Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
z1RFT798549034687-HJW90789-VXT9KGUINUII.exe

Overview

General Information

Sample name:z1RFT798549034687-HJW90789-VXT9KGUINUII.exe
Analysis ID:1518229
MD5:04bd328570a077fa407d68787942aa56
SHA1:47c576056a000919830ef511ee7a5c63ba3c5095
SHA256:0ec0a3aa2c9962d49da036f470975acf1381392b7dd0f991255f0a23d759f119
Tags:AgentTeslaexeuser-Porcupine
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • z1RFT798549034687-HJW90789-VXT9KGUINUII.exe (PID: 6908 cmdline: "C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe" MD5: 04BD328570A077FA407D68787942AA56)
    • RegSvcs.exe (PID: 3104 cmdline: "C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "cp8nl.hyperhost.ua", "Username": "absach@genesio.top", "Password": "@qwerty90123        "}
SourceRuleDescriptionAuthorStrings
00000004.00000002.2603275945.0000000002C59000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000002.1358495773.0000000001690000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000001.00000002.1358495773.0000000001690000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000001.00000002.1358495773.0000000001690000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
        • 0x33e4f:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
        • 0x33ec1:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
        • 0x33f4b:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
        • 0x33fdd:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
        • 0x34047:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
        • 0x340b9:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
        • 0x3414f:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
        • 0x341df:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
        00000004.00000002.2600972823.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 8 entries
          SourceRuleDescriptionAuthorStrings
          1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
              • 0x3204f:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
              • 0x320c1:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
              • 0x3214b:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
              • 0x321dd:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
              • 0x32247:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
              • 0x322b9:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
              • 0x3234f:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
              • 0x323df:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
              4.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                4.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  Click to see the 4 entries

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: frack113: Data: DesusertionIp: 185.174.175.187, DesusertionIsIpv6: false, DesusertionPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 3104, Protocol: tcp, SourceIp: 192.168.2.9, SourceIsIpv6: false, SourcePort: 49706
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exeAvira: detected
                  Source: 4.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "cp8nl.hyperhost.ua", "Username": "absach@genesio.top", "Password": "@qwerty90123 "}
                  Source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exeReversingLabs: Detection: 68%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exeJoe Sandbox ML: detected
                  Source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: wntdll.pdbUGP source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exe, 00000001.00000003.1355256966.00000000047E0000.00000004.00001000.00020000.00000000.sdmp, z1RFT798549034687-HJW90789-VXT9KGUINUII.exe, 00000001.00000003.1354588446.0000000004640000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exe, 00000001.00000003.1355256966.00000000047E0000.00000004.00001000.00020000.00000000.sdmp, z1RFT798549034687-HJW90789-VXT9KGUINUII.exe, 00000001.00000003.1354588446.0000000004640000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,1_2_00452492
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00442886
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,1_2_004788BD
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,1_2_004339B6
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,1_2_0045CAFA
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00431A86
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,1_2_0044BD27
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0045DE8F FindFirstFileW,FindClose,1_2_0045DE8F
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_0044BF8B
                  Source: global trafficTCP traffic: 192.168.2.9:49706 -> 185.174.175.187:587
                  Source: Joe Sandbox ViewIP Address: 185.174.175.187 185.174.175.187
                  Source: Joe Sandbox ViewASN Name: ITLDC-NLUA ITLDC-NLUA
                  Source: global trafficTCP traffic: 192.168.2.9:49706 -> 185.174.175.187:587
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_004422FE InternetQueryDataAvailable,InternetReadFile,1_2_004422FE
                  Source: global trafficDNS traffic detected: DNS query: cp8nl.hyperhost.ua
                  Source: global trafficDNS traffic detected: DNS query: 241.42.69.40.in-addr.arpa
                  Source: RegSvcs.exe, 00000004.00000002.2603275945.0000000002C36000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cp8nl.hyperhost.ua
                  Source: RegSvcs.exe, 00000004.00000002.2605126818.0000000005DC8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2605126818.0000000005DD7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2603275945.0000000002C36000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2605126818.0000000005DA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: RegSvcs.exe, 00000004.00000002.2605126818.0000000005DC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                  Source: RegSvcs.exe, 00000004.00000002.2605126818.0000000005DD7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2603275945.0000000002C36000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2605126818.0000000005DA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                  Source: RegSvcs.exe, 00000004.00000002.2605126818.0000000005DC8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2605126818.0000000005DD7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2603275945.0000000002C36000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2605126818.0000000005DA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: RegSvcs.exe, 00000004.00000002.2605126818.0000000005DD7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2603275945.0000000002C36000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2605126818.0000000005DA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                  Source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exe, 00000001.00000002.1358495773.0000000001690000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2600972823.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: RegSvcs.exe, 00000004.00000002.2605126818.0000000005DD7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2603275945.0000000002C36000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2605126818.0000000005DA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.raw.unpack, SKTzxzsJw.cs.Net Code: P0mmrM
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,1_2_0045A10F
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,1_2_0045A10F
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,1_2_0046DC80
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,1_2_0044C37A
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,1_2_0047C81C

                  System Summary

                  barindex
                  Source: 1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000001.00000002.1358495773.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,1_2_00431BE8
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,1_2_00446313
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,1_2_004333BE
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0042200C1_2_0042200C
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0041A2171_2_0041A217
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_004122161_2_00412216
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0042435D1_2_0042435D
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_004033C01_2_004033C0
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0044F4301_2_0044F430
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_004125E81_2_004125E8
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0044663B1_2_0044663B
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_004096A01_2_004096A0
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_004138011_2_00413801
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0042096F1_2_0042096F
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_004129D01_2_004129D0
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_004119E31_2_004119E3
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0041C9AE1_2_0041C9AE
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0047EA6F1_2_0047EA6F
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0040FA101_2_0040FA10
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0044EB5F1_2_0044EB5F
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00423C811_2_00423C81
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00411E781_2_00411E78
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00442E0C1_2_00442E0C
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00420EC01_2_00420EC0
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0044CF171_2_0044CF17
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00444FD21_2_00444FD2
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0407BF001_2_0407BF00
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_029E93884_2_029E9388
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_029E4A984_2_029E4A98
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_029E9B484_2_029E9B48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_029E3E804_2_029E3E80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_029ECEA04_2_029ECEA0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_029E41C84_2_029E41C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_05EAACDC4_2_05EAACDC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_05EA96B04_2_05EA96B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_05EABDF84_2_05EABDF8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_05EADBF04_2_05EADBF0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_05ECBCE84_2_05ECBCE8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_05ECDCF84_2_05ECDCF8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_05EC3F304_2_05EC3F30
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_05EC56C04_2_05EC56C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_05EC00404_2_05EC0040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_05EC8B784_2_05EC8B78
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_05EC2AE84_2_05EC2AE8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_05EC9AD04_2_05EC9AD0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_05EC4FE04_2_05EC4FE0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4_2_05EC32384_2_05EC3238
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: String function: 004115D7 appears 36 times
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: String function: 00416C70 appears 39 times
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: String function: 00445AE0 appears 65 times
                  Source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exe, 00000001.00000003.1355035918.0000000004763000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs z1RFT798549034687-HJW90789-VXT9KGUINUII.exe
                  Source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exe, 00000001.00000003.1355256966.000000000490D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs z1RFT798549034687-HJW90789-VXT9KGUINUII.exe
                  Source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exe, 00000001.00000002.1358495773.0000000001690000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefc5dce39-38f8-4333-8bf2-0b26de43131c.exe4 vs z1RFT798549034687-HJW90789-VXT9KGUINUII.exe
                  Source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000001.00000002.1358495773.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/1
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0044AF6C GetLastError,FormatMessageW,1_2_0044AF6C
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,1_2_004333BE
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,1_2_00464EAE
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,1_2_0045D619
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,1_2_004755C4
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,1_2_0047839D
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,1_2_0043305F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeFile created: C:\Users\user\AppData\Local\Temp\spiketopJump to behavior
                  Source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exeReversingLabs: Detection: 68%
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeFile read: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe "C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe"
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe"
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exeStatic file information: File size 1200235 > 1048576
                  Source: Binary string: wntdll.pdbUGP source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exe, 00000001.00000003.1355256966.00000000047E0000.00000004.00001000.00020000.00000000.sdmp, z1RFT798549034687-HJW90789-VXT9KGUINUII.exe, 00000001.00000003.1354588446.0000000004640000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exe, 00000001.00000003.1355256966.00000000047E0000.00000004.00001000.00020000.00000000.sdmp, z1RFT798549034687-HJW90789-VXT9KGUINUII.exe, 00000001.00000003.1354588446.0000000004640000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0040EBD0 LoadLibraryA,GetProcAddress,1_2_0040EBD0
                  Source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exeStatic PE information: real checksum: 0xa961f should be: 0x13287b
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00416CB5 push ecx; ret 1_2_00416CC8
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,1_2_0047A330
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,1_2_00434418
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeAPI/Special instruction interceptor: Address: 407BB24
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2071Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 4397Jump to behavior
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeAPI coverage: 3.3 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,1_2_00452492
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00442886
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,1_2_004788BD
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,1_2_004339B6
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,1_2_0045CAFA
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00431A86
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,1_2_0044BD27
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0045DE8F FindFirstFileW,FindClose,1_2_0045DE8F
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_0044BF8B
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,1_2_0040E500
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99874Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99763Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99546Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99436Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99318Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99203Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99037Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98920Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98787Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98668Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98562Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98453Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98343Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98220Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98093Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97983Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97874Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97765Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97656Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97546Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97437Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97328Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97218Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97109Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96999Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96890Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96781Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96671Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96562Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96452Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: RegSvcs.exe, 00000004.00000002.2605126818.0000000005DA1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0045A370 BlockInput,1_2_0045A370
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,1_2_0040D590
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0040EBD0 LoadLibraryA,GetProcAddress,1_2_0040EBD0
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0407A740 mov eax, dword ptr fs:[00000030h]1_2_0407A740
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0407BD90 mov eax, dword ptr fs:[00000030h]1_2_0407BD90
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0407BDF0 mov eax, dword ptr fs:[00000030h]1_2_0407BDF0
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,1_2_004238DA
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0041F250 SetUnhandledExceptionFilter,1_2_0041F250
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0041A208
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00417DAA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: AD0008Jump to behavior
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00436CD7 LogonUserW,1_2_00436CD7
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,1_2_0040D590
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,1_2_00434418
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,1_2_0043333C
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,1_2_00446124
                  Source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exeBinary or memory string: Shell_TrayWnd
                  Source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,1_2_004720DB
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00472C3F GetUserNameW,1_2_00472C3F
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,1_2_0041E364
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,1_2_0040E500
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.2603275945.0000000002C59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1358495773.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2600972823.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2603275945.0000000002C2E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2603275945.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: z1RFT798549034687-HJW90789-VXT9KGUINUII.exe PID: 6908, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3104, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exeBinary or memory string: WIN_XP
                  Source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
                  Source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exeBinary or memory string: WIN_XPe
                  Source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exeBinary or memory string: WIN_VISTA
                  Source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exeBinary or memory string: WIN_7
                  Source: z1RFT798549034687-HJW90789-VXT9KGUINUII.exeBinary or memory string: WIN_8
                  Source: Yara matchFile source: 1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.1358495773.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2600972823.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2603275945.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: z1RFT798549034687-HJW90789-VXT9KGUINUII.exe PID: 6908, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3104, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.z1RFT798549034687-HJW90789-VXT9KGUINUII.exe.1690000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000004.00000002.2603275945.0000000002C59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.1358495773.0000000001690000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2600972823.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2603275945.0000000002C2E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2603275945.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: z1RFT798549034687-HJW90789-VXT9KGUINUII.exe PID: 6908, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3104, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,1_2_004652BE
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,1_2_00476619
                  Source: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exeCode function: 1_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,1_2_0046CEF3
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  121
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts1
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  121
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  1
                  Credentials in Registry
                  2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS128
                  System Information Discovery
                  Distributed Component Object Model121
                  Input Capture
                  1
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  2
                  Valid Accounts
                  LSA Secrets231
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  11
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials121
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Access Token Manipulation
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                  Process Injection
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  z1RFT798549034687-HJW90789-VXT9KGUINUII.exe68%ReversingLabsWin32.Trojan.AutoitInject
                  z1RFT798549034687-HJW90789-VXT9KGUINUII.exe100%AviraHEUR/AGEN.1321685
                  z1RFT798549034687-HJW90789-VXT9KGUINUII.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://sectigo.com/CPS00%URL Reputationsafe
                  https://account.dyn.com/0%URL Reputationsafe
                  http://ocsp.sectigo.com00%URL Reputationsafe
                  http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%Avira URL Cloudsafe
                  http://cp8nl.hyperhost.ua0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  cp8nl.hyperhost.ua
                  185.174.175.187
                  truetrue
                    unknown
                    241.42.69.40.in-addr.arpa
                    unknown
                    unknownfalse
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#RegSvcs.exe, 00000004.00000002.2605126818.0000000005DD7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2603275945.0000000002C36000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2605126818.0000000005DA1000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://sectigo.com/CPS0RegSvcs.exe, 00000004.00000002.2605126818.0000000005DD7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2603275945.0000000002C36000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2605126818.0000000005DA1000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://account.dyn.com/z1RFT798549034687-HJW90789-VXT9KGUINUII.exe, 00000001.00000002.1358495773.0000000001690000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2600972823.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://ocsp.sectigo.com0RegSvcs.exe, 00000004.00000002.2605126818.0000000005DD7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2603275945.0000000002C36000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000004.00000002.2605126818.0000000005DA1000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://cp8nl.hyperhost.uaRegSvcs.exe, 00000004.00000002.2603275945.0000000002C36000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      185.174.175.187
                      cp8nl.hyperhost.uaUkraine
                      21100ITLDC-NLUAtrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1518229
                      Start date and time:2024-09-25 14:30:29 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 5m 21s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:12
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:z1RFT798549034687-HJW90789-VXT9KGUINUII.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@3/1@2/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 48
                      • Number of non-executed functions: 305
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: z1RFT798549034687-HJW90789-VXT9KGUINUII.exe
                      TimeTypeDescription
                      08:31:23API Interceptor32x Sleep call for process: RegSvcs.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      185.174.175.187rDFO68936OF-WVHU0780-FUIKTU4678G.exeGet hashmaliciousAgentTeslaBrowse
                        SecuriteInfo.com.FileRepMalware.14031.20391.exeGet hashmaliciousAgentTeslaBrowse
                          MJI5380328-PQX82938839039-HW7V89292999.exeGet hashmaliciousAgentTeslaBrowse
                            rMBP0835T67-H7D67889677-VFD899U8889990998Y.exeGet hashmaliciousAgentTeslaBrowse
                              PDE57450899-TBS8997788T-MVC7896756778.exeGet hashmaliciousAgentTeslaBrowse
                                Remesas Aceptadas.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                  Payment Slip -21501120100258.bat.exeGet hashmaliciousAgentTeslaBrowse
                                    TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlxs.exeGet hashmaliciousAgentTeslaBrowse
                                      1q4wVJgStc.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                        nleHhuZy1N.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          cp8nl.hyperhost.uarDFO68936OF-WVHU0780-FUIKTU4678G.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          SecuriteInfo.com.FileRepMalware.14031.20391.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          MJI5380328-PQX82938839039-HW7V89292999.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          rMBP0835T67-H7D67889677-VFD899U8889990998Y.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          PDE57450899-TBS8997788T-MVC7896756778.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          Remesas Aceptadas.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          Payment Slip -21501120100258.bat.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlxs.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          1q4wVJgStc.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                          • 185.174.175.187
                                          nleHhuZy1N.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                          • 185.174.175.187
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          ITLDC-NLUArDFO68936OF-WVHU0780-FUIKTU4678G.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          BL Draft-Invoice-Packing list-Shipping Document.pif.exeGet hashmaliciousFormBookBrowse
                                          • 185.174.173.22
                                          SecuriteInfo.com.Win32.CrypterX-gen.9884.23346.exeGet hashmaliciousVIP KeyloggerBrowse
                                          • 217.12.218.219
                                          SecuriteInfo.com.FileRepMalware.14031.20391.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          SecuriteInfo.com.FileRepMalware.19940.26551.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.173.22
                                          MJI5380328-PQX82938839039-HW7V89292999.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          rMBP0835T67-H7D67889677-VFD899U8889990998Y.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          PDE57450899-TBS8997788T-MVC7896756778.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          Remesas Aceptadas.PDF.exeGet hashmaliciousAgentTeslaBrowse
                                          • 185.174.175.187
                                          http://metaamaskwallet.github.io/Get hashmaliciousUnknownBrowse
                                          • 185.198.164.118
                                          No context
                                          No context
                                          Process:C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):242688
                                          Entropy (8bit):6.751675294216978
                                          Encrypted:false
                                          SSDEEP:6144:c6zrJ7qaTQMkfum1MPPmI1n8WWaoyi2MWYSOPtoH0qsYGjmXVwrmMQQFVc9:ciqtMkWm1MPPmICXa6WBOVoUf1iXVLYg
                                          MD5:ED76D9E19072F7CF7D464AA8BF46FB84
                                          SHA1:7256229AFBAC454A19E7938FCC8412F42E2C4171
                                          SHA-256:E5D6F269E881566F4097F47809518D2CB2EDD6C3DE2323D4E6A1BB95D3D77136
                                          SHA-512:89C0EEBF1D93F57FA2E32A6BDB78D13193980DC4F80E009DE70421AD42C4CE114C1546162CFEBCF6FE5B0BD3315D7C64E27E7FF3615221E9CCC7AD9C64255BEF
                                          Malicious:false
                                          Reputation:low
                                          Preview:...D6YYJ^H0E..30.T8TGVAO.IZZ7AADD5YYJZH0EA1309T8TGVAONIZZ7AA.D5YWU.F0.H...8..u.>(<n9(5P3 )dV87$5<.'$.AEWtQ:g...n$5>RoLIN.YYJZH0E.t30uU;Ts..)NIZZ7AAD.5[XA[C0E.2301T8TGVA.JZZ.AAD.6YYJ.H0eA1329T<TGVAONI^Z7AADD5YyNZH2EA1309V8..VA_NIJZ7AATD5IYJZH0EQ1309T8TGVAO..YZdAADD.ZY._H0EA1309T8TGVAONIZZ7EAHD5YYJZH0EA1309T8TGVAONIZZ7AADD5YYJZH0EA1309T8TGVAONIzZ7IADD5YYJZH0EI.30qT8TGVAONIZZ.5$<05YY..K0Ea130.W8TEVAONIZZ7AADD5YyJZ(.72CP09T~QGVA.MIZ\7AA.G5YYJZH0EA1309.8T.x3*"&9Z7MADD5Y]JZJ0EA.009T8TGVAONIZZwAA.D5YYJZH0EA1309T8.UAONIZ.7AAFD0Y..XH.v@1009T9TGPAONIZZ7AADD5YYJZH0EA1309T8TGVAONIZZ7AADD5YYJZH0E\.....pj.+.E,N.|.&.G..J..#..J.$.K-....[.....}BG..D.Vi..9....E.\=-F....b:<0O,.BvV+.U......M.s.A8.5...$../B`.p...n.....?M.`.."..-&7tV11(!..8,;:Y.C.209T8........3O..iG:GmX"....."A....?ONI>Z7A3DD58YJZ.0EA^309:8TG(AON7ZZ7.ADDuYYJmH0Ed130TT8TcVAO0IZZ.<NK..09..0EA13.....*.....m..w5.K.;r...!.z.j<..[/.6.....9./..N.!\k~.F054<V?PDZ|A.....CE@A7^]IVu>......r..~..?..d;.8D5YYJZ.0E.130..8.GVA.N.Z.AAD..Y.J.H...1
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):7.440350771845244
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:z1RFT798549034687-HJW90789-VXT9KGUINUII.exe
                                          File size:1'200'235 bytes
                                          MD5:04bd328570a077fa407d68787942aa56
                                          SHA1:47c576056a000919830ef511ee7a5c63ba3c5095
                                          SHA256:0ec0a3aa2c9962d49da036f470975acf1381392b7dd0f991255f0a23d759f119
                                          SHA512:f506d4739ea26ca09551f980c14fa371bd601e61e5cb9c8187f6e61cb024583570085378e028617caaaca130e81bc5f7e33e77fac3662ea0a8ee439fbe846c5d
                                          SSDEEP:24576:uRmJkcoQricOIQxiZY1iaCyXqewWzxNjJzHR+y/v5IkHQy8O:7JZoQrbTFZY1iaCyXq4zLlFSkwyZ
                                          TLSH:0C45E121F5C68076C1B323B19E7FF76A9A3D79370326D19B27C82D215EA05816B39732
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
                                          Icon Hash:1733312925935517
                                          Entrypoint:0x4165c1
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                          DLL Characteristics:TERMINAL_SERVER_AWARE
                                          Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:5
                                          OS Version Minor:0
                                          File Version Major:5
                                          File Version Minor:0
                                          Subsystem Version Major:5
                                          Subsystem Version Minor:0
                                          Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
                                          Instruction
                                          call 00007F6EBCCCD48Bh
                                          jmp 00007F6EBCCC42FEh
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          push ebp
                                          mov ebp, esp
                                          push edi
                                          push esi
                                          mov esi, dword ptr [ebp+0Ch]
                                          mov ecx, dword ptr [ebp+10h]
                                          mov edi, dword ptr [ebp+08h]
                                          mov eax, ecx
                                          mov edx, ecx
                                          add eax, esi
                                          cmp edi, esi
                                          jbe 00007F6EBCCC447Ah
                                          cmp edi, eax
                                          jc 00007F6EBCCC4616h
                                          cmp ecx, 00000080h
                                          jc 00007F6EBCCC448Eh
                                          cmp dword ptr [004A9724h], 00000000h
                                          je 00007F6EBCCC4485h
                                          push edi
                                          push esi
                                          and edi, 0Fh
                                          and esi, 0Fh
                                          cmp edi, esi
                                          pop esi
                                          pop edi
                                          jne 00007F6EBCCC4477h
                                          jmp 00007F6EBCCC4852h
                                          test edi, 00000003h
                                          jne 00007F6EBCCC4486h
                                          shr ecx, 02h
                                          and edx, 03h
                                          cmp ecx, 08h
                                          jc 00007F6EBCCC449Bh
                                          rep movsd
                                          jmp dword ptr [00416740h+edx*4]
                                          mov eax, edi
                                          mov edx, 00000003h
                                          sub ecx, 04h
                                          jc 00007F6EBCCC447Eh
                                          and eax, 03h
                                          add ecx, eax
                                          jmp dword ptr [00416654h+eax*4]
                                          jmp dword ptr [00416750h+ecx*4]
                                          nop
                                          jmp dword ptr [004166D4h+ecx*4]
                                          nop
                                          inc cx
                                          add byte ptr [eax-4BFFBE9Ah], dl
                                          inc cx
                                          add byte ptr [ebx], ah
                                          ror dword ptr [edx-75F877FAh], 1
                                          inc esi
                                          add dword ptr [eax+468A0147h], ecx
                                          add al, cl
                                          jmp 00007F6EBF13CC77h
                                          add esi, 03h
                                          add edi, 03h
                                          cmp ecx, 08h
                                          jc 00007F6EBCCC443Eh
                                          rep movsd
                                          jmp dword ptr [00000000h+edx*4]
                                          Programming Language:
                                          • [ C ] VS2010 SP1 build 40219
                                          • [C++] VS2010 SP1 build 40219
                                          • [ C ] VS2008 SP1 build 30729
                                          • [IMP] VS2008 SP1 build 30729
                                          • [ASM] VS2010 SP1 build 40219
                                          • [RES] VS2010 SP1 build 40219
                                          • [LNK] VS2010 SP1 build 40219
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                          RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                          RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                          RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
                                          RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
                                          RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
                                          RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
                                          RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
                                          RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
                                          RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
                                          RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
                                          RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
                                          RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
                                          RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
                                          RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
                                          RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
                                          RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
                                          RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
                                          RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
                                          RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
                                          RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
                                          RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
                                          RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
                                          RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
                                          RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
                                          RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
                                          RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
                                          DLLImport
                                          WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
                                          VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                          COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
                                          MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
                                          WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
                                          PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
                                          USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
                                          KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
                                          USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
                                          GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
                                          COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                          ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
                                          SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                          ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
                                          OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishGreat Britain
                                          EnglishUnited States
                                          TimestampSource PortDest PortSource IPDest IP
                                          Sep 25, 2024 14:31:24.353364944 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:31:24.360029936 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:24.360173941 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:31:25.225429058 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:25.243407011 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:31:25.248410940 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:25.420727015 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:25.422081947 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:31:25.427207947 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:25.659228086 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:25.698976040 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:31:25.721406937 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:31:25.726419926 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:25.906373978 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:25.906383991 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:25.906398058 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:25.906505108 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:31:25.906521082 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:25.906614065 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:31:25.998625040 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:26.042709112 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:31:26.065277100 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:31:26.073569059 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:26.242497921 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:26.292727947 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:31:26.293395996 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:31:26.298150063 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:26.471869946 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:26.476706028 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:31:26.481641054 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:26.775567055 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:26.776868105 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:31:26.782605886 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:27.010400057 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:27.010890961 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:31:27.015750885 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:27.190749884 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:27.192105055 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:31:27.197048903 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:27.391943932 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:27.392328978 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:31:27.397183895 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:27.569900036 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:27.572585106 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:31:27.572637081 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:31:27.572685003 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:31:27.572695017 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:31:27.578309059 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:27.578428984 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:27.578447104 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:27.578489065 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:27.875850916 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:31:27.921557903 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:33:04.343250036 CEST49706587192.168.2.9185.174.175.187
                                          Sep 25, 2024 14:33:04.348323107 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:33:04.520972967 CEST58749706185.174.175.187192.168.2.9
                                          Sep 25, 2024 14:33:04.531511068 CEST49706587192.168.2.9185.174.175.187
                                          TimestampSource PortDest PortSource IPDest IP
                                          Sep 25, 2024 14:31:24.332289934 CEST5969653192.168.2.91.1.1.1
                                          Sep 25, 2024 14:31:24.340714931 CEST53596961.1.1.1192.168.2.9
                                          Sep 25, 2024 14:31:50.128532887 CEST5362133162.159.36.2192.168.2.9
                                          Sep 25, 2024 14:31:50.591991901 CEST5642953192.168.2.91.1.1.1
                                          Sep 25, 2024 14:31:50.601391077 CEST53564291.1.1.1192.168.2.9
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Sep 25, 2024 14:31:24.332289934 CEST192.168.2.91.1.1.10x5bebStandard query (0)cp8nl.hyperhost.uaA (IP address)IN (0x0001)false
                                          Sep 25, 2024 14:31:50.591991901 CEST192.168.2.91.1.1.10x3583Standard query (0)241.42.69.40.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Sep 25, 2024 14:31:24.340714931 CEST1.1.1.1192.168.2.90x5bebNo error (0)cp8nl.hyperhost.ua185.174.175.187A (IP address)IN (0x0001)false
                                          Sep 25, 2024 14:31:50.601391077 CEST1.1.1.1192.168.2.90x3583Name error (3)241.42.69.40.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                          TimestampSource PortDest PortSource IPDest IPCommands
                                          Sep 25, 2024 14:31:25.225429058 CEST58749706185.174.175.187192.168.2.9220-cp8nl.hyperhost.ua ESMTP Exim 4.97.1 #2 Wed, 25 Sep 2024 15:31:25 +0300
                                          220-We do not authorize the use of this system to transport unsolicited,
                                          220 and/or bulk e-mail.
                                          Sep 25, 2024 14:31:25.243407011 CEST49706587192.168.2.9185.174.175.187EHLO 960781
                                          Sep 25, 2024 14:31:25.420727015 CEST58749706185.174.175.187192.168.2.9250-cp8nl.hyperhost.ua Hello 960781 [8.46.123.33]
                                          250-SIZE 52428800
                                          250-8BITMIME
                                          250-PIPELINING
                                          250-PIPECONNECT
                                          250-STARTTLS
                                          250 HELP
                                          Sep 25, 2024 14:31:25.422081947 CEST49706587192.168.2.9185.174.175.187STARTTLS
                                          Sep 25, 2024 14:31:25.659228086 CEST58749706185.174.175.187192.168.2.9220 TLS go ahead

