph

      APIs
      • GetSysColorBrush.USER32(0000000F), ref: 0041039B
      • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
      • LoadIconW.USER32(?,00000063), ref: 004103C0
      • LoadIconW.USER32(?,000000A4), ref: 004103D3
      • LoadIconW.USER32(?,000000A2), ref: 004103E6
      • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
      • RegisterClassExW.USER32(?), ref: 0041045D
        • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
        • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
        • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
        • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
        • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
        • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
        • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00941038,000000FF,00000000), ref: 00410552
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
      • String ID: #$0$AutoIt v3
      • API String ID: 423443420-4155596026
      • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
      • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
      • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
      • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _malloc
      • String ID: Default
      • API String ID: 1579825452-753088835
      • Opcode ID: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
      • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
      • Opcode Fuzzy Hash: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
      • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2036 40f5c0-40f5cf call 422240 2039 40f5d0-40f5e8 2036->2039 2039->2039 2040 40f5ea-40f613 call 413650 call 410e60 2039->2040 2045 40f614-40f633 call 414d04 2040->2045 2048 40f691 2045->2048 2049 40f635-40f63c 2045->2049 2050 40f696-40f69c 2048->2050 2051 40f660-40f674 call 4150d1 2049->2051 2052 40f63e 2049->2052 2055 40f679-40f67c 2051->2055 2053 40f640 2052->2053 2056 40f642-40f650 2053->2056 2055->2045 2057 40f652-40f655 2056->2057 2058 40f67e-40f68c 2056->2058 2061 40f65b-40f65e 2057->2061 2062 425d1e-425d3e call 4150d1 call 414d04 2057->2062 2059 40f68e-40f68f 2058->2059 2060 40f69f-40f6ad 2058->2060 2059->2057 2064 40f6b4-40f6c2 2060->2064 2065 40f6af-40f6b2 2060->2065 2061->2051 2061->2053 2072 425d43-425d5f call 414d30 2062->2072 2067 425d16 2064->2067 2068 40f6c8-40f6d6 2064->2068 2065->2057 2067->2062 2070 425d05-425d0b 2068->2070 2071 40f6dc-40f6df 2068->2071 2070->2056 2073 425d11 2070->2073 2071->2057 2072->2050 2073->2067
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __fread_nolock_fseek_memmove_strcat
      • String ID: AU3!$EA06
      • API String ID: 1268643489-2658333250
      • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
      • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
      • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
      • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2076 401100-401111 2077 401113-401119 2076->2077 2078 401179-401180 2076->2078 2080 401144-40114a 2077->2080 2081 40111b-40111e 2077->2081 2078->2077 2079 401182 2078->2079 2084 40112c-401141 DefWindowProcW 2079->2084 2082 401184-40118e call 401250 2080->2082 2083 40114c-40114f 2080->2083 2081->2080 2085 401120-401126 2081->2085 2093 401193-40119a 2082->2093 2086 401151-401157 2083->2086 2087 40119d 2083->2087 2085->2084 2089 42b038-42b03f 2085->2089 2090 401219-40121f 2086->2090 2091 40115d 2086->2091 2094 4011a3-4011a9 2087->2094 2095 42afb4-42afc5 call 40f190 2087->2095 2089->2084 2092 42b045-42b059 call 401000 call 40e0c0 2089->2092 2090->2085 2098 401225-42b06d call 468b0e 2090->2098 2096 401163-401166 2091->2096 2097 42b01d-42b024 2091->2097 2092->2084 2094->2085 2101 4011af 2094->2101 2095->2093 2103 42afe9-42b018 call 40f190 call 401a50 2096->2103 2104 40116c-401172 2096->2104 2097->2084 2102 42b02a-42b033 call 4370f4 2097->2102 2098->2093 2101->2085 2108 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 2101->2108 2109 4011db-401202 SetTimer RegisterWindowMessageW 2101->2109 2102->2084 2103->2084 2104->2085 2113 401174-42afde call 45fd57 2104->2113 2109->2093 2111 401204-401216 CreatePopupMenu 2109->2111 2113->2084 2127 42afe4 2113->2127 2127->2093
      APIs
      • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
      • KillTimer.USER32(?,00000001,?), ref: 004011B9
      • PostQuitMessage.USER32(00000000), ref: 004011CB
      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
      • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
      • CreatePopupMenu.USER32 ref: 00401204
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
      • String ID: TaskbarCreated
      • API String ID: 129472671-2362178303
      • Opcode ID: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
      • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
      • Opcode Fuzzy Hash: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
      • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2128 4115d7-4115df 2129 4115ee-4115f9 call 4135bb 2128->2129 2132 4115e1-4115ec call 411988 2129->2132 2133 4115fb-4115fc 2129->2133 2132->2129 2136 4115fd-41160e 2132->2136 2137 411610-41163b call 417fc0 call 41130a 2136->2137 2138 41163c-411656 call 4180af call 418105 2136->2138 2137->2138
      APIs
      • _malloc.LIBCMT ref: 004115F1
        • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
        • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
        • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
      • std::exception::exception.LIBCMT ref: 00411626
      • std::exception::exception.LIBCMT ref: 00411640
      • __CxxThrowException@8.LIBCMT ref: 00411651
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
      • String ID: ,*H$4*H$@fI
      • API String ID: 615853336-1459471987
      • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
      • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
      • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
      • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2147 425f920-425f972 call 425f820 CreateFileW 2150 425f974-425f976 2147->2150 2151 425f97b-425f988 2147->2151 2152 425fad4-425fad8 2150->2152 2154 425f99b-425f9b2 VirtualAlloc 2151->2154 2155 425f98a-425f996 2151->2155 2156 425f9b4-425f9b6 2154->2156 2157 425f9bb-425f9e1 CreateFileW 2154->2157 2155->2152 2156->2152 2159 425fa05-425fa1f ReadFile 2157->2159 2160 425f9e3-425fa00 2157->2160 2161 425fa21-425fa3e 2159->2161 2162 425fa43-425fa47 2159->2162 2160->2152 2161->2152 2164 425fa49-425fa66 2162->2164 2165 425fa68-425fa7f WriteFile 2162->2165 2164->2152 2166 425fa81-425faa8 2165->2166 2167 425faaa-425facf CloseHandle VirtualFree 2165->2167 2166->2152 2167->2152
      APIs
      • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0425F965
      Memory Dump Source
      • Source File: 00000000.00000002.1405416150.000000000425F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0425F000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_425f000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CreateFile
      • String ID:
      • API String ID: 823142352-0
      • Opcode ID: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
      • Instruction ID: eb9ce0a0b0972de937f2bd648bdd1d757cc89c89e58554ae4580814999482ddb
      • Opcode Fuzzy Hash: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
      • Instruction Fuzzy Hash: FF51E676B60209FBEB20DFA4CD49FDE7778AF48700F118554FA0AEB180DA74A644DB64

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2177 401250-40125c 2178 401262-401293 call 412f40 call 401b80 2177->2178 2179 4012e8-4012ed 2177->2179 2184 4012d1-4012e2 KillTimer SetTimer 2178->2184 2185 401295-4012b5 2178->2185 2184->2179 2186 4012bb-4012bf 2185->2186 2187 4272ec-4272f2 2185->2187 2188 4012c5-4012cb 2186->2188 2189 42733f-427346 2186->2189 2190 4272f4-427315 Shell_NotifyIconW 2187->2190 2191 42731a-42733a Shell_NotifyIconW 2187->2191 2188->2184 2192 427393-4273b4 Shell_NotifyIconW 2188->2192 2193 427348-427369 Shell_NotifyIconW 2189->2193 2194 42736e-42738e Shell_NotifyIconW 2189->2194 2190->2184 2191->2184 2192->2184 2193->2184 2194->2184
      APIs
        • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
        • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
        • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
      • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
      • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
      • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
      • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
      • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
      • String ID:
      • API String ID: 3300667738-0
      • Opcode ID: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
      • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
      • Opcode Fuzzy Hash: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
      • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2195 40e4c0-40e4e5 call 403350 RegOpenKeyExW 2198 427190-4271ae RegQueryValueExW 2195->2198 2199 40e4eb-40e4f0 2195->2199 2200 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 2198->2200 2201 42721a-42722a RegCloseKey 2198->2201 2206 427210-427219 call 436508 2200->2206 2207 4271f7-42720e call 402160 2200->2207 2206->2201 2207->2206
      APIs
      • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
      • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: QueryValue$CloseOpen
      • String ID: Include$Software\AutoIt v3\AutoIt
      • API String ID: 1586453840-614718249
      • Opcode ID: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
      • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
      • Opcode Fuzzy Hash: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
      • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768
      APIs
      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
      • ShowWindow.USER32(?,00000000), ref: 004105E4
      • ShowWindow.USER32(?,00000000), ref: 004105EE
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Window$CreateShow
      • String ID: AutoIt v3$edit
      • API String ID: 1584632944-3779509399
      • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
      • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
      • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
      • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Variant$Copy$ClearErrorLast
      • String ID: NULL Pointer assignment$Not an Object type
      • API String ID: 2487901850-572801152
      • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
      • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
      • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
      • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
      APIs
      • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
      • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
      • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
      • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Close$OpenQueryValue
      • String ID: Control Panel\Mouse
      • API String ID: 1607946009-824357125
      • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
      • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
      • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
      • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
      APIs
      • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
      • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
      • _wcsncpy.LIBCMT ref: 004102ED
      • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
      • _wcsncpy.LIBCMT ref: 00410340
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _wcsncpy$DesktopFolderFromListMallocPath
      • String ID:
      • API String ID: 3170942423-0
      • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
      • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
      • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
      • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID: ou
      • API String ID: 0-3837949563
      • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
      • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
      • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
      • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
      APIs
        • Part of subcall function 042612A0: Sleep.KERNELBASE(000001F4), ref: 042612B1
      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 042614B1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1405416150.000000000425F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0425F000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_425f000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CreateFileSleep
      • String ID: G5EAG6WX958VOTVBW
      • API String ID: 2694422964-356871802
      • Opcode ID: 7592b9094c01eaa39fba660261aa7504dcab1bfed46e07bb7841617b4a00473a
      • Instruction ID: 58d642a8627eb4c118c79b77db0ca10a99057733035dd306be0f8c0fe5ba3502
      • Opcode Fuzzy Hash: 7592b9094c01eaa39fba660261aa7504dcab1bfed46e07bb7841617b4a00473a
      • Instruction Fuzzy Hash: 6E515331E14259DAEF11DBA4C904BFFBBB5AF44304F004199E6097B2C0D6B92B45CB65
      APIs
      • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
      • TerminateProcess.KERNEL32(00000000), ref: 004753CE
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Process$CurrentTerminate
      • String ID: ou
      • API String ID: 2429186680-3837949563
      • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
      • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
      • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
      • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
      • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
      • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
      • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
      APIs
      • VariantInit.OLEAUT32(?), ref: 0047950F
      • SysAllocString.OLEAUT32(00000000), ref: 004795D8
      • VariantCopy.OLEAUT32(?,?), ref: 0047960F
      • VariantClear.OLEAUT32(?), ref: 00479650
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Variant$AllocClearCopyInitString
      • String ID:
      • API String ID: 2808897238-0
      • Opcode ID: 81882916ed450cc42db375fcf7c21005814c176867ddcffa7bb55a60db91dd5f
      • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
      • Opcode Fuzzy Hash: 81882916ed450cc42db375fcf7c21005814c176867ddcffa7bb55a60db91dd5f
      • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memmove
      • String ID: Error:
      • API String ID: 4104443479-232661952
      • Opcode ID: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
      • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
      • Opcode Fuzzy Hash: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
      • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
      APIs
      • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
        • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
        • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
        • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
        • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
        • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
        • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
        • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
      • String ID: X$pWH
      • API String ID: 85490731-941433119
      • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
      • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
      • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
      • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
      APIs
      • _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • _memmove.LIBCMT ref: 00401B57
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
      • String ID: @EXITCODE
      • API String ID: 2734553683-3436989551
      • Opcode ID: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
      • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
      • Opcode Fuzzy Hash: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
      • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
      APIs
      • CreateProcessW.KERNELBASE(?,00000000), ref: 04260045
      • ExitProcess.KERNEL32(00000000), ref: 04260064
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1405416150.000000000425F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0425F000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_425f000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Process$CreateExit
      • String ID: D
      • API String ID: 126409537-2746444292
      • Opcode ID: 107eb1cf29a6b6651620623ade647468eaff304108e4c4019dc24045849d9433
      • Instruction ID: 3be77c17d4f378e2eeb37270abc852a783fab3b96675277dcf8c1e5e57fc0a21
      • Opcode Fuzzy Hash: 107eb1cf29a6b6651620623ade647468eaff304108e4c4019dc24045849d9433
      • Instruction Fuzzy Hash: 2AF0E171A5024CABDB60DFE0CC49FEE777DBF44705F508509BA0A9A180EA74A6489761
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __filbuf__getptd_noexit__read_memcpy_s
      • String ID:
      • API String ID: 1794320848-0
      • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
      • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
      • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
      • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
      APIs
      • _malloc.LIBCMT ref: 0043214B
        • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
        • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
        • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
      • _malloc.LIBCMT ref: 0043215D
      • _malloc.LIBCMT ref: 0043216F
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _malloc$AllocateHeap
      • String ID:
      • API String ID: 680241177-0
      • Opcode ID: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
      • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
      • Opcode Fuzzy Hash: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
      • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
      APIs
      • TranslateMessage.USER32(?), ref: 00409556
      • DispatchMessageW.USER32(?), ref: 00409561
      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Message$DispatchPeekTranslate
      • String ID:
      • API String ID: 4217535847-0
      • Opcode ID: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
      • Instruction ID: 9fbe2eaaa5ffb99098057fa667d4f29c0aa55754a5137076743fac66577e99fa
      • Opcode Fuzzy Hash: ced410c349f54cf5afb894e4facd1df4a4f56f438d67fe37ea70020fd5d89546
      • Instruction Fuzzy Hash: D8F05431554300AAE624D7A18D41F9B76A89F98784F40482EB641962E1EB78D444CB5A
      APIs
        • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
      • _free.LIBCMT ref: 004295A0
        • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
        • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
        • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
        • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
        • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
        • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
      • String ID: >>>AUTOIT SCRIPT<<<
      • API String ID: 3938964917-2806939583
      • Opcode ID: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
      • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
      • Opcode Fuzzy Hash: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
      • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
      Strings
      • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _strcat
      • String ID: >>>AUTOIT NO CMDEXECUTE<<<
      • API String ID: 1765576173-2684727018
      • Opcode ID: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
      • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
      • Opcode Fuzzy Hash: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
      • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: std::exception::exception$Exception@8Throw_malloc
      • String ID:
      • API String ID: 2388904642-0
      • Opcode ID: a8f24528f927109c8065283381f5436dcba8e7e674e4c75accfe302fec651a92
      • Instruction ID: c9d0c8d414f76a6b08ea65189b173eda5e9afecf2ea9a4a3f4bd99c20d85b193
      • Opcode Fuzzy Hash: a8f24528f927109c8065283381f5436dcba8e7e674e4c75accfe302fec651a92
      • Instruction Fuzzy Hash: 37F1BE75A001099BCB14EF55CA895EEB375EF04304F60443BE905772E1DBBCAE86CB9A
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ClearVariant
      • String ID:
      • API String ID: 1473721057-0
      • Opcode ID: 026107fac7c7bcdbca34bd1b77142632d6848c7cf36883952a1fde06c325d7df
      • Instruction ID: 76271617df0236ab3ccd2777984eb13d60b28668e4953fb9a85eec064aa2abc3
      • Opcode Fuzzy Hash: 026107fac7c7bcdbca34bd1b77142632d6848c7cf36883952a1fde06c325d7df
      • Instruction Fuzzy Hash: F891A370A00204DFDB14DF65D884AAAB3B5EF09304F24C56BE915AB391D739EC41CBAE
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6cc5b8d8df15f9e0ef64a75d4efc6b0a4b5787d7574181736057e5700da8ea1b
      • Instruction ID: 87b54257044150471c739d151235b364616bdb39e4aa39848fe8ade81c39f20a
      • Opcode Fuzzy Hash: 6cc5b8d8df15f9e0ef64a75d4efc6b0a4b5787d7574181736057e5700da8ea1b
      • Instruction Fuzzy Hash: 0E519371A00105EBCB14DFA5C8C1EABB7A8AF48344F1481AEF905AB692D77CED45C798
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memmove
      • String ID:
      • API String ID: 4104443479-0
      • Opcode ID: 275534035a012e7ef0db215d78f24564d6aa5c775b6c55b3817692144b07e5e7
      • Instruction ID: 2565b1472f88146c75409e19c065a4aacb94a5f6c219594ae44f545f2623c2f3
      • Opcode Fuzzy Hash: 275534035a012e7ef0db215d78f24564d6aa5c775b6c55b3817692144b07e5e7
      • Instruction Fuzzy Hash: 85412871D00104AFDB10AF15C881BAE7B74AF4670CF14C05AFA055B342E63DA946CBAA
      APIs
        • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
        • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
        • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
      • _strcat.LIBCMT ref: 0040F786
        • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
        • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
      • String ID:
      • API String ID: 3199840319-0
      • Opcode ID: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
      • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
      • Opcode Fuzzy Hash: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
      • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
      APIs
      • SafeArrayCreateVector.OLEAUT32(00000011,00000000,00000000), ref: 00473B8D
      • _memmove.LIBCMT ref: 00473BBD
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ArrayCreateSafeVector_memmove
      • String ID:
      • API String ID: 564309351-0
      • Opcode ID: 927860ad1d610d876ffb5b648d8578c5aeccaab6c37d476698ef8c4dfd3a4d25
      • Instruction ID: 457454d8b13899d86e5be62d6fbacd9c0d8eef3db234b15496ed66e70df05eda
      • Opcode Fuzzy Hash: 927860ad1d610d876ffb5b648d8578c5aeccaab6c37d476698ef8c4dfd3a4d25
      • Instruction Fuzzy Hash: AC018F7790011C66D600FA6AEC429EB776CDB80355F00057FFE05A6142EE39AA5982F9
      APIs
        • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
      • __lock_file.LIBCMT ref: 00414A8D
        • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
      • __fclose_nolock.LIBCMT ref: 00414A98
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
      • String ID:
      • API String ID: 2800547568-0
      • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
      • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
      • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
      • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
      APIs
      • __lock_file.LIBCMT ref: 00415012
      • __ftell_nolock.LIBCMT ref: 0041501F
        • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __ftell_nolock__getptd_noexit__lock_file
      • String ID:
      • API String ID: 2999321469-0
      • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
      • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
      • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
      • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
      APIs
      • VariantClear.OLEAUT32(00479459), ref: 0043706B
      • VariantCopy.OLEAUT32(00479459,00470E7C), ref: 00437076
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Variant$ClearCopy
      • String ID:
      • API String ID: 274517740-0
      • Opcode ID: 175bde5d7e7200bdd07dee29e64fa583f54bc1cc1ed7ce2c810a0693f5fbc3f8
      • Instruction ID: 04f5bc28fb39dc4d651aca37f2cae7a6fb773616424f01e3c31b72a906b86de5
      • Opcode Fuzzy Hash: 175bde5d7e7200bdd07dee29e64fa583f54bc1cc1ed7ce2c810a0693f5fbc3f8
      • Instruction Fuzzy Hash: 76C01236001128BB46016B99EC08CDF775CEE096617008011FD0483101C770A90087F9
      APIs
        • Part of subcall function 0425F8E0: GetFileAttributesW.KERNELBASE(?), ref: 0425F8EB
      • CreateDirectoryW.KERNELBASE(?,00000000), ref: 0426019F
      Memory Dump Source
      • Source File: 00000000.00000002.1405416150.000000000425F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0425F000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_425f000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: AttributesCreateDirectoryFile
      • String ID:
      • API String ID: 3401506121-0
      • Opcode ID: 03fc0fe4d1d363b5bcaae60523602935eda57b3942cc4ea03ef92dbbedc34ea2
      • Instruction ID: 2a9f1dc5b33dc614e82897d46787952a0431484420879647a244fa1a3ad96cbb
      • Opcode Fuzzy Hash: 03fc0fe4d1d363b5bcaae60523602935eda57b3942cc4ea03ef92dbbedc34ea2
      • Instruction Fuzzy Hash: BE519931A2020997EF14EFB0C954BEF7379EF58300F0045A9A509E7190EB75AB48CB65
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memmove
      • String ID:
      • API String ID: 4104443479-0
      • Opcode ID: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
      • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
      • Opcode Fuzzy Hash: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
      • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memmove
      • String ID:
      • API String ID: 4104443479-0
      • Opcode ID: 8b2818c8434b9a070bb7a9b9dd55d4aa8d61190f7c46d4f62081b3e0e63eee4f
      • Instruction ID: 412edbf2df7bf8c64f36b821a583ca4e96a0f18e0b9aed18a790d0e499aeb9a1
      • Opcode Fuzzy Hash: 8b2818c8434b9a070bb7a9b9dd55d4aa8d61190f7c46d4f62081b3e0e63eee4f
      • Instruction Fuzzy Hash: 60319CB9600A21EFC714DF19C580A62F7E0FF08310B14C57ADA89CB795E774E892CB99
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ProtectVirtual
      • String ID:
      • API String ID: 544645111-0
      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
      • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
      • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
      • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
      • Opcode Fuzzy Hash: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
      • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __lock_file
      • String ID:
      • API String ID: 3031932315-0
      • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
      • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
      • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
      • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