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:1
                                          Start time:08:31:20
                                          Start date:25/09/2024
                                          Path:C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe"
                                          Imagebase:0x400000
                                          File size:1'200'235 bytes
                                          MD5 hash:04BD328570A077FA407D68787942AA56
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.1358495773.0000000001690000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.1358495773.0000000001690000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000001.00000002.1358495773.0000000001690000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                          Reputation:low
                                          Has exited:true

                                          Target ID:4
                                          Start time:08:31:21
                                          Start date:25/09/2024
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe"
                                          Imagebase:0x800000
                                          File size:45'984 bytes
                                          MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2603275945.0000000002C59000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.2600972823.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2600972823.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2603275945.0000000002C2E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.2603275945.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.2603275945.0000000002BE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:high
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:3.2%
                                            Dynamic/Decrypted Code Coverage:2%
                                            Signature Coverage:4.2%
                                            Total number of Nodes:1909
                                            Total number of Limit Nodes:37
                                            execution_graph 86133 4010e0 86136 401100 86133->86136 86135 4010f8 86137 401113 86136->86137 86138 401182 86137->86138 86139 401120 86137->86139 86140 401184 86137->86140 86141 40114c 86137->86141 86142 40112c DefWindowProcW 86138->86142 86139->86142 86181 401000 Shell_NotifyIconW __setmbcp_nolock 86139->86181 86174 401250 61 API calls __setmbcp_nolock 86140->86174 86143 401151 86141->86143 86144 40119d 86141->86144 86142->86135 86146 401219 86143->86146 86147 40115d 86143->86147 86149 4011a3 86144->86149 86150 42afb4 86144->86150 86146->86139 86153 401225 86146->86153 86151 401163 86147->86151 86152 42b01d 86147->86152 86148 401193 86148->86135 86149->86139 86156 4011b6 KillTimer 86149->86156 86157 4011db SetTimer RegisterWindowMessageW 86149->86157 86176 40f190 10 API calls 86150->86176 86158 42afe9 86151->86158 86159 40116c 86151->86159 86152->86142 86180 4370f4 52 API calls 86152->86180 86183 468b0e 74 API calls __setmbcp_nolock 86153->86183 86175 401000 Shell_NotifyIconW __setmbcp_nolock 86156->86175 86157->86148 86163 401204 CreatePopupMenu 86157->86163 86178 40f190 10 API calls 86158->86178 86159->86139 86165 401174 86159->86165 86160 42b04f 86182 40e0c0 74 API calls __setmbcp_nolock 86160->86182 86163->86135 86177 45fd57 65 API calls __setmbcp_nolock 86165->86177 86168 42b00e 86179 401a50 338 API calls 86168->86179 86169 4011c9 PostQuitMessage 86169->86135 86172 42afdc 86172->86142 86173 42afe4 86172->86173 86173->86148 86174->86148 86175->86169 86176->86148 86177->86172 86178->86168 86179->86138 86180->86138 86181->86160 86182->86138 86183->86173 86184 40bd20 86185 428194 86184->86185 86186 40bd2d 86184->86186 86188 40bd43 86185->86188 86190 4281bc 86185->86190 86192 4281b2 86185->86192 86187 40bd37 86186->86187 86207 4531b1 85 API calls 5 library calls 86186->86207 86196 40bd50 86187->86196 86206 45e987 86 API calls moneypunct 86190->86206 86205 40b510 VariantClear 86192->86205 86195 4281ba 86197 426cf1 86196->86197 86198 40bd63 86196->86198 86217 44cde9 52 API calls _memmove 86197->86217 86208 40bd80 86198->86208 86201 40bd73 86201->86188 86202 426cfc 86218 40e0a0 86202->86218 86204 426d02 86205->86195 86206->86186 86207->86187 86209 40bd8e 86208->86209 86212 40bdb7 _memmove 86208->86212 86210 40bded 86209->86210 86211 40bdad 86209->86211 86209->86212 86228 4115d7 86210->86228 86222 402f00 86211->86222 86212->86201 86216 4115d7 52 API calls 86216->86212 86217->86202 86219 40e0b2 86218->86219 86220 40e0a8 86218->86220 86219->86204 86262 403c30 52 API calls _memmove 86220->86262 86223 402f10 86222->86223 86224 402f0c 86222->86224 86225 4268c3 86223->86225 86226 4115d7 52 API calls 86223->86226 86224->86212 86227 402f51 moneypunct _memmove 86226->86227 86227->86212 86230 4115e1 _malloc 86228->86230 86231 40bdf6 86230->86231 86234 4115fd std::exception::exception 86230->86234 86239 4135bb 86230->86239 86231->86212 86231->86216 86233 411645 86255 418105 RaiseException 86233->86255 86238 41163b 86234->86238 86253 41130a 51 API calls __cinit 86234->86253 86237 411656 86254 4180af 46 API calls std::exception::operator= 86238->86254 86240 413638 _malloc 86239->86240 86242 4135c9 _malloc 86239->86242 86261 417f77 46 API calls __getptd_noexit 86240->86261 86241 4135d4 86241->86242 86256 418901 46 API calls 2 library calls 86241->86256 86257 418752 46 API calls 8 library calls 86241->86257 86258 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86241->86258 86242->86241 86245 4135f7 RtlAllocateHeap 86242->86245 86248 413624 86242->86248 86251 413622 86242->86251 86245->86242 86246 413630 86245->86246 86246->86230 86259 417f77 46 API calls __getptd_noexit 86248->86259 86260 417f77 46 API calls __getptd_noexit 86251->86260 86253->86238 86254->86233 86255->86237 86256->86241 86257->86241 86259->86251 86260->86246 86261->86246 86262->86219 86263 425ba2 86268 40e360 86263->86268 86265 425bb4 86284 41130a 51 API calls __cinit 86265->86284 86267 425bbe 86269 4115d7 52 API calls 86268->86269 86270 40e3ec GetModuleFileNameW 86269->86270 86285 413a0e 86270->86285 86272 40e421 _wcsncat 86288 413a9e 86272->86288 86275 4115d7 52 API calls 86276 40e45e _wcscpy 86275->86276 86291 40bc70 86276->86291 86280 40e4a9 86280->86265 86281 401c90 52 API calls 86283 40e4a1 _wcscat _wcslen _wcsncpy 86281->86283 86282 4115d7 52 API calls 86282->86283 86283->86280 86283->86281 86283->86282 86284->86267 86310 413801 86285->86310 86340 419efd 86288->86340 86292 4115d7 52 API calls 86291->86292 86293 40bc98 86292->86293 86294 4115d7 52 API calls 86293->86294 86295 40bca6 86294->86295 86296 40e4c0 86295->86296 86352 403350 86296->86352 86298 40e4cb RegOpenKeyExW 86299 427190 RegQueryValueExW 86298->86299 86300 40e4eb 86298->86300 86301 4271b0 86299->86301 86302 42721a RegCloseKey 86299->86302 86300->86283 86303 4115d7 52 API calls 86301->86303 86302->86283 86304 4271cb 86303->86304 86359 43652f 52 API calls 86304->86359 86306 4271d8 RegQueryValueExW 86307 42720e 86306->86307 86308 4271f7 86306->86308 86307->86302 86360 402160 86308->86360 86311 41389e 86310->86311 86317 41381a 86310->86317 86312 4139e8 86311->86312 86313 413a00 86311->86313 86337 417f77 46 API calls __getptd_noexit 86312->86337 86339 417f77 46 API calls __getptd_noexit 86313->86339 86316 4139ed 86338 417f25 10 API calls __wsopen_helper 86316->86338 86317->86311 86325 41388a 86317->86325 86332 419e30 46 API calls __wsopen_helper 86317->86332 86320 41396c 86320->86311 86321 413967 86320->86321 86323 41397a 86320->86323 86321->86272 86322 413929 86322->86311 86324 413945 86322->86324 86334 419e30 46 API calls __wsopen_helper 86322->86334 86336 419e30 46 API calls __wsopen_helper 86323->86336 86324->86311 86324->86321 86327 41395b 86324->86327 86325->86311 86331 413909 86325->86331 86333 419e30 46 API calls __wsopen_helper 86325->86333 86335 419e30 46 API calls __wsopen_helper 86327->86335 86331->86320 86331->86322 86332->86325 86333->86331 86334->86324 86335->86321 86336->86321 86337->86316 86338->86321 86339->86321 86341 419f13 86340->86341 86342 419f0e 86340->86342 86349 417f77 46 API calls __getptd_noexit 86341->86349 86342->86341 86343 419f2b 86342->86343 86347 40e454 86343->86347 86351 417f77 46 API calls __getptd_noexit 86343->86351 86347->86275 86348 419f18 86350 417f25 10 API calls __wsopen_helper 86348->86350 86349->86348 86350->86347 86351->86348 86353 403367 86352->86353 86354 403358 86352->86354 86355 4115d7 52 API calls 86353->86355 86354->86298 86356 403370 86355->86356 86357 4115d7 52 API calls 86356->86357 86358 40339e 86357->86358 86358->86298 86359->86306 86361 426daa 86360->86361 86362 40216b _wcslen 86360->86362 86375 40c600 86361->86375 86365 402180 86362->86365 86366 40219e 86362->86366 86364 426db5 86364->86307 86373 403bd0 52 API calls moneypunct 86365->86373 86374 4013a0 52 API calls 86366->86374 86369 4021a5 86371 426db7 86369->86371 86372 4115d7 52 API calls 86369->86372 86370 402187 _memmove 86370->86307 86372->86370 86373->86370 86374->86369 86376 40c619 86375->86376 86377 40c60a 86375->86377 86376->86364 86377->86376 86380 4026f0 86377->86380 86379 426d7a _memmove 86379->86364 86381 426873 86380->86381 86382 4026ff 86380->86382 86387 4013a0 52 API calls 86381->86387 86382->86379 86384 42687b 86385 4115d7 52 API calls 86384->86385 86386 42689e _memmove 86385->86386 86386->86379 86387->86384 86388 416454 86425 416c70 86388->86425 86390 416460 GetStartupInfoW 86391 416474 86390->86391 86426 419d5a HeapCreate 86391->86426 86393 4164cd 86394 4164d8 86393->86394 86510 41642b 46 API calls 3 library calls 86393->86510 86427 417c20 GetModuleHandleW 86394->86427 86397 4164de 86398 4164e9 __RTC_Initialize 86397->86398 86511 41642b 46 API calls 3 library calls 86397->86511 86446 41aaa1 GetStartupInfoW 86398->86446 86402 416503 GetCommandLineW 86459 41f584 GetEnvironmentStringsW 86402->86459 86405 416513 86465 41f4d6 GetModuleFileNameW 86405->86465 86408 41651d 86409 416528 86408->86409 86513 411924 46 API calls 3 library calls 86408->86513 86469 41f2a4 86409->86469 86412 41652e 86413 416539 86412->86413 86514 411924 46 API calls 3 library calls 86412->86514 86483 411703 86413->86483 86416 416541 86418 41654c __wwincmdln 86416->86418 86515 411924 46 API calls 3 library calls 86416->86515 86487 40d6b0 86418->86487 86421 41657c 86517 411906 46 API calls _doexit 86421->86517 86424 416581 __wsopen_helper 86425->86390 86426->86393 86428 417c34 86427->86428 86429 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 86427->86429 86518 4178ff 49 API calls _free 86428->86518 86430 417c87 TlsAlloc 86429->86430 86434 417cd5 TlsSetValue 86430->86434 86435 417d96 86430->86435 86433 417c39 86433->86397 86434->86435 86436 417ce6 __init_pointers 86434->86436 86435->86397 86519 418151 InitializeCriticalSectionAndSpinCount 86436->86519 86438 417d91 86527 4178ff 49 API calls _free 86438->86527 86440 417d2a 86440->86438 86520 416b49 86440->86520 86443 417d76 86526 41793c 46 API calls 4 library calls 86443->86526 86445 417d7e GetCurrentThreadId 86445->86435 86447 416b49 __calloc_crt 46 API calls 86446->86447 86448 41aabf 86447->86448 86449 41ac34 86448->86449 86451 416b49 __calloc_crt 46 API calls 86448->86451 86453 4164f7 86448->86453 86455 41abb4 86448->86455 86450 41ac6a GetStdHandle 86449->86450 86452 41acce SetHandleCount 86449->86452 86454 41ac7c GetFileType 86449->86454 86458 41aca2 InitializeCriticalSectionAndSpinCount 86449->86458 86450->86449 86451->86448 86452->86453 86453->86402 86512 411924 46 API calls 3 library calls 86453->86512 86454->86449 86455->86449 86456 41abe0 GetFileType 86455->86456 86457 41abeb InitializeCriticalSectionAndSpinCount 86455->86457 86456->86455 86456->86457 86457->86453 86457->86455 86458->86449 86458->86453 86460 41f595 86459->86460 86461 41f599 86459->86461 86460->86405 86537 416b04 86461->86537 86463 41f5bb _memmove 86464 41f5c2 FreeEnvironmentStringsW 86463->86464 86464->86405 86466 41f50b _wparse_cmdline 86465->86466 86467 416b04 __malloc_crt 46 API calls 86466->86467 86468 41f54e _wparse_cmdline 86466->86468 86467->86468 86468->86408 86470 41f2bc _wcslen 86469->86470 86473 41f2b4 86469->86473 86471 416b49 __calloc_crt 46 API calls 86470->86471 86472 41f2e0 _wcslen 86471->86472 86472->86473 86474 41f336 86472->86474 86476 416b49 __calloc_crt 46 API calls 86472->86476 86477 41f35c 86472->86477 86480 41f373 86472->86480 86543 41ef12 46 API calls __wsopen_helper 86472->86543 86473->86412 86544 413748 86474->86544 86476->86472 86478 413748 _free 46 API calls 86477->86478 86478->86473 86550 417ed3 86480->86550 86482 41f37f 86482->86412 86484 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 86483->86484 86486 411750 __IsNonwritableInCurrentImage 86484->86486 86569 41130a 51 API calls __cinit 86484->86569 86486->86416 86488 42e2f3 86487->86488 86489 40d6cc 86487->86489 86570 408f40 86489->86570 86491 40d707 86574 40ebb0 86491->86574 86496 40d737 86577 411951 86496->86577 86499 40d751 86589 40f4e0 SystemParametersInfoW SystemParametersInfoW 86499->86589 86501 40d75f 86590 40d590 GetCurrentDirectoryW 86501->86590 86503 40d767 SystemParametersInfoW 86504 40d794 86503->86504 86505 40d78d FreeLibrary 86503->86505 86506 408f40 VariantClear 86504->86506 86505->86504 86507 40d79d 86506->86507 86508 408f40 VariantClear 86507->86508 86509 40d7a6 86508->86509 86509->86421 86516 4118da 46 API calls _doexit 86509->86516 86510->86394 86511->86398 86516->86421 86517->86424 86518->86433 86519->86440 86522 416b52 86520->86522 86523 416b8f 86522->86523 86524 416b70 Sleep 86522->86524 86528 41f677 86522->86528 86523->86438 86523->86443 86525 416b85 86524->86525 86525->86522 86525->86523 86526->86445 86527->86435 86529 41f683 86528->86529 86534 41f69e _malloc 86528->86534 86530 41f68f 86529->86530 86529->86534 86536 417f77 46 API calls __getptd_noexit 86530->86536 86531 41f6b1 HeapAlloc 86533 41f6d8 86531->86533 86531->86534 86533->86522 86534->86531 86534->86533 86535 41f694 86535->86522 86536->86535 86539 416b0d 86537->86539 86538 4135bb _malloc 45 API calls 86538->86539 86539->86538 86540 416b43 86539->86540 86541 416b24 Sleep 86539->86541 86540->86463 86542 416b39 86541->86542 86542->86539 86542->86540 86543->86472 86545 41377c __dosmaperr 86544->86545 86546 413753 RtlFreeHeap 86544->86546 86545->86473 86546->86545 86547 413768 86546->86547 86553 417f77 46 API calls __getptd_noexit 86547->86553 86549 41376e GetLastError 86549->86545 86554 417daa 86550->86554 86553->86549 86555 417dc9 __setmbcp_nolock __call_reportfault 86554->86555 86556 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 86555->86556 86559 417eb5 __call_reportfault 86556->86559 86558 417ed1 GetCurrentProcess TerminateProcess 86558->86482 86560 41a208 86559->86560 86561 41a210 86560->86561 86562 41a212 IsDebuggerPresent 86560->86562 86561->86558 86568 41fe19 86562->86568 86565 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 86566 421ff0 __call_reportfault 86565->86566 86567 421ff8 GetCurrentProcess TerminateProcess 86565->86567 86566->86567 86567->86558 86568->86565 86569->86486 86571 408f48 moneypunct 86570->86571 86572 4265c7 VariantClear 86571->86572 86573 408f55 moneypunct 86571->86573 86572->86573 86573->86491 86630 40ebd0 86574->86630 86634 4182cb 86577->86634 86579 41195e 86641 4181f2 LeaveCriticalSection 86579->86641 86581 40d748 86582 4119b0 86581->86582 86583 4119d6 86582->86583 86584 4119bc 86582->86584 86583->86499 86584->86583 86676 417f77 46 API calls __getptd_noexit 86584->86676 86586 4119c6 86677 417f25 10 API calls __wsopen_helper 86586->86677 86588 4119d1 86588->86499 86589->86501 86678 401f20 86590->86678 86592 40d5b6 IsDebuggerPresent 86593 40d5c4 86592->86593 86594 42e1bb MessageBoxA 86592->86594 86595 42e1d4 86593->86595 86596 40d5e3 86593->86596 86594->86595 86851 403a50 52 API calls 3 library calls 86595->86851 86748 40f520 86596->86748 86600 40d5fd GetFullPathNameW 86760 401460 86600->86760 86602 40d63b 86603 40d643 86602->86603 86604 42e231 SetCurrentDirectoryW 86602->86604 86605 40d64c 86603->86605 86852 432fee 6 API calls 86603->86852 86604->86603 86775 410390 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 86605->86775 86608 42e252 86608->86605 86610 42e25a GetModuleFileNameW 86608->86610 86612 42e274 86610->86612 86613 42e2cb GetForegroundWindow ShellExecuteW 86610->86613 86853 401b10 86612->86853 86617 40d688 86613->86617 86615 40d669 86783 4091e0 86615->86783 86616 40d656 86616->86615 86849 40e0c0 74 API calls __setmbcp_nolock 86616->86849 86622 40d692 SetCurrentDirectoryW 86617->86622 86622->86503 86624 42e28d 86860 40d200 52 API calls 2 library calls 86624->86860 86627 42e299 GetForegroundWindow ShellExecuteW 86628 42e2c6 86627->86628 86628->86617 86629 40ec00 LoadLibraryA GetProcAddress 86629->86496 86631 40d72e 86630->86631 86632 40ebd6 LoadLibraryA 86630->86632 86631->86496 86631->86629 86632->86631 86633 40ebe7 GetProcAddress 86632->86633 86633->86631 86635 4182e0 86634->86635 86636 4182f3 EnterCriticalSection 86634->86636 86642 418209 86635->86642 86636->86579 86638 4182e6 86638->86636 86669 411924 46 API calls 3 library calls 86638->86669 86641->86581 86643 418215 __wsopen_helper 86642->86643 86644 418225 86643->86644 86645 41823d 86643->86645 86670 418901 46 API calls 2 library calls 86644->86670 86647 416b04 __malloc_crt 45 API calls 86645->86647 86653 41824b __wsopen_helper 86645->86653 86649 418256 86647->86649 86648 41822a 86671 418752 46 API calls 8 library calls 86648->86671 86651 41825d 86649->86651 86652 41826c 86649->86652 86673 417f77 46 API calls __getptd_noexit 86651->86673 86657 4182cb __lock 45 API calls 86652->86657 86653->86638 86654 418231 86672 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 86654->86672 86659 418273 86657->86659 86660 4182a6 86659->86660 86661 41827b InitializeCriticalSectionAndSpinCount 86659->86661 86662 413748 _free 45 API calls 86660->86662 86663 418297 86661->86663 86664 41828b 86661->86664 86662->86663 86675 4182c2 LeaveCriticalSection _doexit 86663->86675 86665 413748 _free 45 API calls 86664->86665 86666 418291 86665->86666 86674 417f77 46 API calls __getptd_noexit 86666->86674 86670->86648 86671->86654 86673->86653 86674->86663 86675->86653 86676->86586 86677->86588 86861 40e6e0 86678->86861 86682 401f41 GetModuleFileNameW 86879 410100 86682->86879 86684 401f5c 86891 410960 86684->86891 86687 401b10 52 API calls 86688 401f81 86687->86688 86894 401980 86688->86894 86690 401f8e 86691 408f40 VariantClear 86690->86691 86692 401f9d 86691->86692 86693 401b10 52 API calls 86692->86693 86694 401fb4 86693->86694 86695 401980 53 API calls 86694->86695 86696 401fc3 86695->86696 86697 401b10 52 API calls 86696->86697 86698 401fd2 86697->86698 86902 40c2c0 86698->86902 86700 401fe1 86701 40bc70 52 API calls 86700->86701 86702 401ff3 86701->86702 86920 401a10 86702->86920 86704 401ffe 86927 4114ab 86704->86927 86707 428b05 86709 401a10 52 API calls 86707->86709 86708 402017 86710 4114ab __wcsicoll 58 API calls 86708->86710 86711 428b18 86709->86711 86712 402022 86710->86712 86714 401a10 52 API calls 86711->86714 86712->86711 86713 40202d 86712->86713 86715 4114ab __wcsicoll 58 API calls 86713->86715 86716 428b33 86714->86716 86717 402038 86715->86717 86719 428b3b GetModuleFileNameW 86716->86719 86718 402043 86717->86718 86717->86719 86720 4114ab __wcsicoll 58 API calls 86718->86720 86721 401a10 52 API calls 86719->86721 86722 40204e 86720->86722 86723 428b6c 86721->86723 86724 402092 86722->86724 86729 401a10 52 API calls 86722->86729 86731 428b90 _wcscpy 86722->86731 86725 40e0a0 52 API calls 86723->86725 86726 4020a3 86724->86726 86724->86731 86727 428b7a 86725->86727 86728 428bc6 86726->86728 86935 40e830 53 API calls 86726->86935 86730 401a10 52 API calls 86727->86730 86733 402073 _wcscpy 86729->86733 86734 428b88 86730->86734 86735 401a10 52 API calls 86731->86735 86739 401a10 52 API calls 86733->86739 86734->86731 86743 4020d0 86735->86743 86736 4020bb 86936 40cf00 53 API calls 86736->86936 86738 4020c6 86740 408f40 VariantClear 86738->86740 86739->86724 86740->86743 86741 402110 86745 408f40 VariantClear 86741->86745 86743->86741 86746 401a10 52 API calls 86743->86746 86937 40cf00 53 API calls 86743->86937 86938 40e6a0 53 API calls 86743->86938 86747 402120 moneypunct 86745->86747 86746->86743 86747->86592 86749 40f53c 86748->86749 86751 4295c9 __setmbcp_nolock 86748->86751 87618 410120 86749->87618 86752 4295d9 GetOpenFileNameW 86751->86752 86752->86749 86754 40d5f5 86752->86754 86753 40f545 87622 4102b0 SHGetMalloc 86753->87622 86754->86600 86754->86602 86756 40f54c 87627 410190 GetFullPathNameW 86756->87627 86758 40f559 87638 40f570 86758->87638 87694 402400 86760->87694 86762 40146f 86764 428c29 _wcscat 86762->86764 87703 401500 86762->87703 86765 40147c 86765->86764 87711 40d440 86765->87711 86767 401489 86767->86764 86768 401491 GetFullPathNameW 86767->86768 86769 402160 52 API calls 86768->86769 86770 4014bb 86769->86770 86771 402160 52 API calls 86770->86771 86772 4014c8 86771->86772 86772->86764 86773 402160 52 API calls 86772->86773 86774 4014ee 86773->86774 86774->86602 86776 428361 86775->86776 86777 4103fc LoadImageW RegisterClassExW 86775->86777 87782 44395e EnumResourceNamesW LoadImageW 86776->87782 87781 410490 7 API calls 86777->87781 86780 40d651 86782 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 86780->86782 86781 428368 86782->86616 86784 409202 86783->86784 86785 42d7ad 86783->86785 86840 409216 moneypunct 86784->86840 87919 410940 338 API calls 86784->87919 87922 45e737 90 API calls 3 library calls 86785->87922 86788 409386 86789 40939c 86788->86789 87920 40f190 10 API calls 86788->87920 86789->86617 86850 401000 Shell_NotifyIconW __setmbcp_nolock 86789->86850 86791 4095b2 86791->86789 86792 4095bf 86791->86792 87921 401a50 338 API calls 86792->87921 86793 409253 PeekMessageW 86793->86840 86795 42d8cd Sleep 86795->86840 86796 4095c6 LockWindowUpdate DestroyWindow GetMessageW 86796->86789 86799 4095f9 86796->86799 86798 42e13b 87940 40d410 VariantClear 86798->87940 86801 42e158 TranslateMessage DispatchMessageW GetMessageW 86799->86801 86801->86801 86804 42e188 86801->86804 86803 409567 PeekMessageW 86803->86840 86804->86789 86807 44c29d 52 API calls 86847 4094e0 86807->86847 86808 46f3c1 107 API calls 86808->86840 86809 40e0a0 52 API calls 86809->86840 86810 46fdbf 108 API calls 86810->86847 86811 409551 TranslateMessage DispatchMessageW 86811->86803 86813 42dcd2 WaitForSingleObject 86815 42dcf0 GetExitCodeProcess CloseHandle 86813->86815 86813->86840 86814 42dd3d Sleep 86814->86847 87929 40d410 VariantClear 86815->87929 86819 4094cf Sleep 86819->86847 86821 40d410 VariantClear 86821->86840 86823 42d94d timeGetTime 87925 465124 53 API calls 86823->87925 86824 40c620 timeGetTime 86824->86847 86827 42dd89 CloseHandle 86827->86847 86828 47d33e 316 API calls 86828->86840 86830 465124 53 API calls 86830->86847 86831 42de19 GetExitCodeProcess CloseHandle 86831->86847 86834 42de88 Sleep 86834->86840 86837 45e737 90 API calls 86837->86840 86840->86788 86840->86793 86840->86795 86840->86798 86840->86803 86840->86808 86840->86809 86840->86811 86840->86813 86840->86814 86840->86819 86840->86821 86840->86823 86840->86828 86840->86837 86841 42e0cc VariantClear 86840->86841 86842 408f40 VariantClear 86840->86842 86840->86847 87783 4091b0 86840->87783 87841 40afa0 86840->87841 87867 408fc0 86840->87867 87902 408cc0 86840->87902 87916 4096a0 338 API calls 4 library calls 86840->87916 87917 40d150 TranslateAcceleratorW 86840->87917 87918 40d170 IsDialogMessageW GetClassLongW 86840->87918 87923 465124 53 API calls 86840->87923 87924 40c620 timeGetTime 86840->87924 87939 40e270 VariantClear moneypunct 86840->87939 86841->86840 86842->86840 86844 401980 53 API calls 86844->86847 86845 401b10 52 API calls 86845->86847 86847->86807 86847->86810 86847->86824 86847->86827 86847->86830 86847->86831 86847->86834 86847->86840 86847->86844 86847->86845 86848 408f40 VariantClear 86847->86848 87926 45178a 54 API calls 86847->87926 87927 47d33e 338 API calls 86847->87927 87928 453bc6 54 API calls 86847->87928 87930 40d410 VariantClear 86847->87930 87931 443d19 67 API calls _wcslen 86847->87931 87932 4574b4 VariantClear 86847->87932 87933 403cd0 86847->87933 87937 4731e1 VariantClear 86847->87937 87938 4331a2 6 API calls 86847->87938 86848->86847 86849->86615 86850->86617 86851->86602 86852->86608 86854 401b16 _wcslen 86853->86854 86855 4115d7 52 API calls 86854->86855 86858 401b63 86854->86858 86856 401b4b _memmove 86855->86856 86857 4115d7 52 API calls 86856->86857 86857->86858 86859 40d200 52 API calls 2 library calls 86858->86859 86859->86624 86860->86627 86862 40bc70 52 API calls 86861->86862 86863 401f31 86862->86863 86864 402560 86863->86864 86865 40256d __write_nolock 86864->86865 86866 402160 52 API calls 86865->86866 86868 402593 86866->86868 86878 4025bd 86868->86878 86939 401c90 86868->86939 86869 4026f0 52 API calls 86869->86878 86870 4026a7 86871 401b10 52 API calls 86870->86871 86877 4026db 86870->86877 86873 4026d1 86871->86873 86872 401b10 52 API calls 86872->86878 86943 40d7c0 52 API calls 2 library calls 86873->86943 86874 401c90 52 API calls 86874->86878 86877->86682 86878->86869 86878->86870 86878->86872 86878->86874 86942 40d7c0 52 API calls 2 library calls 86878->86942 86944 40f760 86879->86944 86882 410118 86882->86684 86884 42805d 86887 42806a 86884->86887 87000 431e58 86884->87000 86886 413748 _free 46 API calls 86888 428078 86886->86888 86887->86886 86889 431e58 82 API calls 86888->86889 86890 428084 86889->86890 86890->86684 86892 4115d7 52 API calls 86891->86892 86893 401f74 86892->86893 86893->86687 86895 4019a3 86894->86895 86896 401985 86894->86896 86895->86896 86897 4019b8 86895->86897 86899 40199f 86896->86899 87606 403e10 53 API calls 86896->87606 87607 403e10 53 API calls 86897->87607 86899->86690 86900 4019c4 86900->86690 86903 40c2c7 86902->86903 86904 40c30e 86902->86904 86905 40c2d3 86903->86905 86906 426c79 86903->86906 86907 40c315 86904->86907 86908 426c2b 86904->86908 87608 403ea0 52 API calls __cinit 86905->87608 87613 4534e3 52 API calls 86906->87613 86912 40c321 86907->86912 86913 426c5a 86907->86913 86910 426c4b 86908->86910 86911 426c2e 86908->86911 87611 4534e3 52 API calls 86910->87611 86918 40c2de 86911->86918 87610 4534e3 52 API calls 86911->87610 87609 403ea0 52 API calls __cinit 86912->87609 87612 4534e3 52 API calls 86913->87612 86918->86700 86921 401a30 86920->86921 86922 401a17 86920->86922 86924 402160 52 API calls 86921->86924 86923 401a2d 86922->86923 87614 403c30 52 API calls _memmove 86922->87614 86923->86704 86926 401a3d 86924->86926 86926->86704 86928 411523 86927->86928 86929 4114ba 86927->86929 87617 4113a8 58 API calls 3 library calls 86928->87617 86934 40200c 86929->86934 87615 417f77 46 API calls __getptd_noexit 86929->87615 86932 4114c6 87616 417f25 10 API calls __wsopen_helper 86932->87616 86934->86707 86934->86708 86935->86736 86936->86738 86937->86743 86938->86743 86940 4026f0 52 API calls 86939->86940 86941 401c97 86940->86941 86941->86868 86942->86878 86943->86877 87004 40f6f0 86944->87004 86946 40f77b _strcat moneypunct 87012 40f850 86946->87012 86951 427c2a 87042 414d04 86951->87042 86953 40f7fc 86953->86951 86954 40f804 86953->86954 87029 414a46 86954->87029 86959 40f80e 86959->86882 86963 4528bd 86959->86963 86960 427c59 87048 414fe2 86960->87048 86962 427c79 86964 4150d1 _fseek 81 API calls 86963->86964 86965 452930 86964->86965 87548 452719 86965->87548 86968 452948 86968->86884 86969 414d04 __fread_nolock 61 API calls 86970 452966 86969->86970 86971 414d04 __fread_nolock 61 API calls 86970->86971 86972 452976 86971->86972 86973 414d04 __fread_nolock 61 API calls 86972->86973 86974 45298f 86973->86974 86975 414d04 __fread_nolock 61 API calls 86974->86975 86976 4529aa 86975->86976 86977 4150d1 _fseek 81 API calls 86976->86977 86978 4529c4 86977->86978 86979 4135bb _malloc 46 API calls 86978->86979 86980 4529cf 86979->86980 86981 4135bb _malloc 46 API calls 86980->86981 86982 4529db 86981->86982 86983 414d04 __fread_nolock 61 API calls 86982->86983 86984 4529ec 86983->86984 86985 44afef GetSystemTimeAsFileTime 86984->86985 86986 452a00 86985->86986 86987 452a36 86986->86987 86988 452a13 86986->86988 86989 452aa5 86987->86989 86990 452a3c 86987->86990 86991 413748 _free 46 API calls 86988->86991 86993 413748 _free 46 API calls 86989->86993 87554 44b1a9 86990->87554 86994 452a1c 86991->86994 86997 452aa3 86993->86997 86995 413748 _free 46 API calls 86994->86995 86998 452a25 86995->86998 86996 452a9d 86999 413748 _free 46 API calls 86996->86999 86997->86884 86998->86884 86999->86997 87001 431e64 87000->87001 87003 431e6a 87000->87003 87002 414a46 __fcloseall 82 API calls 87001->87002 87002->87003 87003->86887 87005 425de2 87004->87005 87007 40f6fc _wcslen 87004->87007 87005->86946 87006 40f710 WideCharToMultiByte 87008 40f756 87006->87008 87009 40f728 87006->87009 87007->87006 87008->86946 87010 4115d7 52 API calls 87009->87010 87011 40f735 WideCharToMultiByte 87010->87011 87011->86946 87014 40f85d __setmbcp_nolock _strlen 87012->87014 87013 426b3b 87014->87013 87016 40f7ab 87014->87016 87061 414db8 87014->87061 87017 4149c2 87016->87017 87076 414904 87017->87076 87019 40f7e9 87019->86951 87020 40f5c0 87019->87020 87025 40f5cd _strcat __write_nolock _memmove 87020->87025 87021 414d04 __fread_nolock 61 API calls 87021->87025 87023 425d11 87024 4150d1 _fseek 81 API calls 87023->87024 87026 425d33 87024->87026 87025->87021 87025->87023 87028 40f691 __tzset_nolock 87025->87028 87164 4150d1 87025->87164 87027 414d04 __fread_nolock 61 API calls 87026->87027 87027->87028 87028->86953 87030 414a52 __wsopen_helper 87029->87030 87031 414a64 87030->87031 87032 414a79 87030->87032 87304 417f77 46 API calls __getptd_noexit 87031->87304 87035 415471 __lock_file 47 API calls 87032->87035 87039 414a74 __wsopen_helper 87032->87039 87034 414a69 87305 417f25 10 API calls __wsopen_helper 87034->87305 87037 414a92 87035->87037 87288 4149d9 87037->87288 87039->86959 87373 414c76 87042->87373 87044 414d1c 87045 44afef 87044->87045 87541 442c5a 87045->87541 87047 44b00d 87047->86960 87049 414fee __wsopen_helper 87048->87049 87050 414ffa 87049->87050 87051 41500f 87049->87051 87545 417f77 46 API calls __getptd_noexit 87050->87545 87053 415471 __lock_file 47 API calls 87051->87053 87055 415017 87053->87055 87054 414fff 87546 417f25 10 API calls __wsopen_helper 87054->87546 87057 414e4e __ftell_nolock 51 API calls 87055->87057 87058 415024 87057->87058 87547 41503d LeaveCriticalSection LeaveCriticalSection _fprintf 87058->87547 87060 41500a __wsopen_helper 87060->86962 87062 414dd6 87061->87062 87063 414deb 87061->87063 87072 417f77 46 API calls __getptd_noexit 87062->87072 87063->87062 87064 414df2 87063->87064 87074 41b91b 79 API calls 11 library calls 87064->87074 87067 414ddb 87073 417f25 10 API calls __wsopen_helper 87067->87073 87068 414e18 87070 414de6 87068->87070 87075 418f98 77 API calls 6 library calls 87068->87075 87070->87014 87072->87067 87073->87070 87074->87068 87075->87070 87077 414910 __wsopen_helper 87076->87077 87078 414923 87077->87078 87081 414951 87077->87081 87132 417f77 46 API calls __getptd_noexit 87078->87132 87080 414928 87133 417f25 10 API calls __wsopen_helper 87080->87133 87095 41d4d1 87081->87095 87084 414956 87085 41496a 87084->87085 87086 41495d 87084->87086 87088 414992 87085->87088 87089 414972 87085->87089 87134 417f77 46 API calls __getptd_noexit 87086->87134 87112 41d218 87088->87112 87135 417f77 46 API calls __getptd_noexit 87089->87135 87091 414933 __wsopen_helper @_EH4_CallFilterFunc@8 87091->87019 87096 41d4dd __wsopen_helper 87095->87096 87097 4182cb __lock 46 API calls 87096->87097 87109 41d4eb 87097->87109 87098 41d567 87100 416b04 __malloc_crt 46 API calls 87098->87100 87102 41d56e 87100->87102 87101 41d5f0 __wsopen_helper 87101->87084 87103 41d57c InitializeCriticalSectionAndSpinCount 87102->87103 87110 41d560 87102->87110 87106 41d59c 87103->87106 87107 41d5af EnterCriticalSection 87103->87107 87104 418209 __mtinitlocknum 46 API calls 87104->87109 87108 413748 _free 46 API calls 87106->87108 87107->87110 87108->87110 87109->87098 87109->87104 87109->87110 87140 4154b2 47 API calls __lock 87109->87140 87141 415520 LeaveCriticalSection LeaveCriticalSection _doexit 87109->87141 87137 41d5fb 87110->87137 87113 41d23a 87112->87113 87114 41d255 87113->87114 87126 41d26c __wopenfile 87113->87126 87146 417f77 46 API calls __getptd_noexit 87114->87146 87116 41d421 87119 41d47a 87116->87119 87120 41d48c 87116->87120 87117 41d25a 87147 417f25 10 API calls __wsopen_helper 87117->87147 87151 417f77 46 API calls __getptd_noexit 87119->87151 87143 422bf9 87120->87143 87123 41499d 87136 4149b8 LeaveCriticalSection LeaveCriticalSection _fprintf 87123->87136 87124 41d47f 87152 417f25 10 API calls __wsopen_helper 87124->87152 87126->87116 87126->87119 87126->87126 87148 41341f 58 API calls 2 library calls 87126->87148 87128 41d41a 87128->87116 87149 41341f 58 API calls 2 library calls 87128->87149 87130 41d439 87130->87116 87150 41341f 58 API calls 2 library calls 87130->87150 87132->87080 87133->87091 87134->87091 87135->87091 87136->87091 87142 4181f2 LeaveCriticalSection 87137->87142 87139 41d602 87139->87101 87140->87109 87141->87109 87142->87139 87153 422b35 87143->87153 87145 422c14 87145->87123 87146->87117 87147->87123 87148->87128 87149->87130 87150->87116 87151->87124 87152->87123 87156 422b41 __wsopen_helper 87153->87156 87154 422b54 87155 417f77 __wsopen_helper 46 API calls 87154->87155 87157 422b59 87155->87157 87156->87154 87158 422b8a 87156->87158 87159 417f25 __wsopen_helper 10 API calls 87157->87159 87160 422400 __tsopen_nolock 109 API calls 87158->87160 87163 422b63 __wsopen_helper 87159->87163 87161 422ba4 87160->87161 87162 422bcb __wsopen_helper LeaveCriticalSection 87161->87162 87162->87163 87163->87145 87165 4150dd __wsopen_helper 87164->87165 87166 4150e9 87165->87166 87167 41510f 87165->87167 87195 417f77 46 API calls __getptd_noexit 87166->87195 87177 415471 87167->87177 87170 4150ee 87196 417f25 10 API calls __wsopen_helper 87170->87196 87176 4150f9 __wsopen_helper 87176->87025 87178 415483 87177->87178 87179 4154a5 EnterCriticalSection 87177->87179 87178->87179 87180 41548b 87178->87180 87182 415117 87179->87182 87181 4182cb __lock 46 API calls 87180->87181 87181->87182 87183 415047 87182->87183 87184 415067 87183->87184 87185 415057 87183->87185 87190 415079 87184->87190 87198 414e4e 87184->87198 87253 417f77 46 API calls __getptd_noexit 87185->87253 87189 41505c 87197 415143 LeaveCriticalSection LeaveCriticalSection _fprintf 87189->87197 87215 41443c 87190->87215 87193 4150b9 87228 41e1f4 87193->87228 87195->87170 87196->87176 87197->87176 87199 414e61 87198->87199 87200 414e79 87198->87200 87254 417f77 46 API calls __getptd_noexit 87199->87254 87202 414139 __fputwc_nolock 46 API calls 87200->87202 87204 414e80 87202->87204 87203 414e66 87255 417f25 10 API calls __wsopen_helper 87203->87255 87206 41e1f4 __write 51 API calls 87204->87206 87207 414e97 87206->87207 87208 414f09 87207->87208 87210 414ec9 87207->87210 87214 414e71 87207->87214 87256 417f77 46 API calls __getptd_noexit 87208->87256 87211 41e1f4 __write 51 API calls 87210->87211 87210->87214 87212 414f64 87211->87212 87213 41e1f4 __write 51 API calls 87212->87213 87212->87214 87213->87214 87214->87190 87216 414455 87215->87216 87220 414477 87215->87220 87217 414139 __fputwc_nolock 46 API calls 87216->87217 87216->87220 87218 414470 87217->87218 87257 41b7b2 77 API calls 5 library calls 87218->87257 87221 414139 87220->87221 87222 414145 87221->87222 87223 41415a 87221->87223 87258 417f77 46 API calls __getptd_noexit 87222->87258 87223->87193 87225 41414a 87259 417f25 10 API calls __wsopen_helper 87225->87259 87227 414155 87227->87193 87229 41e200 __wsopen_helper 87228->87229 87230 41e223 87229->87230 87231 41e208 87229->87231 87232 41e22f 87230->87232 87238 41e269 87230->87238 87280 417f8a 46 API calls __getptd_noexit 87231->87280 87282 417f8a 46 API calls __getptd_noexit 87232->87282 87234 41e20d 87281 417f77 46 API calls __getptd_noexit 87234->87281 87237 41e234 87283 417f77 46 API calls __getptd_noexit 87237->87283 87260 41ae56 87238->87260 87241 41e26f 87243 41e291 87241->87243 87244 41e27d 87241->87244 87242 41e23c 87284 417f25 10 API calls __wsopen_helper 87242->87284 87285 417f77 46 API calls __getptd_noexit 87243->87285 87270 41e17f 87244->87270 87248 41e215 __wsopen_helper 87248->87189 87249 41e289 87287 41e2c0 LeaveCriticalSection __unlock_fhandle 87249->87287 87250 41e296 87286 417f8a 46 API calls __getptd_noexit 87250->87286 87253->87189 87254->87203 87255->87214 87256->87214 87257->87220 87258->87225 87259->87227 87261 41ae62 __wsopen_helper 87260->87261 87262 41aebc 87261->87262 87263 4182cb __lock 46 API calls 87261->87263 87264 41aec1 EnterCriticalSection 87262->87264 87265 41aede __wsopen_helper 87262->87265 87266 41ae8e 87263->87266 87264->87265 87265->87241 87267 41aeaa 87266->87267 87268 41ae97 InitializeCriticalSectionAndSpinCount 87266->87268 87269 41aeec ___lock_fhandle LeaveCriticalSection 87267->87269 87268->87267 87269->87262 87271 41aded __lseeki64_nolock 46 API calls 87270->87271 87272 41e18e 87271->87272 87273 41e1a4 SetFilePointer 87272->87273 87274 41e194 87272->87274 87276 41e1c3 87273->87276 87277 41e1bb GetLastError 87273->87277 87275 417f77 __wsopen_helper 46 API calls 87274->87275 87278 41e199 87275->87278 87276->87278 87279 417f9d __dosmaperr 46 API calls 87276->87279 87277->87276 87278->87249 87279->87278 87280->87234 87281->87248 87282->87237 87283->87242 87284->87248 87285->87250 87286->87249 87287->87248 87289 4149ea 87288->87289 87290 4149fe 87288->87290 87334 417f77 46 API calls __getptd_noexit 87289->87334 87292 4149fa 87290->87292 87294 41443c __flush 77 API calls 87290->87294 87306 414ab2 LeaveCriticalSection LeaveCriticalSection _fprintf 87292->87306 87293 4149ef 87335 417f25 10 API calls __wsopen_helper 87293->87335 87296 414a0a 87294->87296 87307 41d8c2 87296->87307 87299 414139 __fputwc_nolock 46 API calls 87300 414a18 87299->87300 87311 41d7fe 87300->87311 87302 414a1e 87302->87292 87303 413748 _free 46 API calls 87302->87303 87303->87292 87304->87034 87305->87039 87306->87039 87308 414a12 87307->87308 87309 41d8d2 87307->87309 87308->87299 87309->87308 87310 413748 _free 46 API calls 87309->87310 87310->87308 87312 41d80a __wsopen_helper 87311->87312 87313 41d812 87312->87313 87314 41d82d 87312->87314 87351 417f8a 46 API calls __getptd_noexit 87313->87351 87315 41d839 87314->87315 87320 