      APIs
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
      • _memmove.LIBCMT ref: 00428939
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: std::exception::exception$Exception@8Throw_malloc_memmove
      • String ID:
      • API String ID: 620504543-0
      • Opcode ID: c9c70bfe2459166c40d63b9fe27fba0aac42174d62b0a7f28c569f684cc4c908
      • Instruction ID: c2064c2796ab03ff69418e3c62d92c7a192424b86f475a5c46dd96dfc8171558
      • Opcode Fuzzy Hash: c9c70bfe2459166c40d63b9fe27fba0aac42174d62b0a7f28c569f684cc4c908
      • Instruction Fuzzy Hash: 27011DB46005509FDB00DF5DD891F5677A1AF8A308F14819DE2098F366DA36E846CB92
      APIs
        • Part of subcall function 00479500: VariantInit.OLEAUT32(?), ref: 0047950F
        • Part of subcall function 00437063: VariantClear.OLEAUT32(00479459), ref: 0043706B
        • Part of subcall function 00437063: VariantCopy.OLEAUT32(00479459,00470E7C), ref: 00437076
      • VariantClear.OLEAUT32(?), ref: 0047973E
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Variant$Clear$CopyInit
      • String ID:
      • API String ID: 24293632-0
      • Opcode ID: 0a6f2c8fe72e55b9553011708fdcca806f77a23cbb8e20867b9cb7d7c1d06051
      • Instruction ID: ce75823fad5ab463881ca656a32c684f825172ff923cb7d6b6c05433a05b9d1b
      • Opcode Fuzzy Hash: 0a6f2c8fe72e55b9553011708fdcca806f77a23cbb8e20867b9cb7d7c1d06051
      • Instruction Fuzzy Hash: C4E012B251010C6B8704FBFDDDC6CAFB7BCFB18204B80495DB919A3142EA75A914C7E9
      APIs
      • GetFileAttributesW.KERNELBASE(?), ref: 0425F8EB
      Memory Dump Source
      • Source File: 00000000.00000002.1405416150.000000000425F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0425F000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_425f000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: AttributesFile
      • String ID:
      • API String ID: 3188754299-0
      • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
      • Instruction ID: d009ad121fcabd02c3b350bf2ec8e26a88696476f7e3790a999f62c355cba62f
      • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
      • Instruction Fuzzy Hash: DDE08C31B2560DEBCB20DAA8CA08AB973A8DB04320F114654EC1AC3690E530AA40E698
      APIs
      • GetFileAttributesW.KERNELBASE(?), ref: 0425F8BB
      Memory Dump Source
      • Source File: 00000000.00000002.1405416150.000000000425F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0425F000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_425f000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: AttributesFile
      • String ID:
      • API String ID: 3188754299-0
      • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
      • Instruction ID: c18ded4d35fb4861184d07c91a328d46a4f9063b863ab2f25cd03be01d51cad4
      • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
      • Instruction Fuzzy Hash: 2AD0A731B1620CEBCB10CFB49D089DA73A8DF04320F004765FD15C7280D671A9409750
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __wfsopen
      • String ID:
      • API String ID: 197181222-0
      • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
      • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
      • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
      • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ClearVariant
      • String ID:
      • API String ID: 1473721057-0
      • Opcode ID: dd957122352b2a24994cc76c0a2fe1c6bdbe155a2543db358ff03b8863c1f765
      • Instruction ID: 4c453d13d2013f2e1e26a6480b89871b610256b9520be3dfcd5ee63b17ce12d0
      • Opcode Fuzzy Hash: dd957122352b2a24994cc76c0a2fe1c6bdbe155a2543db358ff03b8863c1f765
      • Instruction Fuzzy Hash: 52C09B714156204F5350DF7DF84C98777D4EF0D214341C97FD059C2510E6B458414F94
      APIs
      • Sleep.KERNELBASE(000001F4), ref: 042612B1
      Memory Dump Source
      • Source File: 00000000.00000002.1405416150.000000000425F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0425F000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_425f000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Sleep
      • String ID:
      • API String ID: 3472027048-0
      • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
      • Instruction ID: dc8cd2789faf391a715f6262ab19e439a29c26621b749274d36a36bcbce4458d
      • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
      • Instruction Fuzzy Hash: A1E0BF7494010EEFDB00EFA4D9496EE7BB4EF04711F1005A1FD05D7680DB309E648A62
      APIs
      • Sleep.KERNELBASE(000001F4), ref: 042612B1
      Memory Dump Source
      • Source File: 00000000.00000002.1405416150.000000000425F000.00000040.00000020.00020000.00000000.sdmp, Offset: 0425F000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_425f000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Sleep
      • String ID:
      • API String ID: 3472027048-0
      • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
      • Instruction ID: 2ad6a212f8ce7f0be5c02d314775069152a997fdd04af7119df0ed08cda3d895
      • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
      • Instruction Fuzzy Hash: 9DE0E67494010EDFDB00EFB4D9496AE7FF4EF04701F100561FD01D2280DA309D608A62
      APIs
      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
      • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
      • GetKeyState.USER32(00000011), ref: 0047C92D
      • GetKeyState.USER32(00000009), ref: 0047C936
      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
      • GetKeyState.USER32(00000010), ref: 0047C953
      • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
      • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
      • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
      • _wcsncpy.LIBCMT ref: 0047CA29
      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
      • SendMessageW.USER32 ref: 0047CA7F
      • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
      • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
      • ImageList_SetDragCursorImage.COMCTL32(00941038,00000000,00000000,00000000), ref: 0047CB9B
      • ImageList_BeginDrag.COMCTL32(00941038,00000000,000000F8,000000F0), ref: 0047CBAC
      • SetCapture.USER32(?), ref: 0047CBB6
      • ClientToScreen.USER32(?,?), ref: 0047CC17
      • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
      • ReleaseCapture.USER32 ref: 0047CC3A
      • GetCursorPos.USER32(?), ref: 0047CC72
      • ScreenToClient.USER32(?,?), ref: 0047CC80
      • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
      • SendMessageW.USER32 ref: 0047CD12
      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
      • SendMessageW.USER32 ref: 0047CD80
      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
      • GetCursorPos.USER32(?), ref: 0047CDC8
      • ScreenToClient.USER32(?,?), ref: 0047CDD6
      • GetParent.USER32(00000000), ref: 0047CDF7
      • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
      • SendMessageW.USER32 ref: 0047CE93
      • ClientToScreen.USER32(?,?), ref: 0047CEEE
      • TrackPopupMenuEx.USER32(?,00000000,?,?,02DF1AC0,00000000,?,?,?,?), ref: 0047CF1C
      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
      • SendMessageW.USER32 ref: 0047CF6B
      • ClientToScreen.USER32(?,?), ref: 0047CFB5
      • TrackPopupMenuEx.USER32(?,00000080,?,?,02DF1AC0,00000000,?,?,?,?), ref: 0047CFE6
      • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
      • String ID: @GUI_DRAGID$F
      • API String ID: 3100379633-4164748364
      • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
      • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
      • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
      • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
      APIs
      • GetForegroundWindow.USER32 ref: 00434420
      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
      • IsIconic.USER32(?), ref: 0043444F
      • ShowWindow.USER32(?,00000009), ref: 0043445C
      • SetForegroundWindow.USER32(?), ref: 0043446A
      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
      • GetCurrentThreadId.KERNEL32 ref: 00434485
      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
      • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
      • SetForegroundWindow.USER32(00000000), ref: 004344B7
      • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
      • keybd_event.USER32(00000012,00000000), ref: 004344CF
      • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
      • keybd_event.USER32(00000012,00000000), ref: 004344E6
      • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
      • keybd_event.USER32(00000012,00000000), ref: 004344FD
      • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
      • keybd_event.USER32(00000012,00000000), ref: 00434514
      • SetForegroundWindow.USER32(00000000), ref: 0043451E
      • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
      • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
      • String ID: Shell_TrayWnd
      • API String ID: 2889586943-2988720461
      • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
      • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
      • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
      • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
      APIs
      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
      • CloseHandle.KERNEL32(?), ref: 004463A0
      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
      • GetProcessWindowStation.USER32 ref: 004463D1
      • SetProcessWindowStation.USER32(00000000), ref: 004463DB
      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
      • _wcslen.LIBCMT ref: 00446498
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • _wcsncpy.LIBCMT ref: 004464C0
      • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
      • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
      • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,?,?,?,000F01FF,00000400), ref: 00446522
      • UnloadUserProfile.USERENV(?,?), ref: 00446555
      • CloseWindowStation.USER32(00000000), ref: 0044656C
      • CloseDesktop.USER32(?), ref: 0044657A
      • SetProcessWindowStation.USER32(?), ref: 00446588
      • CloseHandle.KERNEL32(?), ref: 00446592
      • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
      • String ID: $@OH$default$winsta0
      • API String ID: 3324942560-3791954436
      • Opcode ID: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
      • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
      • Opcode Fuzzy Hash: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
      • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
      APIs
        • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
        • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
        • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
        • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
        • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
      • _wcscat.LIBCMT ref: 0044BD94
      • _wcscat.LIBCMT ref: 0044BDBD
      • __wsplitpath.LIBCMT ref: 0044BDEA
      • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
      • _wcscpy.LIBCMT ref: 0044BE71
      • _wcscat.LIBCMT ref: 0044BE83
      • _wcscat.LIBCMT ref: 0044BE95
      • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
      • DeleteFileW.KERNEL32(?), ref: 0044BED3
      • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
      • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
      • DeleteFileW.KERNEL32(?), ref: 0044BF15
      • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
      • FindClose.KERNEL32(00000000), ref: 0044BF33
      • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
      • FindClose.KERNEL32(00000000), ref: 0044BF7C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
      • String ID: \*.*
      • API String ID: 2188072990-1173974218
      • Opcode ID: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
      • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
      • Opcode Fuzzy Hash: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
      • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
      APIs
      • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
      • FindClose.KERNEL32(00000000), ref: 00478924
      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
      • __swprintf.LIBCMT ref: 004789D3
      • __swprintf.LIBCMT ref: 00478A1D
      • __swprintf.LIBCMT ref: 00478A4B
      • __swprintf.LIBCMT ref: 00478A79
        • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
        • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
      • __swprintf.LIBCMT ref: 00478AA7
      • __swprintf.LIBCMT ref: 00478AD5
      • __swprintf.LIBCMT ref: 00478B03
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
      • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
      • API String ID: 999945258-2428617273
      • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
      • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
      • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
      • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
      • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
      • __wsplitpath.LIBCMT ref: 00403492
        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
      • _wcscpy.LIBCMT ref: 004034A7
      • _wcscat.LIBCMT ref: 004034BC
      • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
        • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
        • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
      • _wcscpy.LIBCMT ref: 004035A0
      • _wcslen.LIBCMT ref: 00403623
      • _wcslen.LIBCMT ref: 0040367D
      Strings
      • Error opening the file, xrefs: 00428231
      • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
      • Unterminated string, xrefs: 00428348
      • _, xrefs: 0040371C
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
      • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
      • API String ID: 3393021363-188983378
      • Opcode ID: 8f97009b1bf37824170bfd28a55259835aaf6cf29f8ea0c932b2b617a2771f3f
      • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
      • Opcode Fuzzy Hash: 8f97009b1bf37824170bfd28a55259835aaf6cf29f8ea0c932b2b617a2771f3f
      • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
      APIs
      • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
      • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
      • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
      • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
      • FindClose.KERNEL32(00000000), ref: 00431B20
      • FindClose.KERNEL32(00000000), ref: 00431B34
      • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
      • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
      • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
      • FindClose.KERNEL32(00000000), ref: 00431BCD
      • FindClose.KERNEL32(00000000), ref: 00431BDB
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
      • String ID: *.*
      • API String ID: 1409584000-438819550
      • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
      • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
      • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
      • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
      APIs
      • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
      • __swprintf.LIBCMT ref: 00431C2E
      • _wcslen.LIBCMT ref: 00431C3A
      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
      • String ID: :$\$\??\%s
      • API String ID: 2192556992-3457252023
      • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
      • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
      • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
      • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
      APIs
      • GetLocalTime.KERNEL32(?), ref: 004722A2
      • __swprintf.LIBCMT ref: 004722B9
      • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
      • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
      • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
      • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
      • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
      • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
      • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
      • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
      • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: FolderPath$LocalTime__swprintf
      • String ID: %.3d
      • API String ID: 3337348382-986655627
      • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
      • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
      • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
      • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
      APIs
      • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
      • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
      • FindClose.KERNEL32(00000000), ref: 0044291C
      • FindClose.KERNEL32(00000000), ref: 00442930
      • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
      • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
      • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
      • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
      • FindClose.KERNEL32(00000000), ref: 004429D4
        • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
      • FindClose.KERNEL32(00000000), ref: 004429E2
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
      • String ID: *.*
      • API String ID: 2640511053-438819550
      • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
      • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
      • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
      • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
      APIs
      • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
      • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
      • GetLastError.KERNEL32 ref: 00433414
      • ExitWindowsEx.USER32(?,00000000), ref: 00433437
      • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
      • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
      • String ID: SeShutdownPrivilege
      • API String ID: 2938487562-3733053543
      • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
      • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
      • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
      • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
      APIs
        • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
        • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
        • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
        • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
      • GetLengthSid.ADVAPI32(?), ref: 004461D0
      • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
      • GetLengthSid.ADVAPI32(?), ref: 00446241
      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
      • CopySid.ADVAPI32(00000000), ref: 00446271
      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
      • String ID:
      • API String ID: 1255039815-0
      • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
      • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
      • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
      • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
      APIs
      • __swprintf.LIBCMT ref: 00433073
      • __swprintf.LIBCMT ref: 00433085
      • __wcsicoll.LIBCMT ref: 00433092
      • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
      • LoadResource.KERNEL32(?,00000000), ref: 004330BD
      • LockResource.KERNEL32(00000000), ref: 004330CA
      • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
      • LoadResource.KERNEL32(?,00000000), ref: 00433105
      • SizeofResource.KERNEL32(?,00000000), ref: 00433114
      • LockResource.KERNEL32(?), ref: 00433120
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
      • String ID:
      • API String ID: 1158019794-0
      • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
      • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
      • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
      • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
      • String ID:
      • API String ID: 1737998785-0
      • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
      • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
      • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
      • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D627
      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
      • GetLastError.KERNEL32 ref: 0045D6BF
      • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Error$Mode$DiskFreeLastSpace
      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
      • API String ID: 4194297153-14809454
      • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
      • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
      • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
      • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memmove$_strncmp
      • String ID: @oH$\$^$h
      • API String ID: 2175499884-3701065813
      • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
      • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
      • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
      • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
      APIs
      • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
      • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
      • bind.WSOCK32(00000000,?,00000010), ref: 00465356
      • WSAGetLastError.WSOCK32(00000000), ref: 00465363
      • closesocket.WSOCK32(00000000,00000000), ref: 00465377
      • listen.WSOCK32(00000000,00000005), ref: 00465381
      • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
      • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ErrorLast$closesocket$bindlistensocket
      • String ID:
      • API String ID: 540024437-0
      • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
      • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
      • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
      • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID: ERCP$VUUU$VUUU$VUUU$XjH
      • API String ID: 0-2872873767
      • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
      • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
      • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
      • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
      APIs
      • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
      • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
      • __wsplitpath.LIBCMT ref: 00475644
        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
      • _wcscat.LIBCMT ref: 00475657
      • __wcsicoll.LIBCMT ref: 0047567B
      • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
      • CloseHandle.KERNEL32(00000000), ref: 004756BA
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
      • String ID:
      • API String ID: 2547909840-0
      • Opcode ID: 66fbdd7d2143bc3ea17fb0b89755d5829eeb71157ddfe2517e7fed7a99b972a8
      • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
      • Opcode Fuzzy Hash: 66fbdd7d2143bc3ea17fb0b89755d5829eeb71157ddfe2517e7fed7a99b972a8
      • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
      • Sleep.KERNEL32(0000000A), ref: 0045250B
      • FindNextFileW.KERNEL32(?,?), ref: 004525E9
      • FindClose.KERNEL32(?), ref: 004525FF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
      • String ID: *.*$\VH
      • API String ID: 2786137511-2657498754
      • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
      • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
      • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
      • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
      APIs
      • IsDebuggerPresent.KERNEL32 ref: 00421FC1
      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
      • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
      • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
      • TerminateProcess.KERNEL32(00000000), ref: 00422004
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
      • String ID: pqI
      • API String ID: 2579439406-2459173057
      • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
      • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
      • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
      • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
      APIs
      • __wcsicoll.LIBCMT ref: 00433349
      • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
      • __wcsicoll.LIBCMT ref: 00433375
      • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __wcsicollmouse_event
      • String ID: DOWN
      • API String ID: 1033544147-711622031
      • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
      • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
      • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
      • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
      APIs
      • GetKeyboardState.USER32(?), ref: 0044C3D2
      • SetKeyboardState.USER32(00000080), ref: 0044C3F6
      • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
      • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
      • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: KeyboardMessagePostState$InputSend
      • String ID:
      • API String ID: 3031425849-0
      • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
      • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
      • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
      • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
      APIs
        • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
      • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
      • WSAGetLastError.WSOCK32(00000000), ref: 00476692
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ErrorLastinet_addrsocket
      • String ID:
      • API String ID: 4170576061-0
      • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
      • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
      • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
      • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
      APIs
        • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
      • IsWindowVisible.USER32 ref: 0047A368
      • IsWindowEnabled.USER32 ref: 0047A378
      • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
      • IsIconic.USER32 ref: 0047A393
      • IsZoomed.USER32 ref: 0047A3A1
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Window$EnabledForegroundIconicVisibleZoomed
      • String ID:
      • API String ID: 292994002-0
      • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
      • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
      • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
      • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
      APIs
      • OpenClipboard.USER32(?), ref: 0046DCE7
      • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
      • GetClipboardData.USER32(0000000D), ref: 0046DD01
      • CloseClipboard.USER32 ref: 0046DD0D
      • GlobalLock.KERNEL32(00000000), ref: 0046DD37
      • CloseClipboard.USER32 ref: 0046DD41
      • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