41d873 87314->87320 87353 417f8a 46 API calls __getptd_noexit 87315->87353 87318 41d817 87352 417f77 46 API calls __getptd_noexit 87318->87352 87319 41d83e 87354 417f77 46 API calls __getptd_noexit 87319->87354 87323 41ae56 ___lock_fhandle 48 API calls 87320->87323 87325 41d879 87323->87325 87324 41d846 87355 417f25 10 API calls __wsopen_helper 87324->87355 87327 41d893 87325->87327 87328 41d887 87325->87328 87356 417f77 46 API calls __getptd_noexit 87327->87356 87336 41d762 87328->87336 87330 41d81f __wsopen_helper 87330->87302 87332 41d88d 87357 41d8ba LeaveCriticalSection __unlock_fhandle 87332->87357 87334->87293 87335->87292 87358 41aded 87336->87358 87338 41d7c8 87371 41ad67 47 API calls 2 library calls 87338->87371 87339 41d772 87339->87338 87340 41d7a6 87339->87340 87342 41aded __lseeki64_nolock 46 API calls 87339->87342 87340->87338 87343 41aded __lseeki64_nolock 46 API calls 87340->87343 87345 41d79d 87342->87345 87346 41d7b2 CloseHandle 87343->87346 87344 41d7d0 87347 41d7f2 87344->87347 87372 417f9d 46 API calls 2 library calls 87344->87372 87349 41aded __lseeki64_nolock 46 API calls 87345->87349 87346->87338 87350 41d7be GetLastError 87346->87350 87347->87332 87349->87340 87350->87338 87351->87318 87352->87330 87353->87319 87354->87324 87355->87330 87356->87332 87357->87330 87359 41ae12 87358->87359 87360 41adfa 87358->87360 87363 417f8a __dosmaperr 46 API calls 87359->87363 87364 41ae51 87359->87364 87361 417f8a __dosmaperr 46 API calls 87360->87361 87362 41adff 87361->87362 87365 417f77 __wsopen_helper 46 API calls 87362->87365 87366 41ae23 87363->87366 87364->87339 87368 41ae07 87365->87368 87367 417f77 __wsopen_helper 46 API calls 87366->87367 87369 41ae2b 87367->87369 87368->87339 87370 417f25 __wsopen_helper 10 API calls 87369->87370 87370->87368 87371->87344 87372->87347 87374 414c82 __wsopen_helper 87373->87374 87375 414cc3 87374->87375 87376 414c96 __setmbcp_nolock 87374->87376 87377 414cbb __wsopen_helper 87374->87377 87378 415471 __lock_file 47 API calls 87375->87378 87400 417f77 46 API calls __getptd_noexit 87376->87400 87377->87044 87380 414ccb 87378->87380 87386 414aba 87380->87386 87381 414cb0 87401 417f25 10 API calls __wsopen_helper 87381->87401 87387 414af2 87386->87387 87390 414ad8 __setmbcp_nolock 87386->87390 87402 414cfa LeaveCriticalSection LeaveCriticalSection _fprintf 87387->87402 87388 414ae2 87453 417f77 46 API calls __getptd_noexit 87388->87453 87390->87387 87390->87388 87393 414b2d 87390->87393 87393->87387 87395 414139 __fputwc_nolock 46 API calls 87393->87395 87397 414c38 __setmbcp_nolock 87393->87397 87403 41dfcc 87393->87403 87433 41d8f3 87393->87433 87455 41e0c2 46 API calls 3 library calls 87393->87455 87395->87393 87456 417f77 46 API calls __getptd_noexit 87397->87456 87399 414ae7 87454 417f25 10 API calls __wsopen_helper 87399->87454 87400->87381 87401->87377 87402->87377 87404 41dfd8 __wsopen_helper 87403->87404 87405 41dfe0 87404->87405 87408 41dffb 87404->87408 87526 417f8a 46 API calls __getptd_noexit 87405->87526 87407 41e007 87528 417f8a 46 API calls __getptd_noexit 87407->87528 87408->87407 87412 41e041 87408->87412 87410 41dfe5 87527 417f77 46 API calls __getptd_noexit 87410->87527 87411 41e00c 87529 417f77 46 API calls __getptd_noexit 87411->87529 87415 41e063 87412->87415 87416 41e04e 87412->87416 87419 41ae56 ___lock_fhandle 48 API calls 87415->87419 87531 417f8a 46 API calls __getptd_noexit 87416->87531 87417 41e014 87530 417f25 10 API calls __wsopen_helper 87417->87530 87420 41e069 87419->87420 87422 41e077 87420->87422 87423 41e08b 87420->87423 87421 41e053 87532 417f77 46 API calls __getptd_noexit 87421->87532 87457 41da15 87422->87457 87533 417f77 46 API calls __getptd_noexit 87423->87533 87426 41dfed __wsopen_helper 87426->87393 87429 41e083 87535 41e0ba LeaveCriticalSection __unlock_fhandle 87429->87535 87430 41e090 87534 417f8a 46 API calls __getptd_noexit 87430->87534 87434 41d900 87433->87434 87438 41d915 87433->87438 87539 417f77 46 API calls __getptd_noexit 87434->87539 87436 41d905 87540 417f25 10 API calls __wsopen_helper 87436->87540 87439 41d94a 87438->87439 87446 41d910 87438->87446 87536 420603 87438->87536 87441 414139 __fputwc_nolock 46 API calls 87439->87441 87442 41d95e 87441->87442 87443 41dfcc __read 59 API calls 87442->87443 87444 41d965 87443->87444 87445 414139 __fputwc_nolock 46 API calls 87444->87445 87444->87446 87447 41d988 87445->87447 87446->87393 87447->87446 87448 414139 __fputwc_nolock 46 API calls 87447->87448 87449 41d994 87448->87449 87449->87446 87450 414139 __fputwc_nolock 46 API calls 87449->87450 87451 41d9a1 87450->87451 87452 414139 __fputwc_nolock 46 API calls 87451->87452 87452->87446 87453->87399 87454->87387 87455->87393 87456->87399 87458 41da31 87457->87458 87459 41da4c 87457->87459 87461 417f8a __dosmaperr 46 API calls 87458->87461 87460 41da5b 87459->87460 87463 41da7a 87459->87463 87464 417f8a __dosmaperr 46 API calls 87460->87464 87462 41da36 87461->87462 87465 417f77 __wsopen_helper 46 API calls 87462->87465 87467 41da98 87463->87467 87479 41daac 87463->87479 87466 41da60 87464->87466 87468 41da3e 87465->87468 87470 417f77 __wsopen_helper 46 API calls 87466->87470 87471 417f8a __dosmaperr 46 API calls 87467->87471 87468->87429 87469 41db02 87473 417f8a __dosmaperr 46 API calls 87469->87473 87472 41da67 87470->87472 87474 41da9d 87471->87474 87476 417f25 __wsopen_helper 10 API calls 87472->87476 87477 41db07 87473->87477 87475 417f77 __wsopen_helper 46 API calls 87474->87475 87478 41daa4 87475->87478 87476->87468 87480 417f77 __wsopen_helper 46 API calls 87477->87480 87482 417f25 __wsopen_helper 10 API calls 87478->87482 87479->87468 87479->87469 87481 41dae1 87479->87481 87484 41db1b 87479->87484 87480->87478 87481->87469 87483 41daec ReadFile 87481->87483 87482->87468 87488 41dc17 87483->87488 87489 41df8f GetLastError 87483->87489 87486 416b04 __malloc_crt 46 API calls 87484->87486 87487 41db31 87486->87487 87492 41db59 87487->87492 87493 41db3b 87487->87493 87488->87489 87497 41dc2b 87488->87497 87490 41de16 87489->87490 87491 41df9c 87489->87491 87501 417f9d __dosmaperr 46 API calls 87490->87501 87505 41dd9b 87490->87505 87495 417f77 __wsopen_helper 46 API calls 87491->87495 87494 420494 __lseeki64_nolock 48 API calls 87492->87494 87496 417f77 __wsopen_helper 46 API calls 87493->87496 87498 41db67 87494->87498 87499 41dfa1 87495->87499 87500 41db40 87496->87500 87497->87505 87506 41dc47 87497->87506 87509 41de5b 87497->87509 87498->87483 87502 417f8a __dosmaperr 46 API calls 87499->87502 87503 417f8a __dosmaperr 46 API calls 87500->87503 87501->87505 87502->87505 87503->87468 87504 413748 _free 46 API calls 87504->87468 87505->87468 87505->87504 87507 41dcab ReadFile 87506->87507 87514 41dd28 87506->87514 87512 41dcc9 GetLastError 87507->87512 87517 41dcd3 87507->87517 87508 41ded0 ReadFile 87510 41deef GetLastError 87508->87510 87518 41def9 87508->87518 87509->87505 87509->87508 87510->87509 87510->87518 87511 41ddec MultiByteToWideChar 87511->87505 87513 41de10 GetLastError 87511->87513 87512->87506 87512->87517 87513->87490 87514->87505 87515 41dda3 87514->87515 87516 41dd96 87514->87516 87520 41dd60 87514->87520 87515->87520 87521 41ddda 87515->87521 87519 417f77 __wsopen_helper 46 API calls 87516->87519 87517->87506 87522 420494 __lseeki64_nolock 48 API calls 87517->87522 87518->87509 87523 420494 __lseeki64_nolock 48 API calls 87518->87523 87519->87505 87520->87511 87524 420494 __lseeki64_nolock 48 API calls 87521->87524 87522->87517 87523->87518 87525 41dde9 87524->87525 87525->87511 87526->87410 87527->87426 87528->87411 87529->87417 87530->87426 87531->87421 87532->87417 87533->87430 87534->87429 87535->87426 87537 416b04 __malloc_crt 46 API calls 87536->87537 87538 420618 87537->87538 87538->87439 87539->87436 87540->87446 87544 4148b3 GetSystemTimeAsFileTime __aulldiv 87541->87544 87543 442c6b 87543->87047 87544->87543 87545->87054 87546->87060 87547->87060 87552 45272f __tzset_nolock _wcscpy 87548->87552 87549 414d04 61 API calls __fread_nolock 87549->87552 87550 44afef GetSystemTimeAsFileTime 87550->87552 87551 4528a4 87551->86968 87551->86969 87552->87549 87552->87550 87552->87551 87553 4150d1 81 API calls _fseek 87552->87553 87553->87552 87555 44b1bc 87554->87555 87556 44b1ca 87554->87556 87557 4149c2 116 API calls 87555->87557 87558 44b1e1 87556->87558 87559 4149c2 116 API calls 87556->87559 87560 44b1d8 87556->87560 87557->87556 87589 4321a4 87558->87589 87561 44b2db 87559->87561 87560->86996 87561->87558 87563 44b2e9 87561->87563 87565 44b2f6 87563->87565 87569 414a46 __fcloseall 82 API calls 87563->87569 87564 44b224 87566 44b253 87564->87566 87567 44b228 87564->87567 87565->86996 87593 43213d 87566->87593 87568 44b235 87567->87568 87571 414a46 __fcloseall 82 API calls 87567->87571 87573 414a46 __fcloseall 82 API calls 87568->87573 87577 44b245 87568->87577 87569->87565 87571->87568 87572 44b25a 87574 44b260 87572->87574 87575 44b289 87572->87575 87573->87577 87578 44b26d 87574->87578 87581 414a46 __fcloseall 82 API calls 87574->87581 87603 44b0bf 87 API calls 87575->87603 87577->86996 87579 44b27d 87578->87579 87582 414a46 __fcloseall 82 API calls 87578->87582 87579->86996 87580 44b28f 87604 4320f8 46 API calls _free 87580->87604 87581->87578 87582->87579 87584 44b295 87585 44b2a2 87584->87585 87586 414a46 __fcloseall 82 API calls 87584->87586 87587 44b2b2 87585->87587 87588 414a46 __fcloseall 82 API calls 87585->87588 87586->87585 87587->86996 87588->87587 87590 4321b4 __tzset_nolock _memmove 87589->87590 87591 4321cb 87589->87591 87590->87564 87592 414d04 __fread_nolock 61 API calls 87591->87592 87592->87590 87594 4135bb _malloc 46 API calls 87593->87594 87595 432150 87594->87595 87596 4135bb _malloc 46 API calls 87595->87596 87597 432162 87596->87597 87598 4135bb _malloc 46 API calls 87597->87598 87599 432174 87598->87599 87601 432189 87599->87601 87605 4320f8 46 API calls _free 87599->87605 87601->87572 87602 432198 87602->87572 87603->87580 87604->87584 87605->87602 87606->86899 87607->86900 87608->86918 87609->86918 87610->86918 87611->86913 87612->86918 87613->86918 87614->86923 87615->86932 87616->86934 87617->86934 87667 410160 87618->87667 87620 41012f GetFullPathNameW 87621 410147 moneypunct 87620->87621 87621->86753 87623 4102cb SHGetDesktopFolder 87622->87623 87626 410333 _wcsncpy 87622->87626 87624 4102e0 _wcsncpy 87623->87624 87623->87626 87625 41031c SHGetPathFromIDListW 87624->87625 87624->87626 87625->87626 87626->86756 87628 4101bb 87627->87628 87633 425f4a 87627->87633 87629 410160 52 API calls 87628->87629 87630 4101c7 87629->87630 87671 410200 52 API calls 2 library calls 87630->87671 87631 4114ab __wcsicoll 58 API calls 87631->87633 87633->87631 87635 425f6e 87633->87635 87634 4101d6 87672 410200 52 API calls 2 library calls 87634->87672 87635->86758 87637 4101e9 87637->86758 87639 40f760 128 API calls 87638->87639 87640 40f584 87639->87640 87641 429335 87640->87641 87642 40f58c 87640->87642 87645 4528bd 118 API calls 87641->87645 87643 40f598 87642->87643 87644 429358 87642->87644 87690 4033c0 113 API calls 7 library calls 87643->87690 87691 434034 86 API calls _wprintf 87644->87691 87647 42934b 87645->87647 87650 429373 87647->87650 87651 42934f 87647->87651 87649 40f5b4 87649->86754 87653 4115d7 52 API calls 87650->87653 87654 431e58 82 API calls 87651->87654 87652 429369 87652->87650 87666 4293c5 moneypunct 87653->87666 87654->87644 87655 42959c 87656 413748 _free 46 API calls 87655->87656 87657 4295a5 87656->87657 87658 431e58 82 API calls 87657->87658 87659 4295b1 87658->87659 87663 401b10 52 API calls 87663->87666 87666->87655 87666->87663 87673 444af8 87666->87673 87676 402780 87666->87676 87684 4022d0 87666->87684 87692 44c7dd 64 API calls 3 library calls 87666->87692 87693 44b41c 52 API calls 87666->87693 87668 410167 _wcslen 87667->87668 87669 4115d7 52 API calls 87668->87669 87670 41017e _wcscpy 87669->87670 87670->87620 87671->87634 87672->87637 87674 4115d7 52 API calls 87673->87674 87675 444b27 _memmove 87674->87675 87675->87666 87677 402790 moneypunct _memmove 87676->87677 87678 402827 87676->87678 87679 4115d7 52 API calls 87677->87679 87680 4115d7 52 API calls 87678->87680 87681 402797 87679->87681 87680->87677 87682 4027bd 87681->87682 87683 4115d7 52 API calls 87681->87683 87682->87666 87683->87682 87685 4022e0 87684->87685 87688 40239d 87684->87688 87686 4115d7 52 API calls 87685->87686 87687 402320 moneypunct 87685->87687 87685->87688 87686->87687 87687->87688 87689 4115d7 52 API calls 87687->87689 87688->87666 87689->87687 87690->87649 87691->87652 87692->87666 87693->87666 87695 402417 87694->87695 87699 402539 moneypunct 87694->87699 87696 4115d7 52 API calls 87695->87696 87695->87699 87697 402443 87696->87697 87698 4115d7 52 API calls 87697->87698 87700 4024b4 87698->87700 87699->86762 87700->87699 87700->87700 87702 4022d0 52 API calls 87700->87702 87723 402880 87700->87723 87702->87700 87706 401566 87703->87706 87704 401794 87775 40e9a0 90 API calls 87704->87775 87706->87704 87708 40167a 87706->87708 87709 4010a0 52 API calls 87706->87709 87710 4017c0 87708->87710 87776 45e737 90 API calls 3 library calls 87708->87776 87709->87706 87710->86765 87712 40bc70 52 API calls 87711->87712 87721 40d451 87712->87721 87713 40d50f 87779 410600 52 API calls 87713->87779 87715 427c01 87780 45e737 90 API calls 3 library calls 87715->87780 87716 40e0a0 52 API calls 87716->87721 87718 401b10 52 API calls 87718->87721 87719 40d519 87719->86767 87721->87713 87721->87715 87721->87716 87721->87718 87721->87719 87777 40f310 53 API calls 87721->87777 87778 40d860 91 API calls 87721->87778 87724 4115d7 52 API calls 87723->87724 87725 4028b3 87724->87725 87726 4115d7 52 API calls 87725->87726 87764 4028c5 moneypunct _memmove 87726->87764 87727 402780 52 API calls 87762 402b1e moneypunct 87727->87762 87728 427d62 87732 403350 52 API calls 87728->87732 87730 402bb6 87766 403060 53 API calls 87730->87766 87731 402aeb moneypunct 87731->87727 87735 42802b moneypunct 87731->87735 87741 427d6b 87732->87741 87734 402bca 87736 427f63 87734->87736 87737 402bd4 87734->87737 87772 460879 92 API calls 3 library calls 87736->87772 87740 402780 52 API calls 87737->87740 87738 403350 52 API calls 87738->87764 87743 402bdf 87740->87743 87745 427f2c 87741->87745 87769 403020 52 API calls _memmove 87741->87769 87743->87700 87744 427fd5 87773 460879 92 API calls 3 library calls 87744->87773 87771 460879 92 API calls 3 library calls 87745->87771 87749 427fe4 87758 402780 52 API calls 87749->87758 87750 427fa5 87759 402780 52 API calls 87750->87759 87751 402f00 52 API calls 87751->87764 87753 428000 87774 460879 92 API calls 3 library calls 87753->87774 87755 4026f0 52 API calls 87757 402a85 CharUpperBuffW 87755->87757 87756 427f48 87756->87762 87757->87764 87758->87756 87759->87762 87761 4115d7 52 API calls 87761->87764 87762->87700 87763 402780 52 API calls 87763->87764 87764->87728 87764->87730 87764->87731 87764->87738 87764->87744 87764->87745 87764->87750 87764->87751 87764->87753 87764->87755 87764->87761 87764->87763 87765 4031b0 63 API calls 87764->87765 87767 402f80 92 API calls _memmove 87764->87767 87768 402280 52 API calls 87764->87768 87770 4013a0 52 API calls 87764->87770 87765->87764 87766->87734 87767->87764 87768->87764 87769->87741 87770->87764 87771->87756 87772->87756 87773->87749 87774->87762 87775->87708 87776->87710 87777->87721 87778->87721 87779->87719 87780->87719 87781->86780 87782->86781 87784 4091c6 87783->87784 87785 42c5fe 87783->87785 87784->86840 87785->87784 87786 40bc70 52 API calls 87785->87786 87787 42c64e InterlockedIncrement 87786->87787 87788 42c665 87787->87788 87793 42c697 87787->87793 87790 42c672 InterlockedDecrement Sleep InterlockedIncrement 87788->87790 87788->87793 87789 42c737 InterlockedDecrement 87791 42c74a 87789->87791 87790->87788 87790->87793 87794 408f40 VariantClear 87791->87794 87792 42c731 87792->87789 87793->87789 87793->87792 87941 408e80 87793->87941 87796 42c752 87794->87796 87954 410c60 VariantClear moneypunct 87796->87954 87800 42c6db 87801 402160 52 API calls 87800->87801 87802 42c6e5 87801->87802 87803 45340c 85 API calls 87802->87803 87804 42c6f1 87803->87804 87951 40d200 52 API calls 2 library calls 87804->87951 87806 42c6fb 87952 465124 53 API calls 87806->87952 87808 42c715 87809 42c76a 87808->87809 87810 42c719 87808->87810 87811 401b10 52 API calls 87809->87811 87953 46fe32 VariantClear 87810->87953 87813 42c77e 87811->87813 87814 401980 53 API calls 87813->87814 87820 42c796 87814->87820 87815 42c812 87956 46fe32 VariantClear 87815->87956 87817 42c82a InterlockedDecrement 87957 46ff07 54 API calls 87817->87957 87819 42c864 87958 45e737 90 API calls 3 library calls 87819->87958 87820->87815 87820->87819 87955 40ba10 52 API calls 2 library calls 87820->87955 87822 42c9ec 88001 47d33e 338 API calls 87822->88001 87825 42c9fe 88002 46feb1 VariantClear VariantClear 87825->88002 87827 42ca08 87830 401b10 52 API calls 87827->87830 87828 42c874 87831 408f40 VariantClear 87828->87831 87840 42ca59 87828->87840 87829 408f40 VariantClear 87839 42c849 87829->87839 87833 42ca15 87830->87833 87834 42c891 87831->87834 87832 402780 52 API calls 87832->87839 87835 40c2c0 52 API calls 87833->87835 87959 410c60 VariantClear moneypunct 87834->87959 87835->87828 87837 401980 53 API calls 87837->87839 87839->87822 87839->87829 87839->87832 87839->87837 87960 40a780 87839->87960 87840->87840 87842 40afc4 87841->87842 87843 40b156 87841->87843 87844 40afd5 87842->87844 87845 42d1e3 87842->87845 88013 45e737 90 API calls 3 library calls 87843->88013 87848 40a780 201 API calls 87844->87848 87866 40b11a moneypunct 87844->87866 88014 45e737 90 API calls 3 library calls 87845->88014 87850 40b00a 87848->87850 87849 42d1f8 87853 408f40 VariantClear 87849->87853 87850->87849 87855 40b012 87850->87855 87852 42d4db 87852->87852 87854 40b143 87853->87854 87854->86840 87856 40b04a 87855->87856 87857 42d231 VariantClear 87855->87857 87858 40b094 moneypunct 87855->87858 87864 40b05c moneypunct 87856->87864 88015 40e270 VariantClear moneypunct 87856->88015 87857->87864 87859 40b108 87858->87859 87861 42d425 moneypunct 87858->87861 87859->87866 88016 40e270 VariantClear moneypunct 87859->88016 87860 42d45a VariantClear 87860->87866 87861->87860 87861->87866 87864->87858 87865 4115d7 52 API calls 87864->87865 87865->87858 87866->87854 88017 45e737 90 API calls 3 library calls 87866->88017 87868 408fff 87867->87868 87870 40900d 87867->87870 88018 403ea0 52 API calls __cinit 87868->88018 87872 42c3f6 87870->87872 87874 42c44a 87870->87874 87875 40a780 201 API calls 87870->87875 87878 42c47b 87870->87878 87880 42c4cb 87870->87880 87881 42c564 87870->87881 87884 42c548 87870->87884 87887 409112 87870->87887 87889 42c528 87870->87889 87891 4090df 87870->87891 87892 4090ea 87870->87892 87901 4090f2 moneypunct 87870->87901 88020 4534e3 52 API calls 87870->88020 88022 40c4e0 201 API calls 87870->88022 88021 45e737 90 API calls 3 library calls 87872->88021 88023 45e737 90 API calls 3 library calls 87874->88023 87875->87870 88024 451b42 61 API calls 87878->88024 88026 47faae 240 API calls 87880->88026 87885 408f40 VariantClear 87881->87885 87882 42c491 87882->87901 88025 45e737 90 API calls 3 library calls 87882->88025 88029 45e737 90 API calls 3 library calls 87884->88029 87885->87901 87886 42c4da 87886->87901 88027 45e737 90 API calls 3 library calls 87886->88027 87887->87884 87894 40912b 87887->87894 88028 45e737 90 API calls 3 library calls 87889->88028 87891->87892 87896 408e80 VariantClear 87891->87896 87897 408f40 VariantClear 87892->87897 87894->87901 88019 403e10 53 API calls 87894->88019 87896->87892 87897->87901 87899 40914b 87900 408f40 VariantClear 87899->87900 87900->87901 87901->86840 88030 408d90 87902->88030 87904 429778 88059 410c60 VariantClear moneypunct 87904->88059 87906 429780 87907 408cf9 87907->87904 87908 42976c 87907->87908 87910 408d2d 87907->87910 88058 45e737 90 API calls 3 library calls 87908->88058 88046 403d10 87910->88046 87913 408d71 moneypunct 87913->86840 87914 408d45 moneypunct 87914->87913 87915 408f40 VariantClear 87914->87915 87915->87914 87916->86840 87917->86840 87918->86840 87919->86840 87920->86791 87921->86796 87922->86840 87923->86840 87924->86840 87925->86840 87926->86847 87927->86847 87928->86847 87929->86847 87930->86847 87931->86847 87932->86847 87934 403cdf 87933->87934 87935 408f40 VariantClear 87934->87935 87936 403ce7 87935->87936 87936->86834 87937->86847 87938->86847 87939->86840 87940->86788 87942 408e88 87941->87942 87944 408e94 87941->87944 87943 408f40 VariantClear 87942->87943 87943->87944 87945 45340c 87944->87945 87946 453439 87945->87946 87947 453419 87945->87947 87946->87800 87948 45342f 87947->87948 88003 4531b1 85 API calls 5 library calls 87947->88003 87948->87800 87950 453425 87950->87800 87951->87806 87952->87808 87953->87792 87954->87784 87955->87820 87956->87817 87957->87839 87958->87828 87959->87784 87961 40a7a6 87960->87961 87962 40ae8c 87960->87962 87964 4115d7 52 API calls 87961->87964 88004 41130a 51 API calls __cinit 87962->88004 87978 40a7c6 moneypunct _memmove 87964->87978 87965 40a86d 87966 40abd1 87965->87966 87982 40a878 moneypunct 87965->87982 88009 45e737 90 API calls 3 library calls 87966->88009 87967 401b10 52 API calls 87967->87978 87969 40bc10 53 API calls 87969->87978 87970 42b791 VariantClear 87970->87978 87971 408e80 VariantClear 87971->87978 87972 42ba2d VariantClear 87972->87978 87973 408f40 VariantClear 87973->87982 87974 42b459 VariantClear 87974->87978 87975 40a884 moneypunct 87975->87839 87976 408cc0 194 API calls 87976->87978 87978->87965 87978->87966 87978->87967 87978->87969 87978->87970 87978->87971 87978->87972 87978->87974 87978->87976 87979 42b6f6 VariantClear 87978->87979 87980 4115d7 52 API calls 87978->87980 87981 42bb6a 87978->87981 87983 40e270 VariantClear 87978->87983 87984 42bbf5 87978->87984 87987 4115d7 52 API calls 87978->87987 87988 40b5f0 89 API calls 87978->87988 87990 408f40 VariantClear 87978->87990 87995 42bc37 87978->87995 88000 4530c9 VariantClear 87978->88000 88005 45308a 53 API calls 87978->88005 88006 470870 52 API calls 87978->88006 88007 457f66 87 API calls __write_nolock 87978->88007 88008 472f47 127 API calls 87978->88008 87979->87978 87980->87978 88012 44b92d VariantClear 87981->88012 87982->87973 87982->87975 87983->87978 88010 45e737 90 API calls 3 library calls 87984->88010 87986 42bc5b 87986->87839 87991 42b5b3 VariantInit VariantCopy 87987->87991 87988->87978 87990->87978 87991->87978 87993 42b5d7 VariantClear 87991->87993 87993->87978 88011 45e737 90 API calls 3 library calls 87995->88011 87998 42bc48 87998->87981 87999 408f40 VariantClear 87998->87999 87999->87981 88000->87978 88001->87825 88002->87827 88003->87950 88004->87978 88005->87978 88006->87978 88007->87978 88008->87978 88009->87981 88010->87981 88011->87998 88012->87986 88013->87845 88014->87849 88015->87864 88016->87866 88017->87852 88018->87870 88019->87899 88020->87870 88021->87901 88022->87870 88023->87901 88024->87882 88025->87901 88026->87886 88027->87901 88028->87901 88029->87881 88031 4289d2 88030->88031 88032 408db3 88030->88032 88062 45e737 90 API calls 3 library calls 88031->88062 88060 40bec0 90 API calls 88032->88060 88035 4289e5 88063 45e737 90 API calls 3 library calls 88035->88063 88036 408e5a 88036->87907 88039 428a05 88040 408f40 VariantClear 88039->88040 88040->88036 88041 40a780 201 API calls 88043 408dc9 88041->88043 88042 408e64 88044 408f40 VariantClear 88042->88044 88043->88035 88043->88036 88043->88039 88043->88041 88043->88042 88045 408f40 VariantClear 88043->88045 88061 40ba10 52 API calls 2 library calls 88043->88061 88044->88036 88045->88043 88047 408f40 VariantClear 88046->88047 88048 403d20 88047->88048 88049 403cd0 VariantClear 88048->88049 88050 403d4d 88049->88050 88064 4755ad 88050->88064 88067 46e91c 88050->88067 88070 4813fa 88050->88070 88080 467897 88050->88080 88124 40de10 88050->88124 88129 45e17d 88050->88129 88051 403d76 88051->87904 88051->87914 88058->87904 88059->87906 88060->88043 88061->88043 88062->88035 88063->88039 88139 475077 88064->88139 88066 4755c0 88066->88051 88245 46e785 88067->88245 88069 46e92f 88069->88051 88071 45340c 85 API calls 88070->88071 88072 481438 88071->88072 88073 402880 95 API calls 88072->88073 88074 48143f 88073->88074 88075 481465 88074->88075 88076 40a780 201 API calls 88074->88076 88078 481469 88075->88078 88343 40e710 53 API calls 88075->88343 88076->88075 88078->88051 88079 4814a4 88079->88051 88081 4678bb 88080->88081 88082 467954 88081->88082 88085 45340c 85 API calls 88081->88085 88083 4115d7 52 API calls 88082->88083 88114 467964 88082->88114 88084 467989 88083->88084 88088 467995 88084->88088 88347 40da60 53 API calls 88084->88347 88086 4678f6 88085->88086 88089 413a0e __wsplitpath 46 API calls 88086->88089 88090 4533eb 85 API calls 88088->88090 88091 4678fc 88089->88091 88092 4679b7 88090->88092 88093 401b10 52 API calls 88091->88093 88094 40de40 60 API calls 88092->88094 88095 46790c 88093->88095 88096 4679c3 88094->88096 88344 40d200 52 API calls 2 library calls 88095->88344 88098 4679c7 GetLastError 88096->88098 88099 467a05 88096->88099 88101 403cd0 VariantClear 88098->88101 88104 467a2c 88099->88104 88105 467a4b 88099->88105 88100 467917 88100->88082 88345 4339fa GetFileAttributesW FindFirstFileW FindClose 88100->88345 88102 4679dc 88101->88102 88106 4679e6 88102->88106 88110 44ae3e CloseHandle 88102->88110 88109 4115d7 52 API calls 88104->88109 88107 4115d7 52 API calls 88105->88107 88113 408f40 VariantClear 88106->88113 88111 467a49 88107->88111 88108 467928 88108->88082 88112 46792f 88108->88112 88115 467a31 88109->88115 88110->88106 88119 408f40 VariantClear 88111->88119 88346 4335cd 56 API calls 3 library calls 88112->88346 88117 4679ed 88113->88117 88114->88051 88348 436299 52 API calls 2 library calls 88115->88348 88117->88051 88121 467a88 88119->88121 88120 467939 88120->88082 88122 408f40 VariantClear 88120->88122 88121->88051 88123 467947 88122->88123 88123->88082 88125 4115d7 52 API calls 88124->88125 88126 40de23 88125->88126 88127 40da20 CloseHandle 88126->88127 88128 40de2e 88127->88128 88128->88051 88130 45e198 88129->88130 88131 45e19c 88130->88131 88132 45e1b8 88130->88132 88133 408f40 VariantClear 88131->88133 88134 45e1db FindClose 88132->88134 88136 45e1cc 88132->88136 88135 45e1a4 88133->88135 88137 45e1d9 moneypunct 88134->88137 88135->88051 88136->88137 88138 44ae3e CloseHandle 88136->88138 88137->88051 88138->88137 88192 4533eb 88139->88192 88142 4750ee 88145 408f40 VariantClear 88142->88145 88143 475129 88196 4646e0 88143->88196 88150 4750f5 88145->88150 88146 47515e 88147 475162 88146->88147 88179 47518e 88146->88179 88148 408f40 VariantClear 88147->88148 88181 475169 88148->88181 88149 475357 88151 475365 88149->88151 88152 4754ea 88149->88152 88150->88066 88230 44b3ac 57 API calls 88151->88230 88236 464812 92 API calls 88152->88236 88156 4754fc 88157 475374 88156->88157 88159 475508 88156->88159 88209 430d31 88157->88209 88158 4533eb 85 API calls 88158->88179 88161 408f40 VariantClear 88159->88161 88164 47550f 88161->88164 88162 475388 88216 4577e9 88162->88216 88164->88181 88166 47539e 88224 410cfc 88166->88224 88167 475480 88169 408f40 VariantClear 88167->88169 88169->88181 88171 4753d4 88232 40e830 53 API calls 88171->88232 88172 4753b8 88231 45e737 90 API calls 3 library calls 88172->88231 88175 4753c5 GetCurrentProcess TerminateProcess 88175->88171 88176 4753e3 88190 475406 88176->88190 88233 40cf00 53 API calls 88176->88233 88177 4754b5 88178 408f40 VariantClear 88177->88178 88178->88181 88179->88149 88179->88158 88179->88167 88179->88177 88228 436299 52 API calls 2 library calls 88179->88228 88229 463ad5 64 API calls __wcsicoll 88179->88229 88180 475556 88180->88181 88186 47556e FreeLibrary 88180->88186 88181->88066 88183 4753f8 88234 46c43e 106 API calls 2 library calls 88183->88234 88186->88181 88189 408e80 VariantClear 88189->88190 88190->88180 88190->88189 88191 408f40 VariantClear 88190->88191 88235 40cf00 53 API calls 88190->88235 88237 44b3ac 57 API calls 88190->88237 88238 46c43e 106 API calls 2 library calls 88190->88238 88191->88190 88193 453404 88192->88193 88194 4533f8 88192->88194 88193->88142 88193->88143 88194->88193 88239 4531b1 85 API calls 5 library calls 88194->88239 88240 4536f7 53 API calls 88196->88240 88198 4646fc 88241 4426cd 59 API calls _wcslen 88198->88241 88200 464711 88202 40bc70 52 API calls 88200->88202 88208 46474b 88200->88208 88203 46472c 88202->88203 88242 461465 52 API calls _memmove 88203->88242 88205 464741 88206 40c600 52 API calls 88205->88206 88206->88208 88207 464793 88207->88146 88208->88207 88243 463ad5 64 API calls __wcsicoll 88208->88243 88210 430db2 88209->88210 88211 430d54 88209->88211 88210->88162 88212 4115d7 52 API calls 88211->88212 88213 430d74 88212->88213 88214 430da9 88213->88214 88215 4115d7 52 API calls 88213->88215 88214->88162 88215->88213 88217 457a84 88216->88217 88223 45780c _strcat moneypunct _wcslen _wcscpy 88216->88223 88217->88166 88218 443006 57 API calls 88218->88223 88219 45340c 85 API calls 88219->88223 88221 4135bb 46 API calls _malloc 88221->88223 88222 40f6f0 54 API calls 88222->88223 88223->88217 88223->88218 88223->88219 88223->88221 88223->88222 88244 44b3ac 57 API calls 88223->88244 88225 410d11 88224->88225 88226 410da9 VirtualProtect 88225->88226 88227 410d77 88225->88227 88226->88227 88227->88171 88227->88172 88228->88179 88229->88179 88230->88157 88231->88175 88232->88176 88233->88183 88234->88190 88235->88190 88236->88156 88237->88190 88238->88190 88239->88193 88240->88198 88241->88200 88242->88205 88243->88207 88244->88223 88246 46e7a2 88245->88246 88247 4115d7 52 API calls 88246->88247 88250 46e802 88246->88250 88248 46e7ad 88247->88248 88249 46e7b9 88248->88249 88293 40da60 53 API calls 88248->88293 88254 4533eb 85 API calls 88249->88254 88251 46e7e5 88250->88251 88258 46e82f 88250->88258 88252 408f40 VariantClear 88251->88252 88255 46e7ea 88252->88255 88256 46e7ca 88254->88256 88255->88069 88294 40de40 88256->88294 88257 46e8b5 88286 4680ed 88257->88286 88258->88257 88260 46e845 88258->88260 88263 4533eb 85 API calls 88260->88263 88273 46e84b 88263->88273 88264 46e7db 88264->88251 88306 44ae3e 88264->88306 88265 46e8bb 88290 443fbe 88265->88290 88266 46e87a 88309 4689f4 59 API calls 88266->88309 88269 46e883 88310 4013c0 52 API calls 88269->88310 88273->88266 88273->88269 88274 46e88f 88276 40e0a0 52 API calls 88274->88276 88275 408f40 VariantClear 88284 46e881 88275->88284 88277 46e899 88276->88277 88311 40d200 52 API calls 2 library calls 88277->88311 88279 46e911 88279->88069 88280 46e8a5 88312 4689f4 59 API calls 88280->88312 88283 46e903 88285 44ae3e CloseHandle 88283->88285 88284->88279 88313 40da20 88284->88313 88285->88279 88287 468100 88286->88287 88288 4680fa 88286->88288 88287->88265 88317 467ac4 55 API calls 2 library calls 88288->88317 88318 443e36 88290->88318 88292 443fd3 88292->88275 88292->88284 88293->88249 88295 40da20 CloseHandle 88294->88295 88296 40de4e 88295->88296 88325 40f110 88296->88325 88299 4264fa 88301 40de84 88334 40e080 SetFilePointerEx SetFilePointerEx 88301->88334 88303 40de8b 88335 40f160 SetFilePointerEx SetFilePointerEx WriteFile 88303->88335 88305 40de90 88305->88258 88305->88264 88307 44ae4b moneypunct 88306->88307 88337 443fdf 88306->88337 88307->88251 88309->88284 88310->88274 88311->88280 88312->88284 88314 40da37 88313->88314 88315 40da29 88313->88315 88314->88315 88316 40da3c CloseHandle 88314->88316 88315->88283 88316->88283 88317->88287 88321 443e19 88318->88321 88322 443e26 88321->88322 88323 443e32 WriteFile 88321->88323 88324 443db4 SetFilePointerEx SetFilePointerEx 88322->88324 88323->88292 88324->88323 88326 40f125 CreateFileW 88325->88326 88327 42630c 88325->88327 88329 40de74 88326->88329 88328 426311 CreateFileW 88327->88328 88327->88329 88328->88329 88330 426337 88328->88330 88329->88299 88333 40dea0 55 API calls moneypunct 88329->88333 88336 40df90 SetFilePointerEx SetFilePointerEx 88330->88336 88332 426342 88332->88329 88333->88301 88334->88303 88335->88305 88336->88332 88338 40da20 CloseHandle 88337->88338 88339 443feb 88338->88339 88342 4340db CloseHandle moneypunct 88339->88342 88341 444001 88341->88307 88342->88341 88343->88079 88344->88100 88345->88108 88346->88120 88347->88088 88348->88111 88349 42d154 88353 480a8d 88349->88353 88351 42d161 88352 480a8d 201 API calls 88351->88352 88352->88351 88354 480ae4 88353->88354 88355 480b26 88353->88355 88357 480aeb 88354->88357 88358 480b15 88354->88358 88356 40bc70 52 API calls 88355->88356 88377 480b2e 88356->88377 88360 480aee 88357->88360 88361 480b04 88357->88361 88386 4805bf 201 API calls 88358->88386 88360->88355 88363 480af3 88360->88363 88385 47fea2 201 API calls __itow_s 88361->88385 88384 47f135 201 API calls 88363->88384 88365 40e0a0 52 API calls 88365->88377 88367 408f40 VariantClear 88369 481156 88367->88369 88368 480aff 88368->88367 88371 408f40 VariantClear 88369->88371 88370 40c2c0 52 API calls 88370->88377 88372 48115e 88371->88372 88372->88351 88373 401980 53 API calls 88373->88377 88375 40e710 53 API calls 88375->88377 88376 40a780 201 API calls 88376->88377 88377->88365 88377->88368 88377->88370 88377->88373 88377->88375 88377->88376 88378 480ff5 88377->88378 88380 408e80 VariantClear 88377->88380 88387 45377f 52 API calls 88377->88387 88388 45e951 53 API calls 88377->88388 88389 40e830 53 API calls 88377->88389 88390 47925f 53 API calls 88377->88390 88391 47fcff 201 API calls 88377->88391 88392 45e737 90 API calls 3 library calls 88378->88392 88380->88377 88384->88368 88385->88368 88386->88368 88387->88377 88388->88377 88389->88377 88390->88377 88391->88377 88392->88368 88393 407ac80 88407 40788d0 88393->88407 88395 407ad60 88410 407ab70 88395->88410 88397 407ad89 CreateFileW 88399 407addd 88397->88399 88400 407add8 88397->88400 88399->88400 88401 407adf4 VirtualAlloc 88399->88401 88401->88400 88402 407ae12 ReadFile 88401->88402 88402->88400 88403 407ae2d 88402->88403 88404 4079b70 13 API calls 88403->88404 88406 407ae60 88404->88406 88405 407ae83 ExitProcess 88405->88400 88406->88405 88413 407bd90 GetPEB 88407->88413 88409 4078f5b 88409->88395 88411 407ab79 Sleep 88410->88411 88412 407ab87 88411->88412 88414 407bdba 88413->88414 88414->88409 88415 425b2b 88420 40f000 88415->88420 88419 425b3a 88421 4115d7 52 API calls 88420->88421 88422 40f007 88421->88422 88423 4276ea 88422->88423 88429 40f030 88422->88429 88428 41130a 51 API calls __cinit 88428->88419 88430 40f039 88429->88430 88431 40f01a 88429->88431 88459 41130a 51 API calls __cinit 88430->88459 88433 40e500 88431->88433 88434 40bc70 52 API calls 88433->88434 88435 40e515 GetVersionExW 88434->88435 88436 402160 52 API calls 88435->88436 88437 40e557 88436->88437 88460 40e660 88437->88460 88443 427674 88446 4276c6 GetSystemInfo 88443->88446 88445 40e5cd GetCurrentProcess 88481 40ef20 LoadLibraryA GetProcAddress 88445->88481 88448 4276d5 GetSystemInfo 88446->88448 88449 40e5e0 88449->88448 88474 40efd0 88449->88474 88452 40e629 88478 40ef90 88452->88478 88455 40e641 FreeLibrary 88456 40e644 88455->88456 88457 40e653 FreeLibrary 88456->88457 88458 40e656 88456->88458 88457->88458 88458->88428 88459->88431 88461 40e667 88460->88461 88462 42761d 88461->88462 88463 40c600 52 API calls 88461->88463 88464 40e55c 88463->88464 88465 40e680 88464->88465 88466 40e687 88465->88466 88467 427616 88466->88467 88468 40c600 52 API calls 88466->88468 88469 40e566 88468->88469 88469->88443 88470 40ef60 88469->88470 88471 40e5c8 88470->88471 88472 40ef66 LoadLibraryA 88470->88472 88471->88445 88471->88449 88472->88471 88473 40ef77 GetProcAddress 88472->88473 88473->88471 88475 40e620 88474->88475 88476 40efd6 LoadLibraryA 88474->88476 88475->88446 88475->88452 88476->88475 88477 40efe7 GetProcAddress 88476->88477 88477->88475 88482 40efb0 LoadLibraryA GetProcAddress 88478->88482 88480 40e632 GetNativeSystemInfo 88480->88455 88480->88456 88481->88449 88482->88480 88483 407b22b 88484 407b232 88483->88484 88485 407b2d0 88484->88485 88486 407b23a 88484->88486 88503 407bb80 9 API calls 88485->88503 88490 407aee0 88486->88490 88489 407b2b7 88491 40788d0 GetPEB 88490->88491 88492 407af7f 88491->88492 88495 407afd9 VirtualAlloc 88492->88495 88500 407afbd 88492->88500 88501 407b0e0 CloseHandle 88492->88501 88502 407b0f0 VirtualFree 88492->88502 88504 407bdf0 GetPEB 88492->88504 88494 407afb0 CreateFileW 88494->88492 88494->88500 88496 407affa ReadFile 88495->88496 88495->88500 88499 407b018 VirtualAlloc 88496->88499 88496->88500 88497 407b1cc VirtualFree 88498 407b1da 88497->88498 88498->88489 88499->88492 88499->88500 88500->88497 88500->88498 88501->88492 88502->88492 88503->88489 88505 407be1a 88504->88505 88505->88494 88506 425b5e 88511 40c7f0 88506->88511 88510 425b6d 88546 40db10 52 API calls 88511->88546 88513 40c82a 88547 410ab0 6 API calls 88513->88547 88515 40c86d 88516 40bc70 52 API calls 88515->88516 88517 40c877 88516->88517 88518 40bc70 52 API calls 88517->88518 88519 40c881 88518->88519 88520 40bc70 52 API calls 88519->88520 88521 40c88b 88520->88521 88522 40bc70 52 API calls 88521->88522 88523 40c8d1 88522->88523 88524 40bc70 52 API calls 88523->88524 88525 40c991 88524->88525 88548 40d2c0 52 API calls 88525->88548 88527 40c99b 88549 40d0d0 53 API calls 88527->88549 88529 40c9c1 88530 40bc70 52 API calls 88529->88530 88531 40c9cb 88530->88531 88550 40e310 53 API calls 88531->88550 88533 40ca28 88534 408f40 VariantClear 88533->88534 88535 40ca30 88534->88535 88536 408f40 VariantClear 88535->88536 88537 40ca38 GetStdHandle 88536->88537 88538 429630 88537->88538 88539 40ca87 88537->88539 88538->88539 88540 429639 88538->88540 88545 41130a 51 API calls __cinit 88539->88545 88551 4432c0 57 API calls 88540->88551 88542 429641 88552 44b6ab CreateThread 88542->88552 88544 42964f CloseHandle 88544->88539 88545->88510 88546->88513 88547->88515 88548->88527 88549->88529 88550->88533 88551->88542 88552->88544 88553 44b5cb 58 API calls 88552->88553 88554 425b6f 88559 40dc90 88554->88559 88558 425b7e 88560 40bc70 52 API calls 88559->88560 88561 40dd03 88560->88561 88567 40f210 88561->88567 88564 40dd96 88565 40ddb7 88564->88565 88570 40dc00 52 API calls 2 library calls 88564->88570 88566 41130a 51 API calls __cinit 88565->88566 88566->88558 88571 40f250 RegOpenKeyExW 88567->88571 88569 40f230 88569->88564 88570->88564 88572 425e17 88571->88572 88573 40f275 RegQueryValueExW 88571->88573 88572->88569 88574 40f2c3 RegCloseKey 88573->88574 88575 40f298 88573->88575 88574->88569 88576 40f2a9 RegCloseKey 88575->88576 88577 425e1d 88575->88577 88576->88569