      • GetClipboardData.USER32(00000001), ref: 0046DD8D
      • CloseClipboard.USER32 ref: 0046DD99
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
      • String ID:
      • API String ID: 15083398-0
      • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
      • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
      • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
      • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memmove
      • String ID: U$\
      • API String ID: 4104443479-100911408
      • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
      • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
      • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
      • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
      APIs
      • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
      • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
      • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Find$File$CloseFirstNext
      • String ID:
      • API String ID: 3541575487-0
      • Opcode ID: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
      • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
      • Opcode Fuzzy Hash: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
      • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
      APIs
      • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
      • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
      • FindClose.KERNEL32(00000000), ref: 004339EB
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: FileFind$AttributesCloseFirst
      • String ID:
      • API String ID: 48322524-0
      • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
      • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
      • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
      • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
      APIs
      • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
      • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
        • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Internet$AvailableDataErrorFileLastQueryRead
      • String ID:
      • API String ID: 901099227-0
      • Opcode ID: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
      • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
      • Opcode Fuzzy Hash: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
      • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
      APIs
      • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Proc
      • String ID:
      • API String ID: 2346855178-0
      • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
      • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
      • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
      • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
      APIs
      • BlockInput.USER32(00000001), ref: 0045A38B
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: BlockInput
      • String ID:
      • API String ID: 3456056419-0
      • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
      • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
      • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
      • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
      APIs
      • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: LogonUser
      • String ID:
      • API String ID: 1244722697-0
      • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
      • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
      • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
      • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
      APIs
      • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: NameUser
      • String ID:
      • API String ID: 2645101109-0
      • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
      • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
      • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
      • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
      APIs
      • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ExceptionFilterUnhandled
      • String ID:
      • API String ID: 3192549508-0
      • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
      • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
      • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
      • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID: N@
      • API String ID: 0-1509896676
      • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
      • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
      • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
      • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
      • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
      • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
      • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
      • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
      • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
      • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
      • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
      • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
      • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
      • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
      • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
      • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
      APIs
      • DeleteObject.GDI32(?), ref: 0045953B
      • DeleteObject.GDI32(?), ref: 00459551
      • DestroyWindow.USER32(?), ref: 00459563
      • GetDesktopWindow.USER32 ref: 00459581
      • GetWindowRect.USER32(00000000), ref: 00459588
      • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
      • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
      • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
      • GetClientRect.USER32(00000000,?), ref: 004596F8
      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
      • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
      • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
      • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
      • GlobalLock.KERNEL32(00000000), ref: 0045978F
      • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
      • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
      • CloseHandle.KERNEL32(00000000), ref: 004597AC
      • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
      • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
      • GlobalFree.KERNEL32(00000000), ref: 004597E2
      • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
      • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
      • ShowWindow.USER32(?,00000004), ref: 00459865
      • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
      • GetStockObject.GDI32(00000011), ref: 004598CD
      • SelectObject.GDI32(00000000,00000000), ref: 004598D5
      • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
      • DeleteDC.GDI32(00000000), ref: 004598F8
      • _wcslen.LIBCMT ref: 00459916
      • _wcscpy.LIBCMT ref: 0045993A
      • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
      • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
      • GetDC.USER32(00000000), ref: 004599FC
      • SelectObject.GDI32(00000000,?), ref: 00459A0C
      • SelectObject.GDI32(00000000,00000007), ref: 00459A37
      • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
      • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
      • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
      • String ID: $AutoIt v3$DISPLAY$static
      • API String ID: 4040870279-2373415609
      • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
      • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
      • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
      • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
      APIs
      • GetSysColor.USER32(00000012), ref: 0044181E
      • SetTextColor.GDI32(?,?), ref: 00441826
      • GetSysColorBrush.USER32(0000000F), ref: 0044183D
      • GetSysColor.USER32(0000000F), ref: 00441849
      • SetBkColor.GDI32(?,?), ref: 00441864
      • SelectObject.GDI32(?,?), ref: 00441874
      • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
      • GetSysColor.USER32(00000010), ref: 004418B2
      • CreateSolidBrush.GDI32(00000000), ref: 004418B9
      • FrameRect.USER32(?,?,00000000), ref: 004418CA
      • DeleteObject.GDI32(?), ref: 004418D5
      • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
      • FillRect.USER32(?,?,?), ref: 00441970
        • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
        • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
        • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
        • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
        • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
        • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
        • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
        • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
        • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
        • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
        • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
        • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
        • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
      • String ID:
      • API String ID: 69173610-0
      • Opcode ID: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
      • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
      • Opcode Fuzzy Hash: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
      • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
      APIs
      • DestroyWindow.USER32(?), ref: 004590F2
      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
      • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
      • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
      • GetClientRect.USER32(00000000,?), ref: 0045924E
      • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
      • GetStockObject.GDI32(00000011), ref: 004592AC
      • SelectObject.GDI32(00000000,00000000), ref: 004592B4
      • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
      • DeleteDC.GDI32(00000000), ref: 004592D6
      • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
      • GetStockObject.GDI32(00000011), ref: 004593D3
      • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
      • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
      • API String ID: 2910397461-517079104
      • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
      • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
      • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
      • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __wcsnicmp
      • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
      • API String ID: 1038674560-3360698832
      • Opcode ID: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
      • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
      • Opcode Fuzzy Hash: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
      • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
      APIs
      • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
      • SetCursor.USER32(00000000), ref: 0043075B
      • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
      • SetCursor.USER32(00000000), ref: 00430773
      • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
      • SetCursor.USER32(00000000), ref: 0043078B
      • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
      • SetCursor.USER32(00000000), ref: 004307A3
      • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
      • SetCursor.USER32(00000000), ref: 004307BB
      • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
      • SetCursor.USER32(00000000), ref: 004307D3
      • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
      • SetCursor.USER32(00000000), ref: 004307EB
      • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
      • SetCursor.USER32(00000000), ref: 00430803
      • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
      • SetCursor.USER32(00000000), ref: 0043081B
      • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
      • SetCursor.USER32(00000000), ref: 00430833
      • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
      • SetCursor.USER32(00000000), ref: 0043084B
      • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
      • SetCursor.USER32(00000000), ref: 00430863
      • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
      • SetCursor.USER32(00000000), ref: 0043087B
      • SetCursor.USER32(00000000), ref: 00430887
      • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
      • SetCursor.USER32(00000000), ref: 0043089F
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Cursor$Load
      • String ID:
      • API String ID: 1675784387-0
      • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
      • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
      • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
      • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
      APIs
      • GetSysColor.USER32(0000000E), ref: 00430913
      • SetTextColor.GDI32(?,00000000), ref: 0043091B
      • GetSysColor.USER32(00000012), ref: 00430933
      • SetTextColor.GDI32(?,?), ref: 0043093B
      • GetSysColorBrush.USER32(0000000F), ref: 0043094E
      • GetSysColor.USER32(0000000F), ref: 00430959
      • CreateSolidBrush.GDI32(?), ref: 00430962
      • GetSysColor.USER32(00000011), ref: 00430979
      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
      • SelectObject.GDI32(?,00000000), ref: 0043099C
      • SetBkColor.GDI32(?,?), ref: 004309A6
      • SelectObject.GDI32(?,?), ref: 004309B4
      • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
      • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
      • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
      • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
      • DrawFocusRect.USER32(?,?), ref: 00430A91
      • GetSysColor.USER32(00000011), ref: 00430A9F
      • SetTextColor.GDI32(?,00000000), ref: 00430AA7
      • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
      • SelectObject.GDI32(?,?), ref: 00430AD0
      • DeleteObject.GDI32(00000105), ref: 00430ADC
      • SelectObject.GDI32(?,?), ref: 00430AE3
      • DeleteObject.GDI32(?), ref: 00430AE9
      • SetTextColor.GDI32(?,?), ref: 00430AF0
      • SetBkColor.GDI32(?,?), ref: 00430AFB
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
      • String ID:
      • API String ID: 1582027408-0
      • Opcode ID: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
      • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
      • Opcode Fuzzy Hash: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
      • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
      APIs
      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
      • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
      • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CloseConnectCreateRegistry
      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
      • API String ID: 3217815495-966354055
      • Opcode ID: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
      • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
      • Opcode Fuzzy Hash: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
      • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
      APIs
      • GetCursorPos.USER32(?), ref: 004566AE
      • GetDesktopWindow.USER32 ref: 004566C3
      • GetWindowRect.USER32(00000000), ref: 004566CA
      • GetWindowLongW.USER32(?,000000F0), ref: 00456722
      • GetWindowLongW.USER32(?,000000F0), ref: 00456735
      • DestroyWindow.USER32(?), ref: 00456746
      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
      • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
      • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
      • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
      • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
      • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
      • IsWindowVisible.USER32(?), ref: 0045682C
      • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
      • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
      • GetWindowRect.USER32(?,?), ref: 00456873
      • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
      • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
      • CopyRect.USER32(?,?), ref: 004568BE
      • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
      • String ID: ($,$tooltips_class32
      • API String ID: 225202481-3320066284
      • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
      • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
      • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
      • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
      APIs
      • OpenClipboard.USER32(?), ref: 0046DCE7
      • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
      • GetClipboardData.USER32(0000000D), ref: 0046DD01
      • CloseClipboard.USER32 ref: 0046DD0D
      • GlobalLock.KERNEL32(00000000), ref: 0046DD37
      • CloseClipboard.USER32 ref: 0046DD41
      • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
      • GetClipboardData.USER32(00000001), ref: 0046DD8D
      • CloseClipboard.USER32 ref: 0046DD99
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
      • String ID:
      • API String ID: 15083398-0
      • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
      • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
      • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
      • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
      APIs
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • GetWindowRect.USER32(?,?), ref: 00471CF7
      • GetClientRect.USER32(?,?), ref: 00471D05
      • GetSystemMetrics.USER32(00000007), ref: 00471D0D
      • GetSystemMetrics.USER32(00000008), ref: 00471D20
      • GetSystemMetrics.USER32(00000004), ref: 00471D42
      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
      • GetSystemMetrics.USER32(00000007), ref: 00471D79
      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
      • GetSystemMetrics.USER32(00000008), ref: 00471DAB
      • GetSystemMetrics.USER32(00000004), ref: 00471DCF
      • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
      • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
      • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
      • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
      • GetClientRect.USER32(?,?), ref: 00471E8A
      • GetStockObject.GDI32(00000011), ref: 00471EA6
      • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
      • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
      • String ID: @$AutoIt v3 GUI
      • API String ID: 867697134-3359773793
      • Opcode ID: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
      • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
      • Opcode Fuzzy Hash: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
      • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
      • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
      • API String ID: 1503153545-1459072770
      • Opcode ID: 76acf26b61918e0ebafe3e9c460c5efedcc98b6992261bc6c4f6588f91b2aee1
      • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
      • Opcode Fuzzy Hash: 76acf26b61918e0ebafe3e9c460c5efedcc98b6992261bc6c4f6588f91b2aee1
      • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __wcsicoll$__wcsnicmp
      • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
      • API String ID: 790654849-32604322
      • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
      • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
      • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
      • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
      • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
      • Opcode Fuzzy Hash: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
      • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
      APIs
        • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
      • _fseek.LIBCMT ref: 00452B3B
      • __wsplitpath.LIBCMT ref: 00452B9B
      • _wcscpy.LIBCMT ref: 00452BB0
      • _wcscat.LIBCMT ref: 00452BC5
      • __wsplitpath.LIBCMT ref: 00452BEF
      • _wcscat.LIBCMT ref: 00452C07
      • _wcscat.LIBCMT ref: 00452C1C
      • __fread_nolock.LIBCMT ref: 00452C53
      • __fread_nolock.LIBCMT ref: 00452C64
      • __fread_nolock.LIBCMT ref: 00452C83
      • __fread_nolock.LIBCMT ref: 00452C94
      • __fread_nolock.LIBCMT ref: 00452CB5
      • __fread_nolock.LIBCMT ref: 00452CC6
      • __fread_nolock.LIBCMT ref: 00452CD7
      • __fread_nolock.LIBCMT ref: 00452CE8
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
        • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
        • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
        • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
      • __fread_nolock.LIBCMT ref: 00452D78
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
      • String ID:
      • API String ID: 2054058615-0
      • Opcode ID: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
      • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
      • Opcode Fuzzy Hash: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
      • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66
      APIs
      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Window
      • String ID: 0
      • API String ID: 2353593579-4108050209
      • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
      • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
      • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
      • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
      APIs
      • GetSysColor.USER32(0000000F), ref: 0044A05E
      • GetClientRect.USER32(?,?), ref: 0044A0D1
      • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
      • GetWindowDC.USER32(?), ref: 0044A0F6
      • GetPixel.GDI32(00000000,?,?), ref: 0044A108
      • ReleaseDC.USER32(?,?), ref: 0044A11B
      • GetSysColor.USER32(0000000F), ref: 0044A131
      • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
      • GetSysColor.USER32(0000000F), ref: 0044A14F
      • GetSysColor.USER32(00000005), ref: 0044A15B
      • GetWindowDC.USER32(?), ref: 0044A1BE
      • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
      • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
      • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
      • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
      • ReleaseDC.USER32(?,00000000), ref: 0044A229
      • SetBkColor.GDI32(?,00000000), ref: 0044A24C
      • GetSysColor.USER32(00000008), ref: 0044A265
      • SetTextColor.GDI32(?,00000000), ref: 0044A270
      • SetBkMode.GDI32(?,00000001), ref: 0044A282
      • GetStockObject.GDI32(00000005), ref: 0044A28A
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
      • String ID:
      • API String ID: 1744303182-0
      • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
      • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
      • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
      • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
      APIs
      • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
      • __mtterm.LIBCMT ref: 00417C34
        • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
        • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
        • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
        • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
      • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
      • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
      • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
      • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
      • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
      • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
      • __init_pointers.LIBCMT ref: 00417CE6
      • __calloc_crt.LIBCMT ref: 00417D54
      • GetCurrentThreadId.KERNEL32 ref: 00417D80
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
      • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
      • API String ID: 4163708885-3819984048
      • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
      • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
      • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
      • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID: >>>AUTOIT SCRIPT<<<$\
      • API String ID: 0-1896584978
      • Opcode ID: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
      • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
      • Opcode Fuzzy Hash: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
      • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __wcsicoll$IconLoad
      • String ID: blank$info$question$stop$warning
      • API String ID: 2485277191-404129466
      • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
      • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
      • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
      • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
      APIs
      • LoadIconW.USER32(?,00000063), ref: 0045464C
      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
      • SetWindowTextW.USER32(?,?), ref: 00454678
      • GetDlgItem.USER32(?,000003EA), ref: 00454690
      • SetWindowTextW.USER32(00000000,?), ref: 00454697
      • GetDlgItem.USER32(?,000003E9), ref: 004546A8
      • SetWindowTextW.USER32(00000000,?), ref: 004546AF
      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
      • GetWindowRect.USER32(?,?), ref: 004546F5
      • SetWindowTextW.USER32(?,?), ref: 00454765
      • GetDesktopWindow.USER32 ref: 0045476F
      • GetWindowRect.USER32(00000000), ref: 00454776
      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
      • GetClientRect.USER32(?,?), ref: 004547D2
      • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
      • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
      • String ID:
      • API String ID: 3869813825-0
      • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
      • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
      • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
      • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
      APIs
      • _wcslen.LIBCMT ref: 00464B28
      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
      • _wcslen.LIBCMT ref: 00464C28
      • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
      • _wcslen.LIBCMT ref: 00464CBA
      • _wcslen.LIBCMT ref: 00464CD0
      • _wcslen.LIBCMT ref: 00464CEF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _wcslen$Directory$CurrentSystem
      • String ID: D
      • API String ID: 1914653954-2746444292
      • Opcode ID: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
      • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
      • Opcode Fuzzy Hash: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
      • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
      APIs
      • _wcsncpy.LIBCMT ref: 0045CE39
      • __wsplitpath.LIBCMT ref: 0045CE78
      • _wcscat.LIBCMT ref: 0045CE8B