                                            Control-flow Graph

                                            APIs
                                            • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
                                              • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe,00000104,?), ref: 00401F4C
                                              • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
                                              • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
                                              • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
                                              • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
                                              • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
                                            • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
                                            • GetFullPathNameW.KERNEL32(C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe,00000104,?,004A7F50,004A7F54), ref: 0040D625
                                              • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
                                            • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
                                            • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
                                            • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
                                            • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
                                              • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                              • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                              • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
                                              • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
                                              • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
                                              • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                              • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
                                              • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                              • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                              • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
                                              • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
                                              • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
                                            • String ID: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe$This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
                                            • API String ID: 2495805114-2106611154
                                            • Opcode ID: e8c9047fb359c29ec9f900fe27c3aa55fa0c8583f95d62b388df9f145cb8bf6e
                                            • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
                                            • Opcode Fuzzy Hash: e8c9047fb359c29ec9f900fe27c3aa55fa0c8583f95d62b388df9f145cb8bf6e
                                            • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1004 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 1013 40e582-40e583 1004->1013 1014 427674-427679 1004->1014 1017 40e585-40e596 1013->1017 1018 40e5ba-40e5cb call 40ef60 1013->1018 1015 427683-427686 1014->1015 1016 42767b-427681 1014->1016 1021 427693-427696 1015->1021 1022 427688-427691 1015->1022 1020 4276b4-4276be 1016->1020 1023 427625-427629 1017->1023 1024 40e59c-40e59f 1017->1024 1035 40e5ec-40e60c 1018->1035 1036 40e5cd-40e5e6 GetCurrentProcess call 40ef20 1018->1036 1037 4276c6-4276ca GetSystemInfo 1020->1037 1021->1020 1027 427698-4276a8 1021->1027 1022->1020 1029 427636-427640 1023->1029 1030 42762b-427631 1023->1030 1025 40e5a5-40e5ae 1024->1025 1026 427654-427657 1024->1026 1031 40e5b4 1025->1031 1032 427645-42764f 1025->1032 1026->1018 1038 42765d-42766f 1026->1038 1033 4276b0 1027->1033 1034 4276aa-4276ae 1027->1034 1029->1018 1030->1018 1031->1018 1032->1018 1033->1020 1034->1020 1040 40e612-40e623 call 40efd0 1035->1040 1041 4276d5-4276df GetSystemInfo 1035->1041 1036->1035 1048 40e5e8 1036->1048 1037->1041 1038->1018 1040->1037 1046 40e629-40e63f call 40ef90 GetNativeSystemInfo 1040->1046 1050 40e641-40e642 FreeLibrary 1046->1050 1051 40e644-40e651 1046->1051 1048->1035 1050->1051 1052 40e653-40e654 FreeLibrary 1051->1052 1053 40e656-40e65d 1051->1053 1052->1053
                                            APIs
                                            • GetVersionExW.KERNEL32(?), ref: 0040E52A
                                              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                            • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
                                            • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
                                            • FreeLibrary.KERNEL32(?), ref: 0040E642
                                            • FreeLibrary.KERNEL32(?), ref: 0040E654
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
                                            • String ID: 0SH
                                            • API String ID: 3363477735-851180471
                                            • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                            • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
                                            • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
                                            • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A
                                            APIs
                                            • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
                                            • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: IsThemeActive$uxtheme.dll
                                            • API String ID: 2574300362-3542929980
                                            • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                            • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
                                            • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
                                            • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768
                                            APIs
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409266
                                            • Sleep.KERNEL32(0000000A,?), ref: 004094D1
                                            • TranslateMessage.USER32(?), ref: 00409556
                                            • DispatchMessageW.USER32(?), ref: 00409561
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00409574
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Message$Peek$DispatchSleepTranslate
                                            • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE
                                            • API String ID: 1762048999-758534266
                                            • Opcode ID: 65ef02fb38a27282c9e7cf101ebea7aa72ed4640524a943440740a68ee139f81
                                            • Instruction ID: 6221a9036d09df45d33125ba93b856da71e554157a22c4cdc10a0b2ba1356448
                                            • Opcode Fuzzy Hash: 65ef02fb38a27282c9e7cf101ebea7aa72ed4640524a943440740a68ee139f81
                                            • Instruction Fuzzy Hash: EF62E370608341AFD724DF25C884BABF7A4BF85304F14492FF94597292D778AC89CB9A

                                            Control-flow Graph

                                            APIs
                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe,00000104,?), ref: 00401F4C
                                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                            • __wcsicoll.LIBCMT ref: 00402007
                                            • __wcsicoll.LIBCMT ref: 0040201D
                                            • __wcsicoll.LIBCMT ref: 00402033
                                              • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
                                            • __wcsicoll.LIBCMT ref: 00402049
                                            • _wcscpy.LIBCMT ref: 0040207C
                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe,00000104), ref: 00428B5B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
                                            • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe$CMDLINE$CMDLINERAW
                                            • API String ID: 3948761352-1157815227
                                            • Opcode ID: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                                            • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
                                            • Opcode Fuzzy Hash: 27c0ee8d5e07ffa73b3ecf85f0a0f7e742300051f6853106ad547b3ced8c3f3f
                                            • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

                                            Control-flow Graph

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __fread_nolock$_fseek_wcscpy
                                            • String ID: D)E$D)E$FILE
                                            • API String ID: 3888824918-361185794
                                            • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                            • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
                                            • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
                                            • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
                                            • __wsplitpath.LIBCMT ref: 0040E41C
                                              • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                            • _wcsncat.LIBCMT ref: 0040E433
                                            • __wmakepath.LIBCMT ref: 0040E44F
                                              • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
                                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                            • _wcscpy.LIBCMT ref: 0040E487
                                              • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                            • _wcscat.LIBCMT ref: 00427541
                                            • _wcslen.LIBCMT ref: 00427551
                                            • _wcslen.LIBCMT ref: 00427562
                                            • _wcscat.LIBCMT ref: 0042757C
                                            • _wcsncpy.LIBCMT ref: 004275BC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
                                            • String ID: Include$\
                                            • API String ID: 3173733714-3429789819
                                            • Opcode ID: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                                            • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
                                            • Opcode Fuzzy Hash: 319b33b76db705e9c7f26a1fcfbfbea2712403a0e0e393e117160b8853bc2a6c
                                            • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

                                            Control-flow Graph

                                            APIs
                                            • _fseek.LIBCMT ref: 0045292B
                                              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                              • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                              • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                            • __fread_nolock.LIBCMT ref: 00452961
                                            • __fread_nolock.LIBCMT ref: 00452971
                                            • __fread_nolock.LIBCMT ref: 0045298A
                                            • __fread_nolock.LIBCMT ref: 004529A5
                                            • _fseek.LIBCMT ref: 004529BF
                                            • _malloc.LIBCMT ref: 004529CA
                                            • _malloc.LIBCMT ref: 004529D6
                                            • __fread_nolock.LIBCMT ref: 004529E7
                                            • _free.LIBCMT ref: 00452A17
                                            • _free.LIBCMT ref: 00452A20
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
                                            • String ID:
                                            • API String ID: 1255752989-0
                                            • Opcode ID: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                                            • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
                                            • Opcode Fuzzy Hash: dcee285f3eb4ed07ece3e5bb349529478d219aecda09341451d4e57d6f047cda
                                            • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

                                            Control-flow Graph

                                            APIs
                                            • GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                            • RegisterClassExW.USER32(00000030), ref: 004104ED
                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                            • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                            • LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                            • ImageList_ReplaceIcon.COMCTL32(009D6880,000000FF,00000000), ref: 00410552
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                            • API String ID: 2914291525-1005189915
                                            • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                            • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
                                            • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
                                            • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99

                                            Control-flow Graph

                                            APIs
                                            • GetSysColorBrush.USER32(0000000F), ref: 0041039B
                                            • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
                                            • LoadIconW.USER32(?,00000063), ref: 004103C0
                                            • LoadIconW.USER32(?,000000A4), ref: 004103D3
                                            • LoadIconW.USER32(?,000000A2), ref: 004103E6
                                            • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
                                            • RegisterClassExW.USER32(?), ref: 0041045D
                                              • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
                                              • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
                                              • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
                                              • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
                                              • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
                                              • Part of subcall function 00410490: LoadIconW.USER32(00400000,000000A9), ref: 00410542
                                              • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(009D6880,000000FF,00000000), ref: 00410552
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                            • String ID: #$0$AutoIt v3
                                            • API String ID: 423443420-4155596026
                                            • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                            • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
                                            • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
                                            • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _malloc
                                            • String ID: Default
                                            • API String ID: 1579825452-753088835
                                            • Opcode ID: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
                                            • Instruction ID: a673259d86369fb9501a746496732cc59a2062e12c9a0651055f0cdb6904a52b
                                            • Opcode Fuzzy Hash: 4baf5ca2405be5455ac24bb95f1fa40f153dd1d14dcfbbf3cadbb4c6cd5c85f8
                                            • Instruction Fuzzy Hash: 13729DB06043019FD714DF25D481A2BB7E5EF85314F14882EE986AB391D738EC56CB9B

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1054 40f5c0-40f5cf call 422240 1057 40f5d0-40f5e8 1054->1057 1057->1057 1058 40f5ea-40f613 call 413650 call 410e60 1057->1058 1063 40f614-40f633 call 414d04 1058->1063 1066 40f691 1063->1066 1067 40f635-40f63c 1063->1067 1068 40f696-40f69c 1066->1068 1069 40f660-40f674 call 4150d1 1067->1069 1070 40f63e 1067->1070 1073 40f679-40f67c 1069->1073 1072 40f640 1070->1072 1074 40f642-40f650 1072->1074 1073->1063 1075 40f652-40f655 1074->1075 1076 40f67e-40f68c 1074->1076 1079 40f65b-40f65e 1075->1079 1080 425d1e-425d3e call 4150d1 call 414d04 1075->1080 1077 40f68e-40f68f 1076->1077 1078 40f69f-40f6ad 1076->1078 1077->1075 1082 40f6b4-40f6c2 1078->1082 1083 40f6af-40f6b2 1078->1083 1079->1069 1079->1072 1090 425d43-425d5f call 414d30 1080->1090 1085 425d16 1082->1085 1086 40f6c8-40f6d6 1082->1086 1083->1075 1085->1080 1088 425d05-425d0b 1086->1088 1089 40f6dc-40f6df 1086->1089 1088->1074 1091 425d11 1088->1091 1089->1075 1090->1068 1091->1085
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __fread_nolock_fseek_memmove_strcat
                                            • String ID: AU3!$EA06
                                            • API String ID: 1268643489-2658333250
                                            • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                            • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
                                            • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
                                            • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1094 401100-401111 1095 401113-401119 1094->1095 1096 401179-401180 1094->1096 1098 401144-40114a 1095->1098 1099 40111b-40111e 1095->1099 1096->1095 1097 401182 1096->1097 1103 40112c-401141 DefWindowProcW 1097->1103 1101 401184-40118e call 401250 1098->1101 1102 40114c-40114f 1098->1102 1099->1098 1100 401120-401126 1099->1100 1100->1103 1104 42b038-42b03f 1100->1104 1111 401193-40119a 1101->1111 1105 401151-401157 1102->1105 1106 40119d 1102->1106 1104->1103 1110 42b045-42b059 call 401000 call 40e0c0 1104->1110 1108 401219-40121f 1105->1108 1109 40115d 1105->1109 1112 4011a3-4011a9 1106->1112 1113 42afb4-42afc5 call 40f190 1106->1113 1108->1100 1117 401225-42b06d call 468b0e 1108->1117 1115 401163-401166 1109->1115 1116 42b01d-42b024 1109->1116 1110->1103 1112->1100 1114 4011af 1112->1114 1113->1111 1114->1100 1120 4011b6-4011d8 KillTimer call 401000 PostQuitMessage 1114->1120 1121 4011db-401202 SetTimer RegisterWindowMessageW 1114->1121 1123 42afe9-42b018 call 40f190 call 401a50 1115->1123 1124 40116c-401172 1115->1124 1116->1103 1122 42b02a-42b033 call 4370f4 1116->1122 1117->1111 1121->1111 1130 401204-401216 CreatePopupMenu 1121->1130 1122->1103 1123->1103 1124->1100 1132 401174-42afde call 45fd57 1124->1132 1132->1103 1145 42afe4 1132->1145 1145->1111
                                            APIs
                                            • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
                                            • KillTimer.USER32(?,00000001,?), ref: 004011B9
                                            • PostQuitMessage.USER32(00000000), ref: 004011CB
                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
                                            • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
                                            • CreatePopupMenu.USER32 ref: 00401204
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                            • String ID: TaskbarCreated
                                            • API String ID: 129472671-2362178303
                                            • Opcode ID: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                                            • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
                                            • Opcode Fuzzy Hash: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
                                            • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1146 4115d7-4115df 1147 4115ee-4115f9 call 4135bb 1146->1147 1150 4115e1-4115ec call 411988 1147->1150 1151 4115fb-4115fc 1147->1151 1150->1147 1154 4115fd-41160e 1150->1154 1155 411610-41163b call 417fc0 call 41130a 1154->1155 1156 41163c-411656 call 4180af call 418105 1154->1156 1155->1156
                                            APIs
                                            • _malloc.LIBCMT ref: 004115F1
                                              • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                              • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                              • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                            • std::exception::exception.LIBCMT ref: 00411626
                                            • std::exception::exception.LIBCMT ref: 00411640
                                            • __CxxThrowException@8.LIBCMT ref: 00411651
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
                                            • String ID: ,*H$4*H$@fI
                                            • API String ID: 615853336-1459471987
                                            • Opcode ID: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                            • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
                                            • Opcode Fuzzy Hash: 221d40d7984faa14442154e9f969528898a85ced6d82758f7c2d656e85d04d6d
                                            • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1165 407aee0-407af8e call 40788d0 1168 407af95-407afbb call 407bdf0 CreateFileW 1165->1168 1171 407afc2-407afd2 1168->1171 1172 407afbd 1168->1172 1177 407afd4 1171->1177 1178 407afd9-407aff3 VirtualAlloc 1171->1178 1173 407b10d-407b111 1172->1173 1175 407b153-407b156 1173->1175 1176 407b113-407b117 1173->1176 1179 407b159-407b160 1175->1179 1180 407b123-407b127 1176->1180 1181 407b119-407b11c 1176->1181 1177->1173 1184 407aff5 1178->1184 1185 407affa-407b011 ReadFile 1178->1185 1186 407b1b5-407b1ca 1179->1186 1187 407b162-407b16d 1179->1187 1182 407b137-407b13b 1180->1182 1183 407b129-407b133 1180->1183 1181->1180 1190 407b13d-407b147 1182->1190 1191 407b14b 1182->1191 1183->1182 1184->1173 1192 407b013 1185->1192 1193 407b018-407b058 VirtualAlloc 1185->1193 1188 407b1cc-407b1d7 VirtualFree 1186->1188 1189 407b1da-407b1e2 1186->1189 1194 407b171-407b17d 1187->1194 1195 407b16f 1187->1195 1188->1189 1190->1191 1191->1175 1192->1173 1196 407b05f-407b07a call 407c040 1193->1196 1197 407b05a 1193->1197 1198 407b191-407b19d 1194->1198 1199 407b17f-407b18f 1194->1199 1195->1186 1205 407b085-407b08f 1196->1205 1197->1173 1200 407b19f-407b1a8 1198->1200 1201 407b1aa-407b1b0 1198->1201 1203 407b1b3 1199->1203 1200->1203 1201->1203 1203->1179 1206 407b0c2-407b0d6 call 407be50 1205->1206 1207 407b091-407b0c0 call 407c040 1205->1207 1213 407b0da-407b0de 1206->1213 1214 407b0d8 1206->1214 1207->1205 1215 407b0e0-407b0e4 CloseHandle 1213->1215 1216 407b0ea-407b0ee 1213->1216 1214->1173 1215->1216 1217 407b0f0-407b0fb VirtualFree 1216->1217 1218 407b0fe-407b107 1216->1218 1217->1218 1218->1168 1218->1173
                                            APIs
                                            • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 0407AFB1
                                            • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0407B1D7
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1360820962.0000000004078000.00000040.00000020.00020000.00000000.sdmp, Offset: 04078000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_4078000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CreateFileFreeVirtual
                                            • String ID:
                                            • API String ID: 204039940-0
                                            • Opcode ID: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                                            • Instruction ID: b5b7dd94663e2b341fbe70670efcf3863d30875c4a3c21298ab1004cd49655ca
                                            • Opcode Fuzzy Hash: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                                            • Instruction Fuzzy Hash: C8A11B74E00209EBDB14DFA4C994BEEB7B5FF48308F108159E511BB280D775AA81DF9A