      • _wcscat.LIBCMT ref: 0045CE9E
      • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
        • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
      • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
      • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
      • _wcscpy.LIBCMT ref: 0045CF61
      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
      • String ID: *.*
      • API String ID: 1153243558-438819550
      • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
      • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
      • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
      • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __wcsicoll
      • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
      • API String ID: 3832890014-4202584635
      • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
      • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
      • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
      • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
      APIs
      • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
      • GetFocus.USER32 ref: 0046A0DD
      • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
      • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessagePost$CtrlFocus
      • String ID: 0
      • API String ID: 1534620443-4108050209
      • Opcode ID: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
      • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
      • Opcode Fuzzy Hash: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
      • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
      APIs
      • DestroyWindow.USER32(?), ref: 004558E3
      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Window$CreateDestroy
      • String ID: ,$tooltips_class32
      • API String ID: 1109047481-3856767331
      • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
      • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
      • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
      • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
      APIs
      • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
      • GetMenuItemCount.USER32(?), ref: 00468C45
      • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
      • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
      • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
      • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
      • GetMenuItemCount.USER32 ref: 00468CFD
      • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
      • GetCursorPos.USER32(?), ref: 00468D3F
      • SetForegroundWindow.USER32(?), ref: 00468D49
      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
      • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
      • String ID: 0
      • API String ID: 1441871840-4108050209
      • Opcode ID: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
      • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
      • Opcode Fuzzy Hash: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
      • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
      APIs
      • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
      • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
      • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
      • __swprintf.LIBCMT ref: 00460915
      • __swprintf.LIBCMT ref: 0046092D
      • _wprintf.LIBCMT ref: 004609E1
      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
      • API String ID: 3631882475-2268648507
      • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
      • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
      • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
      • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
      APIs
      • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
      • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
      • SendMessageW.USER32 ref: 00471740
      • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
      • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
      • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
      • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
      • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
      • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
      • SendMessageW.USER32 ref: 0047184F
      • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
      • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
      • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
      • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
      • String ID:
      • API String ID: 4116747274-0
      • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
      • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
      • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
      • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
      APIs
      • GetClassNameW.USER32(?,?,00000100), ref: 00461678
      • _wcslen.LIBCMT ref: 00461683
      • __swprintf.LIBCMT ref: 00461721
      • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
      • GetClassNameW.USER32(?,?,00000400), ref: 00461811
      • GetDlgCtrlID.USER32(?), ref: 00461869
      • GetWindowRect.USER32(?,?), ref: 004618A4
      • GetParent.USER32(?), ref: 004618C3
      • ScreenToClient.USER32(00000000), ref: 004618CA
      • GetClassNameW.USER32(?,?,00000100), ref: 00461941
      • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
      • String ID: %s%u
      • API String ID: 1899580136-679674701
      • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
      • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
      • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
      • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
      APIs
      • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
      • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
      • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: InfoItemMenu$Sleep
      • String ID: 0
      • API String ID: 1196289194-4108050209
      • Opcode ID: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
      • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
      • Opcode Fuzzy Hash: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
      • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
      APIs
      • GetDC.USER32(00000000), ref: 0043143E
      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
      • CreateCompatibleDC.GDI32(00000000), ref: 00431459
      • SelectObject.GDI32(00000000,?), ref: 00431466
      • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
      • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
      • String ID: (
      • API String ID: 3300687185-3887548279
      • Opcode ID: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
      • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
      • Opcode Fuzzy Hash: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
      • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
      APIs
        • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
        • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
      • GetDriveTypeW.KERNEL32 ref: 0045DB32
      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
      • API String ID: 1976180769-4113822522
      • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
      • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
      • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
      • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _wcslen$_wcsncpy$LocalTime__fassign
      • String ID:
      • API String ID: 461458858-0
      • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
      • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
      • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
      • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
      APIs
      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
      • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
      • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
      • GlobalLock.KERNEL32(00000000), ref: 004300F6
      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
      • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
      • CloseHandle.KERNEL32(00000000), ref: 00430113
      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
      • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
      • GlobalFree.KERNEL32(00000000), ref: 00430150
      • GetObjectW.GDI32(?,00000018,?), ref: 00430177
      • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
      • DeleteObject.GDI32(?), ref: 004301D0
      • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
      • String ID:
      • API String ID: 3969911579-0
      • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
      • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
      • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
      • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
      • String ID: 0
      • API String ID: 956284711-4108050209
      • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
      • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
      • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
      • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
      • String ID: 0.0.0.0
      • API String ID: 1965227024-3771769585
      • Opcode ID: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
      • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
      • Opcode Fuzzy Hash: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
      • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
      APIs
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: SendString$_memmove_wcslen
      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
      • API String ID: 369157077-1007645807
      • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
      • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
      • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
      • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
      APIs
      • GetParent.USER32 ref: 00445BF8
      • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
      • __wcsicoll.LIBCMT ref: 00445C33
      • __wcsicoll.LIBCMT ref: 00445C4F
      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __wcsicoll$ClassMessageNameParentSend
      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
      • API String ID: 3125838495-3381328864
      • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
      • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
      • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
      • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
      APIs
      • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
      • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
      • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
      • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
      • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
      • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
      • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
      • SendMessageW.USER32(?,00000402,?), ref: 00449399
      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSend$CharNext
      • String ID:
      • API String ID: 1350042424-0
      • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
      • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
      • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
      • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
      APIs
        • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
        • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
      • GetDriveTypeW.KERNEL32(?), ref: 004787B9
      • _wcscpy.LIBCMT ref: 004787E5
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: BuffCharDriveLowerType_wcscpy_wcslen
      • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
      • API String ID: 3052893215-2127371420
      • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
      • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
      • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
      • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
      APIs
      • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
      • __swprintf.LIBCMT ref: 0045E7F7
      • _wprintf.LIBCMT ref: 0045E8B3
      • _wprintf.LIBCMT ref: 0045E8D7
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
      • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
      • API String ID: 2295938435-2354261254
      • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
      • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
      • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
      • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __swprintf_wcscpy$__i64tow__itow
      • String ID: %.15g$0x%p$False$True
      • API String ID: 3038501623-2263619337
      • Opcode ID: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
      • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
      • Opcode Fuzzy Hash: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
      • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
      APIs
      • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
      • __swprintf.LIBCMT ref: 0045E5F6
      • _wprintf.LIBCMT ref: 0045E6A3
      • _wprintf.LIBCMT ref: 0045E6C7
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
      • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
      • API String ID: 2295938435-8599901
      • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
      • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
      • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
      • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
      APIs
      • timeGetTime.WINMM ref: 00443B67
        • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
      • Sleep.KERNEL32(0000000A), ref: 00443B9F
      • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00443BC8
      • SetActiveWindow.USER32(?), ref: 00443BEC
      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
      • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00443C22
      • Sleep.KERNEL32(000000FA), ref: 00443C2D
      • IsWindow.USER32(?), ref: 00443C3A
      • EndDialog.USER32(?,00000000), ref: 00443C4C
        • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
        • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
        • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
      • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
      • String ID: BUTTON
      • API String ID: 1834419854-3405671355
      • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
      • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
      • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
      • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
      APIs
      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
      • LoadStringW.USER32(00000000), ref: 00454040
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • _wprintf.LIBCMT ref: 00454074
      • __swprintf.LIBCMT ref: 004540A3
      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
      • API String ID: 455036304-4153970271
      • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
      • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
      • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
      • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
      APIs
      • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
      • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
      • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
      • _memmove.LIBCMT ref: 00467EB8
      • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
      • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
      • _memmove.LIBCMT ref: 00467F6C
      • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
      • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
        • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
        • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
      • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
      • String ID:
      • API String ID: 2170234536-0
      • Opcode ID: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
      • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
      • Opcode Fuzzy Hash: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
      • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
      APIs
      • GetKeyboardState.USER32(?), ref: 00453CE0
      • SetKeyboardState.USER32(?), ref: 00453D3B
      • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
      • GetKeyState.USER32(000000A0), ref: 00453D75
      • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
      • GetKeyState.USER32(000000A1), ref: 00453DB5
      • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
      • GetKeyState.USER32(00000011), ref: 00453DEF
      • GetAsyncKeyState.USER32(00000012), ref: 00453E18
      • GetKeyState.USER32(00000012), ref: 00453E26
      • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
      • GetKeyState.USER32(0000005B), ref: 00453E5D
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: State$Async$Keyboard
      • String ID:
      • API String ID: 541375521-0
      • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
      • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
      • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
      • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
      APIs
      • GetDlgItem.USER32(?,00000001), ref: 004357DB
      • GetWindowRect.USER32(00000000,?), ref: 004357ED
      • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
      • GetDlgItem.USER32(?,00000002), ref: 0043586A
      • GetWindowRect.USER32(00000000,?), ref: 0043587C
      • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
      • GetDlgItem.USER32(?,000003E9), ref: 004358DC
      • GetWindowRect.USER32(00000000,?), ref: 004358EE
      • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
      • GetDlgItem.USER32(?,000003EA), ref: 00435941
      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
      • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Window$ItemMoveRect$Invalidate
      • String ID:
      • API String ID: 3096461208-0
      • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
      • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
      • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
      • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
      APIs
      • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
      • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
      • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
      • DeleteObject.GDI32(?), ref: 0047151E
      • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
      • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
      • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
      • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
      • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
      • DeleteObject.GDI32(?), ref: 004715EA
      • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
      • String ID:
      • API String ID: 3218148540-0
      • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
      • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
      • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
      • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
      • String ID:
      • API String ID: 136442275-0
      • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
      • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
      • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
      • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
      APIs
      • _wcsncpy.LIBCMT ref: 00467490
      • _wcsncpy.LIBCMT ref: 004674BC
        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
      • _wcstok.LIBCMT ref: 004674FF
        • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
      • _wcstok.LIBCMT ref: 004675B2
      • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
      • _wcslen.LIBCMT ref: 00467793
      • _wcscpy.LIBCMT ref: 00467641
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      • _wcslen.LIBCMT ref: 004677BD
      • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
        • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
      • String ID: X
      • API String ID: 3104067586-3081909835
      • Opcode ID: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
      • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
      • Opcode Fuzzy Hash: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
      • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
      APIs
      • GetClassNameW.USER32(?,?,00000400), ref: 00461056
      • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
      • _wcslen.LIBCMT ref: 004610A3
      • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
      • GetClassNameW.USER32(?,?,00000400), ref: 00461124
      • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
      • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
      • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
      • GetWindowRect.USER32(?,?), ref: 00461248
        • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
      • String ID: ThumbnailClass
      • API String ID: 4136854206-1241985126
      • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
      • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
      • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
      • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
      APIs
      • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
      • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
      • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
      • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
      • GetClientRect.USER32(?,?), ref: 00471A1A
      • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
      • DestroyIcon.USER32(?), ref: 00471AF4
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
      • String ID: 2
      • API String ID: 1331449709-450215437
      • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
      • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
      • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
      • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
      APIs
      • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
      • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
      • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
      • __swprintf.LIBCMT ref: 00460915
      • __swprintf.LIBCMT ref: 0046092D
      • _wprintf.LIBCMT ref: 004609E1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
      • API String ID: 3054410614-2561132961
      • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
      • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
      • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
      • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
      APIs
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
      • CLSIDFromString.OLE32(?,?), ref: 004587B3
      • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
      • RegCloseKey.ADVAPI32(?), ref: 004587C5
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
      • API String ID: 600699880-22481851
      • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
      • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
      • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
      • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: DestroyWindow
      • String ID: static
      • API String ID: 3375834691-2160076837
      • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
      • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
      • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
      • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D959
      • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ErrorMode$DriveType
      • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
      • API String ID: 2907320926-3566645568
      • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
      • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
      • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
      • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
      APIs
        • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
      • DestroyAcceleratorTable.USER32(?), ref: 0047094A
      • ImageList_Destroy.COMCTL32(?), ref: 004709AD
      • ImageList_Destroy.COMCTL32(?), ref: 004709C5
      • ImageList_Destroy.COMCTL32(?), ref: 004709D5
      • DeleteObject.GDI32(006F0000), ref: 00470A04
      • DestroyIcon.USER32(003D0074), ref: 00470A1C
      • DeleteObject.GDI32(E63F945B), ref: 00470A34
      • DestroyWindow.USER32(003A0043), ref: 00470A4C
      • DestroyIcon.USER32(?), ref: 00470A73
      • DestroyIcon.USER32(?), ref: 00470A81
      • KillTimer.USER32(00000000,00000000), ref: 00470B00
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
      • String ID:
      • API String ID: 1237572874-0
      • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
      • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
      • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
      • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
      APIs
      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
      • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
      • VariantInit.OLEAUT32(?), ref: 004793E1
      • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
      • VariantCopy.OLEAUT32(?,?), ref: 00479461
      • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
      • VariantClear.OLEAUT32(?), ref: 00479489
      • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
      • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
      • VariantClear.OLEAUT32(?), ref: 004794CA
      • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
      • String ID:
      • API String ID: 2706829360-0
      • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
      • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
      • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
      • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
      APIs
      • GetKeyboardState.USER32(?), ref: 0044480E
      • GetAsyncKeyState.USER32(000000A0), ref: 00444899
      • GetKeyState.USER32(000000A0), ref: 004448AA
      • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
      • GetKeyState.USER32(000000A1), ref: 004448D9
      • GetAsyncKeyState.USER32(00000011), ref: 004448F5
      • GetKeyState.USER32(00000011), ref: 00444903
      • GetAsyncKeyState.USER32(00000012), ref: 0044491F
      • GetKeyState.USER32(00000012), ref: 0044492D
      • GetAsyncKeyState.USER32(0000005B), ref: 00444949
      • GetKeyState.USER32(0000005B), ref: 00444958
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: State$Async$Keyboard
      • String ID:
      • API String ID: 541375521-0
      • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
      • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
      • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
      • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: InitVariant$_malloc_wcscpy_wcslen
      • String ID:
      • API String ID: 3413494760-0
      • Opcode ID: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
      • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
      • Opcode Fuzzy Hash: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
      • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: AddressProc_free_malloc$_strcat_strlen
      • String ID: AU3_FreeVar
      • API String ID: 2634073740-771828931
      • Opcode ID: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
      • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
      • Opcode Fuzzy Hash: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
      • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
      APIs
      • CoInitialize.OLE32 ref: 0046C63A
      • CoUninitialize.OLE32 ref: 0046C645
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
        • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
        • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
      • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
      • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
      • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
      • IIDFromString.OLE32(?,?), ref: 0046C705
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
      • API String ID: 2294789929-1287834457
      • Opcode ID: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
      • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
      • Opcode Fuzzy Hash: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
      • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
      APIs
        • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
        • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
        • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
        • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
      • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
      • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
      • ImageList_EndDrag.COMCTL32 ref: 00471169
      • ReleaseCapture.USER32 ref: 0047116F
      • SetWindowTextW.USER32(?,00000000), ref: 00471206
      • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
      • String ID: @GUI_DRAGFILE$@GUI_DROPID
      • API String ID: 2483343779-2107944366
      • Opcode ID: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
      • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
      • Opcode Fuzzy Hash: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
      • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
      APIs
      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
      • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
      • _wcslen.LIBCMT ref: 00450720
      • _wcscat.LIBCMT ref: 00450733
      • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
      • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSend$Window_wcscat_wcslen
      • String ID: -----$SysListView32
      • API String ID: 4008455318-3975388722
      • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
      • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
      • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
      • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
      • GetDlgCtrlID.USER32(00000000), ref: 00469C84
      • GetParent.USER32 ref: 00469C98
      • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
      • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
      • GetParent.USER32 ref: 00469CBC
      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSend$CtrlParent$_memmove_wcslen
      • String ID: ComboBox$ListBox
      • API String ID: 2360848162-1403004172
      • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
      • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
      • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
      • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
      • String ID:
      • API String ID: 262282135-0
      • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
      • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
      • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
      • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
      APIs
      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
      • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
      • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
      • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
      • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
      • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
      • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSend$LongWindow
      • String ID:
      • API String ID: 312131281-0
      • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
      • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
      • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
      • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
      APIs
        • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
      • SendMessageW.USER32(760923D0,00001001,00000000,?), ref: 00448E16
      • SendMessageW.USER32(760923D0,00001026,00000000,?), ref: 00448E25
        • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSend$BrushCreateDeleteObjectSolid
      • String ID:
      • API String ID: 3771399671-0
      • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
      • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
      • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
      • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
      APIs
      • GetCurrentThreadId.KERNEL32 ref: 00434643
      • GetForegroundWindow.USER32(00000000), ref: 00434655
      • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
      • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
      • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
      • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
      • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
      • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
      • String ID:
      • API String ID: 2156557900-0
      • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
      • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
      • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
      • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
      • API String ID: 0-1603158881
      • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
      • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
      • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
      • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
      APIs
      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
      • DestroyWindow.USER32(?), ref: 00426F50
      • UnregisterHotKey.USER32(?), ref: 00426F77
      • FreeLibrary.KERNEL32(?), ref: 0042701F
      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
      • String ID: close all$ou
      • API String ID: 4174999648-2099725088
      • Opcode ID: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
      • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
      • Opcode Fuzzy Hash: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
      • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
      APIs
      • CreateMenu.USER32 ref: 00448603
      • SetMenu.USER32(?,00000000), ref: 00448613
      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
      • IsMenu.USER32(?), ref: 004486AB
      • CreatePopupMenu.USER32 ref: 004486B5
      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
      • DrawMenuBar.USER32 ref: 004486F5
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Menu$CreateItem$DrawInfoInsertPopup
      • String ID: 0
      • API String ID: 161812096-4108050209
      • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
      • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
      • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
      • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
      • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
      • Opcode Fuzzy Hash: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
      • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
      • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
      • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
      • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
      APIs
        • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
        • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
      • lstrcmpiW.KERNEL32(?,?), ref: 00453900
      • MoveFileW.KERNEL32(?,?), ref: 00453932
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: File$AttributesFullMoveNamePathlstrcmpi
      • String ID:
      • API String ID: 978794511-0
      • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
      • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
      • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
      • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
      • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
      • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
      • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ClearVariant
      • String ID:
      • API String ID: 1473721057-0
      • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
      • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
      • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
      • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memmove$_memcmp
      • String ID: '$\$h
      • API String ID: 2205784470-1303700344
      • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
      • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
      • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
      • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
      APIs
      • VariantInit.OLEAUT32(00000000), ref: 0045EA56
      • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
      • VariantClear.OLEAUT32 ref: 0045EA6D
      • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
      • __swprintf.LIBCMT ref: 0045EC33
      • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
      Strings
      • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Variant$InitTime$ClearCopySystem__swprintf
      • String ID: %4d%02d%02d%02d%02d%02d
      • API String ID: 2441338619-1568723262
      • Opcode ID: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
      • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
      • Opcode Fuzzy Hash: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
      • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
      APIs
      • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
      • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
      • Sleep.KERNEL32(0000000A), ref: 0042C67F
      • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
      • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Interlocked$DecrementIncrement$Sleep
      • String ID: @COM_EVENTOBJ
      • API String ID: 327565842-2228938565
      • Opcode ID: 7a6a6944b375bdcf2396f9f34e6abe7c386284c5530abc4d8420471013998a44
      • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
      • Opcode Fuzzy Hash: 7a6a6944b375bdcf2396f9f34e6abe7c386284c5530abc4d8420471013998a44
      • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
      APIs
      • VariantClear.OLEAUT32(?), ref: 0047031B
      • VariantClear.OLEAUT32(?), ref: 0047044F
      • VariantInit.OLEAUT32(?), ref: 004704A3
      • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
      • VariantClear.OLEAUT32(?), ref: 00470516
        • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
      • VariantCopy.OLEAUT32(?,?), ref: 0047057A
        • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
      • VariantClear.OLEAUT32(00000000), ref: 0047060D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Variant$Clear$Copy$CallDispFuncInit
      • String ID: H
      • API String ID: 3613100350-2852464175
      • Opcode ID: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
      • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
      • Opcode Fuzzy Hash: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
      • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
      APIs
      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
      • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
      • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
      • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
      • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
        • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
      • String ID:
      • API String ID: 1291720006-3916222277
      • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
      • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
      • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
      • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
      APIs
      • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
      • IsMenu.USER32(?), ref: 0045FC5F
      • CreatePopupMenu.USER32 ref: 0045FC97
      • GetMenuItemCount.USER32(?), ref: 0045FCFD
      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Menu$Item$CountCreateInfoInsertPopup
      • String ID: 0$2
      • API String ID: 93392585-3793063076
      • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
      • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
      • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
      • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
      APIs
      • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
      • VariantClear.OLEAUT32(?), ref: 00435320
      • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
      • VariantClear.OLEAUT32(?), ref: 004353B3
      • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
      • String ID: crts
      • API String ID: 586820018-3724388283
      • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
      • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
      • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
      • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
      APIs
        • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
      • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
      • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
      • _wcscat.LIBCMT ref: 0044BCAF
      • _wcslen.LIBCMT ref: 0044BCBB
      • _wcslen.LIBCMT ref: 0044BCD1
      • SHFileOperationW.SHELL32(?), ref: 0044BD17
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
      • String ID: \*.*
      • API String ID: 2326526234-1173974218
      • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
      • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
      • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
      • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
      APIs
        • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
      • _wcslen.LIBCMT ref: 004335F2
      • GetFileAttributesW.KERNEL32(?), ref: 0043361C
      • GetLastError.KERNEL32 ref: 0043362B
      • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
      • _wcsrchr.LIBCMT ref: 00433666
        • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
      • String ID: \
      • API String ID: 321622961-2967466578
      • Opcode ID: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
      • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
      • Opcode Fuzzy Hash: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
      • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __wcsnicmp
      • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
      • API String ID: 1038674560-2734436370
      • Opcode ID: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
      • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
      • Opcode Fuzzy Hash: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
      • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
      APIs
      • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,004A7F6C), ref: 00434057
      • LoadStringW.USER32(00000000), ref: 00434060
      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
      • LoadStringW.USER32(00000000), ref: 00434078
      • _wprintf.LIBCMT ref: 004340A1
      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
      Strings
      • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: HandleLoadModuleString$Message_wprintf
      • String ID: %s (%d) : ==> %s: %s %s
      • API String ID: 3648134473-3128320259
      • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
      • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
      • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
      • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
      APIs
      • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
      • __lock.LIBCMT ref: 00417981
        • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
        • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
        • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
      • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
      • __lock.LIBCMT ref: 004179A2
      • ___addlocaleref.LIBCMT ref: 004179C0
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
      • String ID: KERNEL32.DLL$pI
      • API String ID: 637971194-197072765
      • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
      • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
      • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
      • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memmove$_malloc
      • String ID:
      • API String ID: 1938898002-0
      • Opcode ID: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
      • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
      • Opcode Fuzzy Hash: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
      • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
      APIs
      • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
      • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
      • _memmove.LIBCMT ref: 0044B555
      • _memmove.LIBCMT ref: 0044B578
      • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
      • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
      • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
      • String ID:
      • API String ID: 2737351978-0
      • Opcode ID: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
      • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
      • Opcode Fuzzy Hash: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
      • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
      APIs
      • ___set_flsgetvalue.LIBCMT ref: 0041523A
      • __calloc_crt.LIBCMT ref: 00415246
      • __getptd.LIBCMT ref: 00415253
      • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
      • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
      • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
      • _free.LIBCMT ref: 0041529E
      • __dosmaperr.LIBCMT ref: 004152A9
        • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
      • String ID:
      • API String ID: 3638380555-0
      • Opcode ID: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
      • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
      • Opcode Fuzzy Hash: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
      • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
      APIs
      • VariantInit.OLEAUT32(?), ref: 0046C96E
        • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
        • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Variant$Copy$ClearErrorInitLast
      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
      • API String ID: 3207048006-625585964
      • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
      • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
      • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
      • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
      APIs
      • WSAStartup.WSOCK32(00000101,?), ref: 00465559
        • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
      • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
      • gethostbyname.WSOCK32(?), ref: 004655A6
      • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
      • _memmove.LIBCMT ref: 004656CA
      • GlobalFree.KERNEL32(00000000), ref: 0046575C
      • WSACleanup.WSOCK32 ref: 00465762
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
      • String ID:
      • API String ID: 2945290962-0
      • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
      • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
      • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
      • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
      APIs
      • GetSystemMetrics.USER32(0000000F), ref: 00440527
      • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
      • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
      • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
      • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
      • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
      • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
      • String ID:
      • API String ID: 1457242333-0
      • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
      • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
      • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
      • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ConnectRegistry_memmove_wcslen
      • String ID:
      • API String ID: 15295421-0
      • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
      • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
      • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
      • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
      APIs
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      • _wcstok.LIBCMT ref: 004675B2
        • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
      • _wcscpy.LIBCMT ref: 00467641
      • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
      • _wcslen.LIBCMT ref: 00467793
      • _wcslen.LIBCMT ref: 004677BD
        • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
      • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
      • String ID: X
      • API String ID: 780548581-3081909835
      • Opcode ID: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
      • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
      • Opcode Fuzzy Hash: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
      • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
      APIs
        • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
        • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
        • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
      • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
      • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
      • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
      • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
      • CloseFigure.GDI32(?), ref: 0044751F
      • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
      • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
      • String ID:
      • API String ID: 4082120231-0
      • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
      • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
      • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
      • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
      APIs
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
      • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
      • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
      • RegCloseKey.ADVAPI32(?), ref: 0046B49D
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
      • String ID:
      • API String ID: 2027346449-0
      • Opcode ID: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
      • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
      • Opcode Fuzzy Hash: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
      • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
      APIs
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
        • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
      • GetMenu.USER32 ref: 0047A703
      • GetMenuItemCount.USER32(00000000), ref: 0047A74F
      • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
      • _wcslen.LIBCMT ref: 0047A79E
      • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
      • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
      • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
      • String ID:
      • API String ID: 3257027151-0
      • Opcode ID: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
      • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
      • Opcode Fuzzy Hash: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
      • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
      APIs
      • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
      • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ErrorLastselect
      • String ID:
      • API String ID: 215497628-0
      • Opcode ID: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
      • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
      • Opcode Fuzzy Hash: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
      • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
      APIs
      • GetParent.USER32(?), ref: 0044443B
      • GetKeyboardState.USER32(?), ref: 00444450
      • SetKeyboardState.USER32(?), ref: 004444A4
      • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
      • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
      • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessagePost$KeyboardState$Parent
      • String ID:
      • API String ID: 87235514-0
      • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
      • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
      • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
      • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
      APIs
      • GetParent.USER32(?), ref: 00444633
      • GetKeyboardState.USER32(?), ref: 00444648
      • SetKeyboardState.USER32(?), ref: 0044469C
      • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
      • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
      • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
      • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessagePost$KeyboardState$Parent
      • String ID:
      • API String ID: 87235514-0
      • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
      • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
      • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
      • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
      APIs
      • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
      • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
      • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
      • DeleteObject.GDI32(?), ref: 00455736
      • DeleteObject.GDI32(?), ref: 00455744
      • DestroyIcon.USER32(?), ref: 00455752
      • DestroyWindow.USER32(?), ref: 00455760
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
      • String ID:
      • API String ID: 2354583917-0
      • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
      • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
      • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
      • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
      APIs
      • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
      • GetProcAddress.KERNEL32(?,?), ref: 004648F7
      • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
      • GetProcAddress.KERNEL32(?,?), ref: 0046495A
      • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: AddressProc$Library$FreeLoad
      • String ID: ou
      • API String ID: 2449869053-3837949563
      • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
      • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
      • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
      • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
      • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
      • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
      • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
      APIs
      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
      • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
      • EnableWindow.USER32(?,00000000), ref: 00448B5C
      • EnableWindow.USER32(?,00000001), ref: 00448B72
      • ShowWindow.USER32(?,00000000), ref: 00448BE8
      • ShowWindow.USER32(?,00000004), ref: 00448BF4
      • EnableWindow.USER32(?,00000001), ref: 00448C09
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Window$Enable$Show$MessageMoveSend
      • String ID:
      • API String ID: 896007046-0
      • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
      • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
      • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
      • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
      APIs
      • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
      • GetFocus.USER32 ref: 00448ACF
      • EnableWindow.USER32(?,00000000), ref: 00448B5C
      • EnableWindow.USER32(?,00000001), ref: 00448B72
      • ShowWindow.USER32(?,00000000), ref: 00448BE8
      • ShowWindow.USER32(?,00000004), ref: 00448BF4
      • EnableWindow.USER32(?,00000001), ref: 00448C09
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Window$Enable$Show$FocusMessageSend
      • String ID:
      • API String ID: 3429747543-0
      • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
      • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
      • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
      • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D459
      • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
      • __swprintf.LIBCMT ref: 0045D4E9
      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ErrorMode$InformationVolume__swprintf
      • String ID: %lu$\VH
      • API String ID: 3164766367-2432546070
      • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
      • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
      • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
      • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
      APIs
      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
      • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
      • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSend
      • String ID: Msctls_Progress32
      • API String ID: 3850602802-3636473452
      • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
      • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
      • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
      • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
      • String ID:
      • API String ID: 3985565216-0
      • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
      • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
      • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
      • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
      APIs
      • _malloc.LIBCMT ref: 0041F707
        • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
        • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
        • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
      • _free.LIBCMT ref: 0041F71A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: AllocateHeap_free_malloc
      • String ID: [B
      • API String ID: 1020059152-632041663
      • Opcode ID: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
      • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
      • Opcode Fuzzy Hash: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
      • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
      APIs
      • ___set_flsgetvalue.LIBCMT ref: 00413DA4
      • __calloc_crt.LIBCMT ref: 00413DB0
      • __getptd.LIBCMT ref: 00413DBD
      • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
      • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
      • _free.LIBCMT ref: 00413E07
      • __dosmaperr.LIBCMT ref: 00413E12
        • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
      • String ID:
      • API String ID: 155776804-0
      • Opcode ID: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
      • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
      • Opcode Fuzzy Hash: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
      • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
      APIs
        • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
        • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
      • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
      • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
      • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
      • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
      • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
      • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
      • String ID:
      • API String ID: 1957940570-0
      • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
      • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
      • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
      • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
      APIs
      • ___set_flsgetvalue.LIBCMT ref: 00413D20
        • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
        • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
      • ___fls_getvalue@4.LIBCMT ref: 00413D2B
        • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
      • ___fls_setvalue@8.LIBCMT ref: 00413D3E
      • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
      • ExitThread.KERNEL32 ref: 00413D4E
      • GetCurrentThreadId.KERNEL32 ref: 00413D54
      • __freefls@4.LIBCMT ref: 00413D74
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
      • String ID:
      • API String ID: 259663610-0
      • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
      • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
      • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
      • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
      APIs
      • GetClientRect.USER32(?,?), ref: 004302E6
      • GetWindowRect.USER32(00000000,?), ref: 00430316
      • GetClientRect.USER32(?,?), ref: 00430364
      • GetSystemMetrics.USER32(0000000F), ref: 004303B1
      • GetWindowRect.USER32(?,?), ref: 004303C3
      • ScreenToClient.USER32(?,?), ref: 004303EC
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Rect$Client$Window$MetricsScreenSystem
      • String ID:
      • API String ID: 3220332590-0
      • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
      • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
      • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
      • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _malloc_wcslen$_strcat_wcscpy
      • String ID:
      • API String ID: 1612042205-0
      • Opcode ID: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
      • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
      • Opcode Fuzzy Hash: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
      • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memmove_strncmp
      • String ID: >$U$\
      • API String ID: 2666721431-237099441
      • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
      • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
      • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
      • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
      APIs
      • GetKeyboardState.USER32(?), ref: 0044C570
      • SetKeyboardState.USER32(00000080), ref: 0044C594
      • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
      • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
      • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
      • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessagePost$KeyboardState$InputSend
      • String ID:
      • API String ID: 2221674350-0
      • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
      • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
      • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
      • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _wcscpy$_wcscat
      • String ID:
      • API String ID: 2037614760-0
      • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
      • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
      • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
      • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
      APIs
      • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
      • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
      • VariantCopy.OLEAUT32(?,?), ref: 00451C0E
      • VariantCopy.OLEAUT32(?,?), ref: 00451C27
      • VariantClear.OLEAUT32(?), ref: 00451CA1
      • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Variant$Copy$AllocClearErrorLastString
      • String ID:
      • API String ID: 960795272-0
      • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
      • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
      • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
      • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
      APIs
      • BeginPaint.USER32(00000000,?), ref: 00447BDF
      • GetWindowRect.USER32(?,?), ref: 00447C5D
      • ScreenToClient.USER32(?,?), ref: 00447C7B
      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
      • EndPaint.USER32(?,?), ref: 00447D13
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
      • String ID:
      • API String ID: 4189319755-0
      • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
      • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
      • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
      • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
      APIs
      • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
      • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
      • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
      • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
      • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSend$LongWindow$InvalidateRect
      • String ID:
      • API String ID: 1976402638-0
      • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
      • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
      • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
      • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
      APIs
      • ShowWindow.USER32(?,00000000), ref: 00440A8A
      • EnableWindow.USER32(?,00000000), ref: 00440AAF
      • ShowWindow.USER32(?,00000000), ref: 00440B18
      • ShowWindow.USER32(?,00000004), ref: 00440B2B
      • EnableWindow.USER32(?,00000001), ref: 00440B50
      • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Window$Show$Enable$MessageSend
      • String ID:
      • API String ID: 642888154-0
      • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
      • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
      • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
      • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
      APIs
      • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
      • EnableWindow.USER32(?,00000000), ref: 00448B5C
      • EnableWindow.USER32(?,00000001), ref: 00448B72
      • ShowWindow.USER32(?,00000000), ref: 00448BE8
      • ShowWindow.USER32(?,00000004), ref: 00448BF4
      • EnableWindow.USER32(?,00000001), ref: 00448C09
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Window$Enable$Show$MessageSend
      • String ID:
      • API String ID: 1871949834-0
      • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
      • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
      • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
      • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
      • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
      • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
      • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
      APIs
      • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
      • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
      • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
      • SendMessageW.USER32 ref: 00471AE3
      • DestroyIcon.USER32(?), ref: 00471AF4
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
      • String ID:
      • API String ID: 3611059338-0
      • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
      • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
      • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
      • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: DestroyWindow$DeleteObject$IconMove
      • String ID:
      • API String ID: 1640429340-0
      • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
      • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
      • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
      • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
      APIs
        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
      • _wcslen.LIBCMT ref: 004438CD
      • _wcslen.LIBCMT ref: 004438E6
      • _wcstok.LIBCMT ref: 004438F8
      • _wcslen.LIBCMT ref: 0044390C
      • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
      • _wcstok.LIBCMT ref: 00443931
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
      • String ID:
      • API String ID: 3632110297-0
      • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
      • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
      • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
      • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Destroy$DeleteMenuObject$IconWindow
      • String ID:
      • API String ID: 752480666-0
      • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
      • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
      • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
      • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Destroy$DeleteObjectWindow$IconImageList_
      • String ID:
      • API String ID: 3275902921-0
      • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
      • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
      • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
      • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Destroy$DeleteObjectWindow$IconImageList_
      • String ID:
      • API String ID: 3275902921-0
      • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
      • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
      • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
      • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
      APIs
      • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
      • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
      • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: PerformanceQuery$CounterSleep$Frequency
      • String ID:
      • API String ID: 2833360925-0
      • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
      • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
      • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
      • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
      APIs
      • SendMessageW.USER32 ref: 004555C7
      • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
      • DeleteObject.GDI32(?), ref: 00455736
      • DeleteObject.GDI32(?), ref: 00455744
      • DestroyIcon.USER32(?), ref: 00455752
      • DestroyWindow.USER32(?), ref: 00455760
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: DeleteDestroyMessageObjectSend$IconWindow
      • String ID:
      • API String ID: 3691411573-0
      • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
      • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
      • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
      • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
      APIs
        • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
        • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
        • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
      • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
      • LineTo.GDI32(?,?,?), ref: 004472AC
      • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
      • LineTo.GDI32(?,?,?), ref: 004472C6
      • EndPath.GDI32(?), ref: 004472D6
      • StrokePath.GDI32(?), ref: 004472E4
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
      • String ID:
      • API String ID: 372113273-0
      • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
      • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
      • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
      • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
      APIs
      • GetDC.USER32(00000000), ref: 0044CC6D
      • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
      • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
      • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
      • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CapsDevice$Release
      • String ID:
      • API String ID: 1035833867-0
      • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
      • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
      • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
      • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
      APIs
      • __getptd.LIBCMT ref: 0041708E
        • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
        • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
      • __amsg_exit.LIBCMT ref: 004170AE
      • __lock.LIBCMT ref: 004170BE
      • InterlockedDecrement.KERNEL32(?), ref: 004170DB
      • _free.LIBCMT ref: 004170EE
      • InterlockedIncrement.KERNEL32(02DF2CE0), ref: 00417106
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
      • String ID:
      • API String ID: 3470314060-0
      • Opcode ID: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
      • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
      • Opcode Fuzzy Hash: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
      • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
      APIs
      • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
      • EnterCriticalSection.KERNEL32(?), ref: 0044B666
      • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
      • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
        • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
      • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
      • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
      • String ID:
      • API String ID: 3495660284-0
      • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
      • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
      • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
      • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
      APIs
      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
      • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
      • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Virtual
      • String ID:
      • API String ID: 4278518827-0
      • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
      • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
      • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
      • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
      APIs
      • ___set_flsgetvalue.LIBCMT ref: 004151C0
        • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
        • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
      • ___fls_getvalue@4.LIBCMT ref: 004151CB
        • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
      • ___fls_setvalue@8.LIBCMT ref: 004151DD
      • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
      • ExitThread.KERNEL32 ref: 004151ED
      • __freefls@4.LIBCMT ref: 00415209
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
      • String ID:
      • API String ID: 442100245-0
      • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
      • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
      • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
      • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
      APIs
        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
      • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
      • _wcslen.LIBCMT ref: 0045F94A
      • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
      • String ID: 0
      • API String ID: 621800784-4108050209
      • Opcode ID: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
      • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
      • Opcode Fuzzy Hash: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
      • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • SetErrorMode.KERNEL32 ref: 004781CE
      • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
        • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
      • SetErrorMode.KERNEL32(?), ref: 00478270
      • SetErrorMode.KERNEL32(?), ref: 00478340
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ErrorMode$AttributesFile_memmove_wcslen
      • String ID: \VH
      • API String ID: 3884216118-234962358
      • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
      • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
      • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
      • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
      APIs
      • LoadLibraryA.KERNEL32(?), ref: 00434B10
      • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
      • FreeLibrary.KERNEL32(?), ref: 00434B9F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Library$AddressFreeLoadProc
      • String ID: AU3_GetPluginDetails$ou
      • API String ID: 145871493-528704710
      • Opcode ID: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
      • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
      • Opcode Fuzzy Hash: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
      • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
      APIs
      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
      • IsMenu.USER32(?), ref: 0044854D
      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
      • DrawMenuBar.USER32 ref: 004485AF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Menu$Item$DrawInfoInsert
      • String ID: 0
      • API String ID: 3076010158-4108050209
      • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
      • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
      • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
      • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
      • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSend$_memmove_wcslen
      • String ID: ComboBox$ListBox
      • API String ID: 1589278365-1403004172
      • Opcode ID: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
      • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
      • Opcode Fuzzy Hash: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
      • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Handle
      • String ID: nul
      • API String ID: 2519475695-2873401336
      • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
      • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
      • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
      • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
      APIs
      • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Handle
      • String ID: nul
      • API String ID: 2519475695-2873401336
      • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
      • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
      • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
      • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
      APIs
      • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      • _wcsncpy.LIBCMT ref: 00401C41
      • _wcscpy.LIBCMT ref: 00401C5D
      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
      • String ID: Line:
      • API String ID: 1874344091-1585850449
      • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
      • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
      • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
      • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID: SysAnimate32
      • API String ID: 0-1011021900
      • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
      • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
      • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
      • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
      APIs
        • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
        • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
        • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
        • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
        • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
        • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
      • GetFocus.USER32 ref: 0046157B
        • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
        • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
      • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
      • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
      • __swprintf.LIBCMT ref: 00461608
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
      • String ID: %s%d
      • API String ID: 2645982514-1110647743
      • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
      • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
      • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
      • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
      • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
      • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
      • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
      APIs
        • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
        • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ConnectRegistry_memmove_wcslen
      • String ID:
      • API String ID: 15295421-0
      • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
      • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
      • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
      • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
      APIs
      • GetCursorPos.USER32(?), ref: 004563A6
      • ScreenToClient.USER32(?,?), ref: 004563C3
      • GetAsyncKeyState.USER32(?), ref: 00456400
      • GetAsyncKeyState.USER32(?), ref: 00456410
      • GetWindowLongW.USER32(?,000000F0), ref: 00456466
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: AsyncState$ClientCursorLongScreenWindow
      • String ID:
      • API String ID: 3539004672-0
      • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
      • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
      • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
      • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
      APIs
      • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
      • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
      • Sleep.KERNEL32(0000000A), ref: 0047D455
      • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
      • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Interlocked$DecrementIncrement$Sleep
      • String ID:
      • API String ID: 327565842-0
      • Opcode ID: 9dc5377443ce6d6d6f4d2094a12b75972c96b6e0f004f6bf3202481cb4e98956
      • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
      • Opcode Fuzzy Hash: 9dc5377443ce6d6d6f4d2094a12b75972c96b6e0f004f6bf3202481cb4e98956
      • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
      APIs
      • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
      • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
      • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
      • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: PrivateProfile$SectionWrite$String
      • String ID:
      • API String ID: 2832842796-0
      • Opcode ID: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
      • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
      • Opcode Fuzzy Hash: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
      • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
      APIs
      • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
      • RegCloseKey.ADVAPI32(?), ref: 00441CFE
      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Enum$CloseDeleteOpen
      • String ID:
      • API String ID: 2095303065-0
      • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
      • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
      • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
      • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
      APIs
      • GetWindowRect.USER32(?,?), ref: 00436A24
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: RectWindow
      • String ID:
      • API String ID: 861336768-0
      • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
      • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
      • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
      • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
      APIs
      • SendMessageW.USER32 ref: 00449598
        • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
      • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
      • _wcslen.LIBCMT ref: 0044960D
      • _wcslen.LIBCMT ref: 0044961A
      • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSend$_wcslen$_wcspbrk
      • String ID:
      • API String ID: 1856069659-0
      • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
      • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
      • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
      • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
      APIs
      • GetCursorPos.USER32(?), ref: 004478E2
      • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
      • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
      • GetCursorPos.USER32(00000000), ref: 0044796A
      • TrackPopupMenuEx.USER32(02DF6500,00000000,00000000,?,?,00000000), ref: 00447991
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CursorMenuPopupTrack$Proc
      • String ID:
      • API String ID: 1300944170-0
      • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
      • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
      • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
      • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
      APIs
      • GetClientRect.USER32(?,?), ref: 004479CC
      • GetCursorPos.USER32(?), ref: 004479D7
      • ScreenToClient.USER32(?,?), ref: 004479F3
      • WindowFromPoint.USER32(?,?), ref: 00447A34
      • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Client$CursorFromPointProcRectScreenWindow
      • String ID:
      • API String ID: 1822080540-0
      • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
      • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
      • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
      • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
      APIs
      • GetWindowRect.USER32(?,?), ref: 00447C5D
      • ScreenToClient.USER32(?,?), ref: 00447C7B
      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
      • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
      • EndPaint.USER32(?,?), ref: 00447D13
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ClientPaintRectRectangleScreenViewportWindow
      • String ID:
      • API String ID: 659298297-0
      • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
      • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
      • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
      • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
      APIs
      • EnableWindow.USER32(?,00000000), ref: 00448B5C
      • EnableWindow.USER32(?,00000001), ref: 00448B72
      • ShowWindow.USER32(?,00000000), ref: 00448BE8
      • ShowWindow.USER32(?,00000004), ref: 00448BF4
      • EnableWindow.USER32(?,00000001), ref: 00448C09
        • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
        • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
        • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
        • Part of subcall function 00440D98: SendMessageW.USER32(02DF1AC0,000000F1,00000000,00000000), ref: 00440E6E
        • Part of subcall function 00440D98: SendMessageW.USER32(02DF1AC0,000000F1,00000001,00000000), ref: 00440E9A
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Window$EnableMessageSend$LongShow
      • String ID:
      • API String ID: 142311417-0
      • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
      • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
      • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
      • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
      • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
      • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
      • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
      APIs
      • IsWindowVisible.USER32(?), ref: 00445879
      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
      • _wcslen.LIBCMT ref: 004458FB
      • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
      • String ID:
      • API String ID: 3087257052-0
      • Opcode ID: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
      • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
      • Opcode Fuzzy Hash: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
      • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
      APIs
        • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
      • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
      • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
      • connect.WSOCK32(00000000,?,00000010), ref: 00465446
      • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
      • closesocket.WSOCK32(00000000,00000000), ref: 00465481
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ErrorLast$closesocketconnectinet_addrsocket
      • String ID:
      • API String ID: 245547762-0
      • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
      • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
      • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
      • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
      APIs
      • DeleteObject.GDI32(00000000), ref: 004471D8
      • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
      • SelectObject.GDI32(?,00000000), ref: 00447228
      • BeginPath.GDI32(?), ref: 0044723D
      • SelectObject.GDI32(?,00000000), ref: 00447266
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Object$Select$BeginCreateDeletePath
      • String ID:
      • API String ID: 2338827641-0
      • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
      • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
      • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
      • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
      APIs
      • Sleep.KERNEL32(00000000), ref: 00434598
      • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
      • Sleep.KERNEL32(00000000), ref: 004345D4
      • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CounterPerformanceQuerySleep
      • String ID:
      • API String ID: 2875609808-0
      • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
      • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
      • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
      • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
      APIs
      • GetDlgItem.USER32(?,000003E9), ref: 00460C17
      • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
      • MessageBeep.USER32(00000000), ref: 00460C46
      • KillTimer.USER32(?,0000040A), ref: 00460C68
      • EndDialog.USER32(?,00000001), ref: 00460C83
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: BeepDialogItemKillMessageTextTimerWindow
      • String ID:
      • API String ID: 3741023627-0
      • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
      • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
      • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
      • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Destroy$DeleteObjectWindow$Icon
      • String ID:
      • API String ID: 4023252218-0
      • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
      • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
      • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
      • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
      APIs
      • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
      • DeleteObject.GDI32(?), ref: 00455736
      • DeleteObject.GDI32(?), ref: 00455744
      • DestroyIcon.USER32(?), ref: 00455752
      • DestroyWindow.USER32(?), ref: 00455760
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: DeleteDestroyObject$IconMessageSendWindow
      • String ID:
      • API String ID: 1489400265-0
      • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
      • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
      • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
      • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
      APIs
        • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
      • DestroyWindow.USER32(?), ref: 00455728
      • DeleteObject.GDI32(?), ref: 00455736
      • DeleteObject.GDI32(?), ref: 00455744
      • DestroyIcon.USER32(?), ref: 00455752
      • DestroyWindow.USER32(?), ref: 00455760
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
      • String ID:
      • API String ID: 1042038666-0
      • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
      • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
      • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
      • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
      APIs
      • __getptd.LIBCMT ref: 0041780F
        • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
        • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
      • __getptd.LIBCMT ref: 00417826
      • __amsg_exit.LIBCMT ref: 00417834
      • __lock.LIBCMT ref: 00417844
      • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
      • String ID:
      • API String ID: 938513278-0
      • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
      • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
      • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
      • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
      APIs
        • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
      • ___set_flsgetvalue.LIBCMT ref: 00413D20
        • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
        • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
      • ___fls_getvalue@4.LIBCMT ref: 00413D2B
        • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
      • ___fls_setvalue@8.LIBCMT ref: 00413D3E
      • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
      • ExitThread.KERNEL32 ref: 00413D4E
      • GetCurrentThreadId.KERNEL32 ref: 00413D54
      • __freefls@4.LIBCMT ref: 00413D74
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
      • String ID:
      • API String ID: 2403457894-0
      • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
      • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
      • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
      • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
      APIs
        • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
      • ___set_flsgetvalue.LIBCMT ref: 004151C0
        • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
        • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
      • ___fls_getvalue@4.LIBCMT ref: 004151CB
        • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
      • ___fls_setvalue@8.LIBCMT ref: 004151DD
      • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
      • ExitThread.KERNEL32 ref: 004151ED
      • __freefls@4.LIBCMT ref: 00415209
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
      • String ID:
      • API String ID: 4247068974-0
      • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
      • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
      • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
      • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID:
      • String ID: )$U$\
      • API String ID: 0-3705770531
      • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
      • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
      • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
      • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
      APIs
        • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
      • CoInitialize.OLE32(00000000), ref: 0046E505
      • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
      • CoUninitialize.OLE32 ref: 0046E53D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CreateInitializeInstanceUninitialize_wcslen
      • String ID: .lnk
      • API String ID: 886957087-24824748
      • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
      • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
      • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
      • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memmove
      • String ID: \
      • API String ID: 4104443479-2967466578
      • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
      • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
      • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
      • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memmove
      • String ID: \
      • API String ID: 4104443479-2967466578
      • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
      • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
      • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
      • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memmove
      • String ID: \
      • API String ID: 4104443479-2967466578
      • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
      • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
      • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
      • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
      Strings
      • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
      • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
      • API String ID: 708495834-557222456
      • Opcode ID: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
      • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
      • Opcode Fuzzy Hash: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
      • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
      APIs
        • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
      • CoInitialize.OLE32(00000000), ref: 00478442
      • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
      • CoUninitialize.OLE32 ref: 0047863C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CreateInitializeInstanceUninitialize_wcslen
      • String ID: .lnk
      • API String ID: 886957087-24824748
      • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
      • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
      • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
      • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
      APIs
        • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
        • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
        • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
        • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
        • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
      • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
      • String ID: @
      • API String ID: 4150878124-2766056989
      • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
      • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
      • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
      • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memmove
      • String ID: \$]$h
      • API String ID: 4104443479-3262404753
      • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
      • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
      • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
      • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
      APIs
      • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
      • CloseHandle.KERNEL32(?), ref: 00457E09
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CloseExecuteHandleShell_wcscpy_wcslen
      • String ID: <$@
      • API String ID: 2417854910-1426351568
      • Opcode ID: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
      • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
      • Opcode Fuzzy Hash: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
      • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
      APIs
      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
        • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
      • String ID:
      • API String ID: 3705125965-3916222277
      • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
      • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
      • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
      • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
      APIs
      • GetMenuItemInfoW.USER32 ref: 0045FAC4
      • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
      • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Menu$Delete$InfoItem
      • String ID: 0
      • API String ID: 135850232-4108050209
      • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
      • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
      • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
      • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
      APIs
      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
      • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Window$Long
      • String ID: SysTreeView32
      • API String ID: 847901565-1698111956
      • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
      • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
      • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
      • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
      APIs
      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSend$Window
      • String ID: SysMonthCal32
      • API String ID: 2326795674-1439706946
      • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
      • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
      • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
      • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
      APIs
      • DestroyWindow.USER32(00000000), ref: 00450A2F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: DestroyWindow
      • String ID: msctls_updown32
      • API String ID: 3375834691-2298589950
      • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
      • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
      • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
      • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memmove
      • String ID: $<
      • API String ID: 4104443479-428540627
      • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
      • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
      • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
      • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ErrorMode$DiskFreeSpace
      • String ID: \VH
      • API String ID: 1682464887-234962358
      • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
      • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
      • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
      • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ErrorMode$DiskFreeSpace
      • String ID: \VH
      • API String ID: 1682464887-234962358
      • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
      • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
      • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
      • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ErrorMode$DiskFreeSpace
      • String ID: \VH
      • API String ID: 1682464887-234962358
      • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
      • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
      • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
      • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
      • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ErrorMode$InformationVolume
      • String ID: \VH
      • API String ID: 2507767853-234962358
      • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
      • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
      • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
      • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
      • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
      • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ErrorMode$InformationVolume
      • String ID: \VH
      • API String ID: 2507767853-234962358
      • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
      • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
      • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
      • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
      APIs
      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
      • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSend
      • String ID: msctls_trackbar32
      • API String ID: 3850602802-1010561917
      • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
      • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
      • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
      • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
      APIs
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • CLSIDFromString.OLE32(?,00000000), ref: 00435236
      • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
      • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
      • String ID: crts
      • API String ID: 943502515-3724388283
      • Opcode ID: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
      • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
      • Opcode Fuzzy Hash: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
      • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
      APIs
      • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
      • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
      • SetErrorMode.KERNEL32(?), ref: 0045D35C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ErrorMode$LabelVolume
      • String ID: \VH
      • API String ID: 2006950084-234962358
      • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
      • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
      • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
      • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
      APIs
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • GetMenuItemInfoW.USER32 ref: 00449727
      • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
      • DrawMenuBar.USER32 ref: 00449761
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Menu$InfoItem$Draw_malloc
      • String ID: 0
      • API String ID: 772068139-4108050209
      • Opcode ID: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
      • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
      • Opcode Fuzzy Hash: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
      • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _wcslen$_wcscpy
      • String ID: 3, 3, 8, 1
      • API String ID: 3469035223-357260408
      • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
      • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
      • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
      • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
      APIs
      • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
      • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: ICMP.DLL$IcmpCloseHandle
      • API String ID: 2574300362-3530519716
      • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
      • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
      • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
      • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
      APIs
      • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
      • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: ICMP.DLL$IcmpCreateFile
      • API String ID: 2574300362-275556492
      • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
      • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
      • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
      • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
      APIs
      • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
      • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: ICMP.DLL$IcmpSendEcho
      • API String ID: 2574300362-58917771
      • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
      • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
      • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
      • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
      APIs
      • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: RegDeleteKeyExW$advapi32.dll
      • API String ID: 2574300362-4033151799
      • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
      • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
      • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
      • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
      APIs
      • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
      • __itow.LIBCMT ref: 004699CD
        • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
      • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
      • __itow.LIBCMT ref: 00469A97
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSend$__itow
      • String ID:
      • API String ID: 3379773720-0
      • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
      • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
      • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
      • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
      APIs
      • GetWindowRect.USER32(?,?), ref: 00449A4A
      • ScreenToClient.USER32(?,?), ref: 00449A80
      • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Window$ClientMoveRectScreen
      • String ID:
      • API String ID: 3880355969-0
      • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
      • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
      • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
      • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __flsbuf__flush__getptd_noexit__write_memmove
      • String ID:
      • API String ID: 2782032738-0
      • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
      • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
      • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
      • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
      APIs
      • ClientToScreen.USER32(00000000,?), ref: 0044169A
      • GetWindowRect.USER32(?,?), ref: 00441722
      • PtInRect.USER32(?,?,?), ref: 00441734
      • MessageBeep.USER32(00000000), ref: 004417AD
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Rect$BeepClientMessageScreenWindow
      • String ID:
      • API String ID: 1352109105-0
      • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
      • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
      • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
      • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
      APIs
      • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
      • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
      • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
      • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CreateHardLink$DeleteErrorFileLast
      • String ID:
      • API String ID: 3321077145-0
      • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
      • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
      • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
      • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
      APIs
      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
      • __isleadbyte_l.LIBCMT ref: 004208A6
      • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
      • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
      • String ID:
      • API String ID: 3058430110-0
      • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
      • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
      • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
      • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
      APIs
      • GetParent.USER32(?), ref: 004503C8
      • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
      • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
      • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Proc$Parent
      • String ID:
      • API String ID: 2351499541-0
      • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
      • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
      • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
      • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
      APIs
      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
      • TranslateMessage.USER32(?), ref: 00442B01
      • DispatchMessageW.USER32(?), ref: 00442B0B
      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Message$Peek$DispatchTranslate
      • String ID:
      • API String ID: 1795658109-0
      • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
      • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
      • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
      • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
      APIs
      • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
        • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
        • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
        • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
      • GetCaretPos.USER32(?), ref: 004743B2
      • ClientToScreen.USER32(00000000,?), ref: 004743E8
      • GetForegroundWindow.USER32 ref: 004743EE
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
      • String ID:
      • API String ID: 2759813231-0
      • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
      • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
      • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
      • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
      APIs
        • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
      • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
      • _wcslen.LIBCMT ref: 00449519
      • _wcslen.LIBCMT ref: 00449526
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSend_wcslen$_wcspbrk
      • String ID:
      • API String ID: 2886238975-0
      • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
      • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
      • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
      • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __setmode$DebugOutputString_fprintf
      • String ID:
      • API String ID: 1792727568-0
      • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
      • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
      • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
      • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
      APIs
        • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
      • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
      • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Window$Long$AttributesLayered
      • String ID:
      • API String ID: 2169480361-0
      • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
      • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
      • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
      • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
      APIs
        • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
        • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
        • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
      • lstrlenW.KERNEL32(?), ref: 00434CF6
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
      • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: lstrcmpilstrcpylstrlen$_malloc
      • String ID: cdecl
      • API String ID: 3850814276-3896280584
      • Opcode ID: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
      • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
      • Opcode Fuzzy Hash: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
      • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
      APIs
        • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
      • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
      • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
      • _memmove.LIBCMT ref: 0046D475
      • inet_ntoa.WSOCK32(?), ref: 0046D481
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
      • String ID:
      • API String ID: 2502553879-0
      • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
      • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
      • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
      • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
      APIs
      • SendMessageW.USER32 ref: 00448C69
      • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
      • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
      • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSend$LongWindow
      • String ID:
      • API String ID: 312131281-0
      • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
      • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
      • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
      • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
      APIs
      • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
      • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
      • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
      • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ErrorLastacceptselect
      • String ID:
      • API String ID: 385091864-0
      • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
      • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
      • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
      • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
      APIs
      • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSend
      • String ID:
      • API String ID: 3850602802-0
      • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
      • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
      • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
      • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
      APIs
      • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
      • GetStockObject.GDI32(00000011), ref: 00430258
      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
      • ShowWindow.USER32(00000000,00000000), ref: 0043027D
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Window$CreateMessageObjectSendShowStock
      • String ID:
      • API String ID: 1358664141-0
      • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
      • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
      • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
      • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
      APIs
      • GetCurrentThreadId.KERNEL32 ref: 00443CA6
      • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
      • CloseHandle.KERNEL32(00000000), ref: 00443CF9
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
      • String ID:
      • API String ID: 2880819207-0
      • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
      • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
      • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
      • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
      APIs
      • GetWindowRect.USER32(?,?), ref: 00430BA2
      • ScreenToClient.USER32(?,?), ref: 00430BC1
      • ScreenToClient.USER32(?,?), ref: 00430BE2
      • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ClientRectScreen$InvalidateWindow
      • String ID:
      • API String ID: 357397906-0
      • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
      • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
      • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
      • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
      APIs
      • __wsplitpath.LIBCMT ref: 0043392E
        • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
      • __wsplitpath.LIBCMT ref: 00433950
      • __wcsicoll.LIBCMT ref: 00433974
      • __wcsicoll.LIBCMT ref: 0043398A
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
      • String ID:
      • API String ID: 1187119602-0
      • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
      • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
      • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
      • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _wcslen$_malloc_wcscat_wcscpy
      • String ID:
      • API String ID: 1597257046-0
      • Opcode ID: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
      • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
      • Opcode Fuzzy Hash: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
      • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
      APIs
      • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
      • __malloc_crt.LIBCMT ref: 0041F5B6
      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: EnvironmentStrings$Free__malloc_crt
      • String ID:
      • API String ID: 237123855-0
      • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
      • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
      • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
      • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: DeleteDestroyObject$IconWindow
      • String ID:
      • API String ID: 3349847261-0
      • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
      • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
      • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
      • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
      APIs
      • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
      • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
      • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
      • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CriticalSection$Leave$EnterExchangeInterlocked
      • String ID:
      • API String ID: 2223660684-0
      • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
      • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
      • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
      • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
      APIs
        • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
        • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
        • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
        • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
      • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
      • LineTo.GDI32(?,?,?), ref: 00447326
      • EndPath.GDI32(?), ref: 00447336
      • StrokePath.GDI32(?), ref: 00447344
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
      • String ID:
      • API String ID: 2783949968-0
      • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
      • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
      • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
      • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
      APIs
      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
      • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
      • GetCurrentThreadId.KERNEL32 ref: 004364A3
      • AttachThreadInput.USER32(00000000), ref: 004364AA
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
      • String ID:
      • API String ID: 2710830443-0
      • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
      • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
      • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
      • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
      APIs
      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
      • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
      • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
      • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
        • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
        • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
      • String ID:
      • API String ID: 146765662-0
      • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
      • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
      • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
      • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
      APIs
      • GetDesktopWindow.USER32 ref: 00472B63
      • GetDC.USER32(00000000), ref: 00472B6C
      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
      • ReleaseDC.USER32(00000000,?), ref: 00472B99
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CapsDesktopDeviceReleaseWindow
      • String ID:
      • API String ID: 2889604237-0
      • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
      • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
      • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
      • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
      APIs
      • GetDesktopWindow.USER32 ref: 00472BB2
      • GetDC.USER32(00000000), ref: 00472BBB
      • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
      • ReleaseDC.USER32(00000000,?), ref: 00472BE8
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CapsDesktopDeviceReleaseWindow
      • String ID:
      • API String ID: 2889604237-0
      • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
      • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
      • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
      • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
      APIs
      • __getptd_noexit.LIBCMT ref: 00415150
        • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
        • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
        • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
        • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
        • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
      • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
      • __freeptd.LIBCMT ref: 0041516B
      • ExitThread.KERNEL32 ref: 00415173
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
      • String ID:
      • API String ID: 1454798553-0
      • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
      • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
      • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
      • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _strncmp
      • String ID: Q\E
      • API String ID: 909875538-2189900498
      • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
      • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
      • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
      • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
      APIs
      • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
        • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
        • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
        • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
        • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
      • String ID: AutoIt3GUI$Container
      • API String ID: 2652923123-3941886329
      • Opcode ID: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
      • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
      • Opcode Fuzzy Hash: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
      • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memmove_strncmp
      • String ID: U$\
      • API String ID: 2666721431-100911408
      • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
      • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
      • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
      • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
      APIs
        • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
        • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
      • __wcsnicmp.LIBCMT ref: 00467288
      • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Connection__wcsnicmp_wcscpy_wcslen
      • String ID: LPT
      • API String ID: 3035604524-1350329615
      • Opcode ID: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
      • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
      • Opcode Fuzzy Hash: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
      • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memmove
      • String ID: \$h
      • API String ID: 4104443479-677774858
      • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
      • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
      • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
      • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memcmp
      • String ID: &
      • API String ID: 2931989736-1010288
      • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
      • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
      • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
      • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memmove
      • String ID: \
      • API String ID: 4104443479-2967466578
      • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
      • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
      • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
      • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
      APIs
      • _wcslen.LIBCMT ref: 00466825
      • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CrackInternet_wcslen
      • String ID: |
      • API String ID: 596671847-2343686810
      • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
      • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
      • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
      • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
      APIs
      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSend
      • String ID: '
      • API String ID: 3850602802-1997036262
      • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
      • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
      • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
      • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
      APIs
      • _strlen.LIBCMT ref: 0040F858
        • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
        • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
      • _sprintf.LIBCMT ref: 0040F9AE
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memmove$_sprintf_strlen
      • String ID: %02X
      • API String ID: 1921645428-436463671
      • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
      • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
      • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
      • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
      APIs
      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSend
      • String ID: Combobox
      • API String ID: 3850602802-2096851135
      • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
      • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
      • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
      • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
      APIs
      • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: LengthMessageSendTextWindow
      • String ID: edit
      • API String ID: 2978978980-2167791130
      • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
      • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
      • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
      • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
      APIs
      • Sleep.KERNEL32(00000000), ref: 00476CB0
      • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: GlobalMemorySleepStatus
      • String ID: @
      • API String ID: 2783356886-2766056989
      • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
      • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
      • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
      • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: htonsinet_addr
      • String ID: 255.255.255.255
      • API String ID: 3832099526-2422070025
      • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
      • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
      • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
      • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
      APIs
      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: InternetOpen
      • String ID: <local>
      • API String ID: 2038078732-4266983199
      • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
      • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
      • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
      • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: __fread_nolock_memmove
      • String ID: EA06
      • API String ID: 1988441806-3962188686
      • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
      • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
      • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
      • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: _memmove
      • String ID: u,D
      • API String ID: 4104443479-3858472334
      • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
      • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
      • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
      • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
      APIs
      • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
        • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • wsprintfW.USER32 ref: 0045612A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: MessageSend_mallocwsprintf
      • String ID: %d/%02d/%02d
      • API String ID: 1262938277-328681919
      • Opcode ID: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
      • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
      • Opcode Fuzzy Hash: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
      • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
      APIs
      • InternetCloseHandle.WININET(?), ref: 00442663
      • InternetCloseHandle.WININET ref: 00442668
        • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: CloseHandleInternet$ObjectSingleWait
      • String ID: aeB
      • API String ID: 857135153-906807131
      • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
      • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
      • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
      • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
      APIs
      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
      • PostMessageW.USER32(00000000), ref: 00441C05
        • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: FindMessagePostSleepWindow
      • String ID: Shell_TrayWnd
      • API String ID: 529655941-2988720461
      • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
      • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
      • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
      • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
      APIs
      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
        • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: FindMessagePostSleepWindow
      • String ID: Shell_TrayWnd
      • API String ID: 529655941-2988720461
      • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
      • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
      • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
      • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
      APIs
      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
        • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1403877035.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.1403805695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403964306.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1403987085.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404002839.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404056442.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1404096314.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_0PQIHAmzn4.jbxd
      Similarity
      • API ID: Message_doexit
      • String ID: AutoIt$Error allocating memory.
      • API String ID: 1993061046-4017498283
      • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
      • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
      • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
      • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D