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1219 4102b0-4102c5 SHGetMalloc 1220 4102cb-4102da SHGetDesktopFolder 1219->1220 1221 425dfd-425e0e call 433244 1219->1221 1222 4102e0-41031a call 412fba 1220->1222 1223 41036b-410379 1220->1223 1231 410360-410368 1222->1231 1232 41031c-410331 SHGetPathFromIDListW 1222->1232 1223->1221 1229 41037f-410384 1223->1229 1231->1223 1233 410351-41035d 1232->1233 1234 410333-41034a call 412fba 1232->1234 1233->1231 1234->1233
                                            APIs
                                            • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                            • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                            • _wcsncpy.LIBCMT ref: 004102ED
                                            • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                            • _wcsncpy.LIBCMT ref: 00410340
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _wcsncpy$DesktopFolderFromListMallocPath
                                            • String ID: C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe
                                            • API String ID: 3170942423-2376704120
                                            • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                            • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
                                            • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
                                            • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1237 40e4c0-40e4e5 call 403350 RegOpenKeyExW 1240 427190-4271ae RegQueryValueExW 1237->1240 1241 40e4eb-40e4f0 1237->1241 1242 4271b0-4271f5 call 4115d7 call 43652f RegQueryValueExW 1240->1242 1243 42721a-42722a RegCloseKey 1240->1243 1248 427210-427219 call 436508 1242->1248 1249 4271f7-42720e call 402160 1242->1249 1248->1243 1249->1248
                                            APIs
                                            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
                                            • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: QueryValue$CloseOpen
                                            • String ID: Include$Software\AutoIt v3\AutoIt
                                            • API String ID: 1586453840-614718249
                                            • Opcode ID: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                                            • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
                                            • Opcode Fuzzy Hash: 413bff81f872addaca3d9ad162024b649ce289641a3285436bc7eb0a5f7ce606
                                            • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1254 410570-4105f1 CreateWindowExW * 2 ShowWindow * 2
                                            APIs
                                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
                                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
                                            • ShowWindow.USER32(?,00000000), ref: 004105E4
                                            • ShowWindow.USER32(?,00000000), ref: 004105EE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Window$CreateShow
                                            • String ID: AutoIt v3$edit
                                            • API String ID: 1584632944-3779509399
                                            • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                            • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
                                            • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
                                            • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
                                            APIs
                                              • Part of subcall function 0407AB70: Sleep.KERNELBASE(000001F4), ref: 0407AB81
                                            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0407ADCC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1360820962.0000000004078000.00000040.00000020.00020000.00000000.sdmp, Offset: 04078000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_4078000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CreateFileSleep
                                            • String ID: AADD5YYJZH0EA1309T8TGVAONIZZ7
                                            • API String ID: 2694422964-1595188804
                                            • Opcode ID: a8a08ef0564b4ce69e9b9ab35f980d284ea8537dd566d90f0f3724605729b48c
                                            • Instruction ID: 1cb1a7ddfab6d9aa19ebdd6fec806dcc6eb2ffb529ae692bcabeb7805da71891
                                            • Opcode Fuzzy Hash: a8a08ef0564b4ce69e9b9ab35f980d284ea8537dd566d90f0f3724605729b48c
                                            • Instruction Fuzzy Hash: 4861A570E04288DAEF11DBF4C854BEFBBB5AF15304F044199E2497B2C1D7B91A49CB6A
                                            APIs
                                            • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
                                            • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
                                            • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
                                            • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Close$OpenQueryValue
                                            • String ID: Control Panel\Mouse
                                            • API String ID: 1607946009-824357125
                                            • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                            • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
                                            • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
                                            • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4
                                            APIs
                                            • CreateProcessW.KERNELBASE(?,00000000), ref: 0407A39D
                                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0407A3C1
                                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0407A3E3
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1360820962.0000000004078000.00000040.00000020.00020000.00000000.sdmp, Offset: 04078000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_4078000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                                            • String ID:
                                            • API String ID: 2438371351-0
                                            • Opcode ID: 75058a4f97cf2fcbd3f6bc15a6ffc08ef8895de4d25848071cc819695d886454
                                            • Instruction ID: f77761337d423462760677775fc89ab0964a83fd06d01a6b841bb573f5c4605a
                                            • Opcode Fuzzy Hash: 75058a4f97cf2fcbd3f6bc15a6ffc08ef8895de4d25848071cc819695d886454
                                            • Instruction Fuzzy Hash: A362EA30E142589BEB24DFA4C854BDEB376EF58304F1091A9D10DEB290E675AE81CF5A
                                            APIs
                                              • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
                                            • _free.LIBCMT ref: 004295A0
                                              • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                              • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                              • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
                                              • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
                                              • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
                                              • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
                                            • String ID: >>>AUTOIT SCRIPT<<<$C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe
                                            • API String ID: 3938964917-1876363511
                                            • Opcode ID: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
                                            • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
                                            • Opcode Fuzzy Hash: 54ef76e4734de236163cd7b280f05d5101af8392224d903fd41af02c4ea86240
                                            • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID: Error:
                                            • API String ID: 4104443479-232661952
                                            • Opcode ID: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                                            • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
                                            • Opcode Fuzzy Hash: 20a21836adb2195423de36251fb93945767d574b7418eb2d4267c7510a98c7d8
                                            • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
                                            APIs
                                            • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
                                              • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe,0040F545,C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe,004A90E8,C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe,?,0040F545), ref: 0041013C
                                              • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
                                              • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
                                              • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
                                              • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
                                              • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
                                              • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
                                            • String ID: X$pWH
                                            • API String ID: 85490731-941433119
                                            • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                            • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
                                            • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
                                            • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
                                            Strings
                                            • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
                                            • C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe, xrefs: 00410107
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _strcat
                                            • String ID: >>>AUTOIT NO CMDEXECUTE<<<$C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe
                                            • API String ID: 1765576173-3664923612
                                            • Opcode ID: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                                            • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
                                            • Opcode Fuzzy Hash: 9cf7010eca5106026e95a37c4c4993c7a48cbbbd0f5b26026c251fe95f3d7589
                                            • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                            • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
                                            • Opcode Fuzzy Hash: 7af5e299b258df5e9c9a2551ed0e7af6e1d4c875de24c7fdf76d77545964eae0
                                            • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __filbuf__getptd_noexit__read_memcpy_s
                                            • String ID:
                                            • API String ID: 1794320848-0
                                            • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                            • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
                                            • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
                                            • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
                                            APIs
                                            • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
                                            • TerminateProcess.KERNEL32(00000000), ref: 004753CE
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Process$CurrentTerminate
                                            • String ID:
                                            • API String ID: 2429186680-0
                                            • Opcode ID: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                            • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
                                            • Opcode Fuzzy Hash: aaa6002d905a33e4c3ceade7f85f71e7f986a1c67485104df61a1a5e3f63762c
                                            • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
                                            APIs
                                            • _malloc.LIBCMT ref: 0043214B
                                              • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                              • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                              • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                            • _malloc.LIBCMT ref: 0043215D
                                            • _malloc.LIBCMT ref: 0043216F
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _malloc$AllocateHeap
                                            • String ID:
                                            • API String ID: 680241177-0
                                            • Opcode ID: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                                            • Instruction ID: dac51259f70ca5acf95ac1b1a30df86389447b5c3122b5fc7e5239b6c816f1c7
                                            • Opcode Fuzzy Hash: ab61ccc74db86e6fcdeb904a32b1d9569ed7ac6f88b96914968634a5dd1a0039
                                            • Instruction Fuzzy Hash: A0F0E273200B142AD2206A6A6DC1BE7B39ADBD4765F00403FFB058A206DAE9988542EC
                                            APIs
                                            • __wsplitpath.LIBCMT ref: 004678F7
                                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                            • GetLastError.KERNEL32(00000000,00000000), ref: 004679C7
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ErrorLast__wsplitpath_malloc
                                            • String ID:
                                            • API String ID: 4163294574-0
                                            • Opcode ID: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                                            • Instruction ID: 5ded281afda408fdcd401bf2365ceabb828b89a129c607e264fb1023d06c7d2e
                                            • Opcode Fuzzy Hash: b7e2b2e067b321cb14cd8dd870a284e502ce9d37bff932640fd458450c7e1011
                                            • Instruction Fuzzy Hash: FB5126712083018BD710EF75C881A5BB3E5AF84318F044A6EF9559B381EB39ED09CB97
                                            APIs
                                              • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
                                              • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
                                              • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
                                            • _strcat.LIBCMT ref: 0040F786
                                              • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
                                              • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
                                            • String ID:
                                            • API String ID: 3199840319-0
                                            • Opcode ID: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                                            • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
                                            • Opcode Fuzzy Hash: 49a3294527d5b305cfbd6c685c74412098d504eb7a2552fd7b1e5b305baf6987
                                            • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
                                            APIs
                                            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040D779
                                            • FreeLibrary.KERNEL32(?), ref: 0040D78E
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: FreeInfoLibraryParametersSystem
                                            • String ID:
                                            • API String ID: 3403648963-0
                                            • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                            • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
                                            • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
                                            • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
                                            APIs
                                            • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 0040F13A
                                            • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,0040DE74,?,00000001,?,00403423,?), ref: 00426326
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CreateFile
                                            • String ID:
                                            • API String ID: 823142352-0
                                            • Opcode ID: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                                            • Instruction ID: 8a88c5525f76e0b0fff62cf48ad84dc7055e673dbb4ccc29545257d8619b8f55
                                            • Opcode Fuzzy Hash: 01c8104855b6be3cf9f3f51c38ffad3c9237c0860841684a852cd2675ef3d23e
                                            • Instruction Fuzzy Hash: 16011D70784310BAF2305A68DD0BF5266546B45B24F20473ABBE5BE2D1D2F86885870C
                                            APIs
                                              • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                            • __lock_file.LIBCMT ref: 00414A8D
                                              • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
                                            • __fclose_nolock.LIBCMT ref: 00414A98
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                            • String ID:
                                            • API String ID: 2800547568-0
                                            • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                            • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
                                            • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
                                            • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
                                            APIs
                                            • __lock_file.LIBCMT ref: 00415012
                                            • __ftell_nolock.LIBCMT ref: 0041501F
                                              • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __ftell_nolock__getptd_noexit__lock_file
                                            • String ID:
                                            • API String ID: 2999321469-0
                                            • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                            • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
                                            • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
                                            • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
                                            APIs
                                            • CreateProcessW.KERNELBASE(?,00000000), ref: 0407A39D
                                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0407A3C1
                                            • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0407A3E3
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1360820962.0000000004078000.00000040.00000020.00020000.00000000.sdmp, Offset: 04078000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_4078000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                                            • String ID:
                                            • API String ID: 2438371351-0
                                            • Opcode ID: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                                            • Instruction ID: 2050b44681a321a03106252bd95b3c4206021acd9d2ff951b5d852c32a273f80
                                            • Opcode Fuzzy Hash: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                                            • Instruction Fuzzy Hash: 4312D024E14658C6EB24DF64D8507DEB272FF68300F1090E9910DEB7A4E77A5E81CF5A
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID:
                                            • API String ID: 4104443479-0
                                            • Opcode ID: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
                                            • Instruction ID: 6397ebbfaf442e519c955e074037b65107783079284990db5ef0c3dd021860ed
                                            • Opcode Fuzzy Hash: 224a1bccd0668171228bffd00b4e167e84225026459a60d9317a1c29c8a59c26
                                            • Instruction Fuzzy Hash: 36317371E00209EBDF009F52E9866AEFBF4FF40740F2189BED855E2650E7389990D759
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID:
                                            • API String ID: 4104443479-0
                                            • Opcode ID: 8b2818c8434b9a070bb7a9b9dd55d4aa8d61190f7c46d4f62081b3e0e63eee4f
                                            • Instruction ID: 412edbf2df7bf8c64f36b821a583ca4e96a0f18e0b9aed18a790d0e499aeb9a1
                                            • Opcode Fuzzy Hash: 8b2818c8434b9a070bb7a9b9dd55d4aa8d61190f7c46d4f62081b3e0e63eee4f
                                            • Instruction Fuzzy Hash: 60319CB9600A21EFC714DF19C580A62F7E0FF08310B14C57ADA89CB795E774E892CB99
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID:
                                            • API String ID: 544645111-0
                                            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                            • Instruction ID: 21b87f0337b3904faf2e49e7d89a80b8c5538d611ad57d97d778efbd48141229
                                            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                            • Instruction Fuzzy Hash: 8131F770A00105DBC718DF88E590AAAF7B1FB49310B6486A6E409CF355DB78EDC1CBD9
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                                            • Instruction ID: 427b4a632c312742ac0951887501238d3178a51c37fde1d0fd35c98815df3d2a
                                            • Opcode Fuzzy Hash: e5559574dc10eca8e97d8025a500eef8ee7d185e3c773571fee143e03780f234
                                            • Instruction Fuzzy Hash: 21119674200201ABDB249F36D984E26B3A5AF45304B244D2FF9C5D7790DB7CE881DB5E
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 35b7bc891c26268d2cb6d46035521dde4ecfc0337a7d2d2d45483da740e67eee
                                            • Instruction ID: fe3c5e01fee558804f1d0cd68762aa03bf47037873853bda5dcd607d85013340
                                            • Opcode Fuzzy Hash: 35b7bc891c26268d2cb6d46035521dde4ecfc0337a7d2d2d45483da740e67eee
                                            • Instruction Fuzzy Hash: 2D118B352046019FDB10DF69D884E96B3E9AF8A314F14856EFD298B362CB35FC41CB95
                                            APIs
                                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                            • _memmove.LIBCMT ref: 00444B34
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _malloc_memmove
                                            • String ID:
                                            • API String ID: 1183979061-0
                                            • Opcode ID: 5456aa698ccb66e472ad2dc6bdf94112e2600af6ff6d776df7a489d92d6f0097
                                            • Instruction ID: 1ab6fe9f530497837eb86deb75815884a9af672873ccf792f11a5e6f6739e6df
                                            • Opcode Fuzzy Hash: 5456aa698ccb66e472ad2dc6bdf94112e2600af6ff6d776df7a489d92d6f0097
                                            • Instruction Fuzzy Hash: E0016D3220410AAFD714DF2CC882DA7B3EDEF88318711492FE996C7251EA74F9508B94
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __lock_file
                                            • String ID:
                                            • API String ID: 3031932315-0
                                            • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                            • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
                                            • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
                                            • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
                                            APIs
                                            • WriteFile.KERNELBASE(?,?,?,?,00000000,?,?,?,004263D0,?,00487ACC,00000003,0040DE90,?,?,00000001), ref: 00443E54
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: FileWrite
                                            • String ID:
                                            • API String ID: 3934441357-0
                                            • Opcode ID: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                                            • Instruction ID: f8d6e32d6ecef3e6c51c5ea05c7ff41eb941b2b6d152ec47b845c679c5cedb0e
                                            • Opcode Fuzzy Hash: 873a582ac05df194872d3361efdc1b64d97226b1633050e8059638026df5ad0f
                                            • Instruction Fuzzy Hash: 6BE01276100318ABDB10DF98D844FDA77BCEF48765F10891AFA048B200C7B4EA908BE4
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __wfsopen
                                            • String ID:
                                            • API String ID: 197181222-0
                                            • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                            • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
                                            • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
                                            • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
                                            APIs
                                            • CloseHandle.KERNELBASE(?,?,00426FBF), ref: 0040DA3D
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CloseHandle
                                            • String ID:
                                            • API String ID: 2962429428-0
                                            • Opcode ID: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                                            • Instruction ID: 552ddd844a8bbede063c80161f66c4637379340f91e2bb70a518b226642b2913
                                            • Opcode Fuzzy Hash: 4893ac657bcef9b9334a0355bd28ce0f0291ef024a1c9f1561977d8c5be9d70a
                                            • Instruction Fuzzy Hash: B9E045B4A04B008BC6308F5BE444416FBF8EEE46203108E1FD4A6C2A64C3B4A1498F50
                                            APIs
                                            • Sleep.KERNELBASE(000001F4), ref: 0407AB81
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1360820962.0000000004078000.00000040.00000020.00020000.00000000.sdmp, Offset: 04078000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_4078000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Sleep
                                            • String ID:
                                            • API String ID: 3472027048-0
                                            • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                            • Instruction ID: 3509347b4e0ece66f4ac9fb03afba4f4406f1f903a225b43328afa5288a2c5d3
                                            • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                            • Instruction Fuzzy Hash: 46E0BF7494020DEFDB00EFA4D5496DE7BB4EF05301F1005A1FD05E7681DB30AE548A66
                                            APIs
                                            • Sleep.KERNELBASE(000001F4), ref: 0407AB81
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1360820962.0000000004078000.00000040.00000020.00020000.00000000.sdmp, Offset: 04078000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_4078000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Sleep
                                            • String ID:
                                            • API String ID: 3472027048-0
                                            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                            • Instruction ID: 356739000fb06ef69d46fab906f31b53f468df4256a9a3352f4188d57fa81172
                                            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                            • Instruction Fuzzy Hash: BFE0E67494020DDFDB00EFB4D54969E7FB4EF04301F100561FD05E2281D6309D508A62
                                            APIs
                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
                                            • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
                                            • GetKeyState.USER32(00000011), ref: 0047C92D
                                            • GetKeyState.USER32(00000009), ref: 0047C936
                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
                                            • GetKeyState.USER32(00000010), ref: 0047C953
                                            • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
                                            • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
                                            • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
                                            • _wcsncpy.LIBCMT ref: 0047CA29
                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
                                            • SendMessageW.USER32 ref: 0047CA7F
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
                                            • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
                                            • ImageList_SetDragCursorImage.COMCTL32(009D6880,00000000,00000000,00000000), ref: 0047CB9B
                                            • ImageList_BeginDrag.COMCTL32(009D6880,00000000,000000F8,000000F0), ref: 0047CBAC
                                            • SetCapture.USER32(?), ref: 0047CBB6
                                            • ClientToScreen.USER32(?,?), ref: 0047CC17
                                            • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
                                            • ReleaseCapture.USER32 ref: 0047CC3A
                                            • GetCursorPos.USER32(?), ref: 0047CC72
                                            • ScreenToClient.USER32(?,?), ref: 0047CC80
                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
                                            • SendMessageW.USER32 ref: 0047CD12
                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
                                            • SendMessageW.USER32 ref: 0047CD80
                                            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
                                            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
                                            • GetCursorPos.USER32(?), ref: 0047CDC8
                                            • ScreenToClient.USER32(?,?), ref: 0047CDD6
                                            • GetParent.USER32(00000000), ref: 0047CDF7
                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
                                            • SendMessageW.USER32 ref: 0047CE93
                                            • ClientToScreen.USER32(?,?), ref: 0047CEEE
                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,02FC1AE8,00000000,?,?,?,?), ref: 0047CF1C
                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
                                            • SendMessageW.USER32 ref: 0047CF6B
                                            • ClientToScreen.USER32(?,?), ref: 0047CFB5
                                            • TrackPopupMenuEx.USER32(?,00000080,?,?,02FC1AE8,00000000,?,?,?,?), ref: 0047CFE6
                                            • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                            • String ID: @GUI_DRAGID$F
                                            • API String ID: 3100379633-4164748364
                                            • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                            • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
                                            • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
                                            • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
                                            APIs
                                            • GetForegroundWindow.USER32 ref: 00434420
                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
                                            • IsIconic.USER32(?), ref: 0043444F
                                            • ShowWindow.USER32(?,00000009), ref: 0043445C
                                            • SetForegroundWindow.USER32(?), ref: 0043446A
                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
                                            • GetCurrentThreadId.KERNEL32 ref: 00434485
                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
                                            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
                                            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
                                            • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
                                            • SetForegroundWindow.USER32(00000000), ref: 004344B7
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
                                            • keybd_event.USER32(00000012,00000000), ref: 004344CF
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
                                            • keybd_event.USER32(00000012,00000000), ref: 004344E6
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
                                            • keybd_event.USER32(00000012,00000000), ref: 004344FD
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
                                            • keybd_event.USER32(00000012,00000000), ref: 00434514
                                            • SetForegroundWindow.USER32(00000000), ref: 0043451E
                                            • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
                                            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                            • String ID: Shell_TrayWnd
                                            • API String ID: 2889586943-2988720461
                                            • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                            • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
                                            • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
                                            • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
                                            APIs
                                            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
                                            • CloseHandle.KERNEL32(?), ref: 004463A0
                                            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
                                            • GetProcessWindowStation.USER32 ref: 004463D1
                                            • SetProcessWindowStation.USER32(00000000), ref: 004463DB
                                            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
                                            • _wcslen.LIBCMT ref: 00446498
                                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                            • _wcsncpy.LIBCMT ref: 004464C0
                                            • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
                                            • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
                                            • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
                                            • UnloadUserProfile.USERENV(?,?), ref: 00446555
                                            • CloseWindowStation.USER32(00000000), ref: 0044656C
                                            • CloseDesktop.USER32(?), ref: 0044657A
                                            • SetProcessWindowStation.USER32(?), ref: 00446588
                                            • CloseHandle.KERNEL32(?), ref: 00446592
                                            • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
                                            • String ID: $@OH$default$winsta0
                                            • API String ID: 3324942560-3791954436
                                            • Opcode ID: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
                                            • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
                                            • Opcode Fuzzy Hash: 4d1d68c1aea3dabcf030405aafb24e1344eb51be90ba82aa3e7b9bd6ceeac822
                                            • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
                                            APIs
                                            • _wcslen.LIBCMT ref: 004096C1
                                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                            • _memmove.LIBCMT ref: 0040970C
                                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                            • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
                                            • _memmove.LIBCMT ref: 00409D96
                                            • _memmove.LIBCMT ref: 0040A6C4
                                            • _memmove.LIBCMT ref: 004297E5
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
                                            • String ID:
                                            • API String ID: 2383988440-0
                                            • Opcode ID: e127891bc0a98d019add158fe61e22172890978285290b421ac62a594046158c
                                            • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
                                            • Opcode Fuzzy Hash: e127891bc0a98d019add158fe61e22172890978285290b421ac62a594046158c
                                            • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B
                                            APIs
                                            • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
                                            • FindClose.KERNEL32(00000000), ref: 00478924
                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
                                            • __swprintf.LIBCMT ref: 004789D3
                                            • __swprintf.LIBCMT ref: 00478A1D
                                            • __swprintf.LIBCMT ref: 00478A4B
                                            • __swprintf.LIBCMT ref: 00478A79
                                              • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
                                              • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
                                            • __swprintf.LIBCMT ref: 00478AA7
                                            • __swprintf.LIBCMT ref: 00478AD5
                                            • __swprintf.LIBCMT ref: 00478B03
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
                                            • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                            • API String ID: 999945258-2428617273
                                            • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                            • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
                                            • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
                                            • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
                                            APIs
                                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                            • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
                                            • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
                                            • __wsplitpath.LIBCMT ref: 00403492
                                              • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                            • _wcscpy.LIBCMT ref: 004034A7
                                            • _wcscat.LIBCMT ref: 004034BC
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
                                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                              • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
                                              • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
                                            • _wcscpy.LIBCMT ref: 004035A0
                                            • _wcslen.LIBCMT ref: 00403623
                                            • _wcslen.LIBCMT ref: 0040367D
                                            Strings
                                            • Error opening the file, xrefs: 00428231
                                            • _, xrefs: 0040371C
                                            • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
                                            • Unterminated string, xrefs: 00428348
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
                                            • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
                                            • API String ID: 3393021363-188983378
                                            • Opcode ID: ce77724faf1e7fbc9fcf9b1a922f2907e035de924d79ec5656a8af7ae9668c55
                                            • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
                                            • Opcode Fuzzy Hash: ce77724faf1e7fbc9fcf9b1a922f2907e035de924d79ec5656a8af7ae9668c55
                                            • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
                                            • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
                                            • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
                                            • FindClose.KERNEL32(00000000), ref: 00431B20
                                            • FindClose.KERNEL32(00000000), ref: 00431B34
                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
                                            • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
                                            • FindClose.KERNEL32(00000000), ref: 00431BCD
                                            • FindClose.KERNEL32(00000000), ref: 00431BDB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                            • String ID: *.*
                                            • API String ID: 1409584000-438819550
                                            • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                            • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
                                            • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
                                            • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
                                            APIs
                                            • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
                                            • __swprintf.LIBCMT ref: 00431C2E
                                            • _wcslen.LIBCMT ref: 00431C3A
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
                                            • String ID: :$\$\??\%s
                                            • API String ID: 2192556992-3457252023
                                            • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                            • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
                                            • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
                                            • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
                                            APIs
                                            • GetLocalTime.KERNEL32(?), ref: 004722A2
                                            • __swprintf.LIBCMT ref: 004722B9
                                            • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
                                            • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
                                            • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
                                            • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
                                            • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
                                            • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
                                            • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
                                            • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
                                            • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: FolderPath$LocalTime__swprintf
                                            • String ID: %.3d
                                            • API String ID: 3337348382-986655627
                                            • Opcode ID: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                            • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
                                            • Opcode Fuzzy Hash: e729fe0eecd02e77c5ee8deaec4c56456965897f8b2a75efd2bc4ea0d4b88c57
                                            • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
                                            APIs
                                            • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
                                            • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
                                            • FindClose.KERNEL32(00000000), ref: 0044291C
                                            • FindClose.KERNEL32(00000000), ref: 00442930
                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
                                            • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
                                            • FindClose.KERNEL32(00000000), ref: 004429D4
                                              • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
                                            • FindClose.KERNEL32(00000000), ref: 004429E2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                            • String ID: *.*
                                            • API String ID: 2640511053-438819550
                                            • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                            • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
                                            • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
                                            • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
                                            APIs
                                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
                                            • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
                                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
                                            • GetLastError.KERNEL32 ref: 00433414
                                            • ExitWindowsEx.USER32(?,00000000), ref: 00433437
                                            • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
                                            • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
                                            • String ID: SeShutdownPrivilege
                                            • API String ID: 2938487562-3733053543
                                            • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                            • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
                                            • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
                                            • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
                                            APIs
                                              • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
                                              • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
                                              • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
                                              • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
                                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
                                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
                                            • GetLengthSid.ADVAPI32(?), ref: 004461D0
                                            • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
                                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
                                            • GetLengthSid.ADVAPI32(?), ref: 00446241
                                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
                                            • CopySid.ADVAPI32(00000000), ref: 00446271
                                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
                                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                            • String ID:
                                            • API String ID: 1255039815-0
                                            • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                            • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
                                            • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
                                            • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
                                            APIs
                                            • __swprintf.LIBCMT ref: 00433073
                                            • __swprintf.LIBCMT ref: 00433085
                                            • __wcsicoll.LIBCMT ref: 00433092
                                            • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
                                            • LoadResource.KERNEL32(?,00000000), ref: 004330BD
                                            • LockResource.KERNEL32(00000000), ref: 004330CA
                                            • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
                                            • LoadResource.KERNEL32(?,00000000), ref: 00433105
                                            • SizeofResource.KERNEL32(?,00000000), ref: 00433114
                                            • LockResource.KERNEL32(?), ref: 00433120
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
                                            • String ID:
                                            • API String ID: 1158019794-0
                                            • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                            • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
                                            • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
                                            • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                            • String ID:
                                            • API String ID: 1737998785-0
                                            • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                            • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
                                            • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
                                            • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0045D627
                                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
                                            • GetLastError.KERNEL32 ref: 0045D6BF
                                            • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Error$Mode$DiskFreeLastSpace
                                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                            • API String ID: 4194297153-14809454
                                            • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                            • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
                                            • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
                                            • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _memmove$_strncmp
                                            • String ID: @oH$\$^$h
                                            • API String ID: 2175499884-3701065813
                                            • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                            • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
                                            • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
                                            • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
                                            APIs
                                            • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
                                            • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
                                            • bind.WSOCK32(00000000,?,00000010), ref: 00465356
                                            • WSAGetLastError.WSOCK32(00000000), ref: 00465363
                                            • closesocket.WSOCK32(00000000,00000000), ref: 00465377
                                            • listen.WSOCK32(00000000,00000005), ref: 00465381
                                            • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
                                            • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ErrorLast$closesocket$bindlistensocket
                                            • String ID:
                                            • API String ID: 540024437-0
                                            • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                            • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
                                            • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
                                            • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ERCP$VUUU$VUUU$VUUU$XjH
                                            • API String ID: 0-2872873767
                                            • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                            • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
                                            • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
                                            • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
                                            • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
                                            • __wsplitpath.LIBCMT ref: 00475644
                                              • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                            • _wcscat.LIBCMT ref: 00475657
                                            • __wcsicoll.LIBCMT ref: 0047567B
                                            • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
                                            • CloseHandle.KERNEL32(00000000), ref: 004756BA
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
                                            • String ID:
                                            • API String ID: 2547909840-0
                                            • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                            • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
                                            • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
                                            • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
                                            APIs
                                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                            • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
                                            • Sleep.KERNEL32(0000000A), ref: 0045250B
                                            • FindNextFileW.KERNEL32(?,?), ref: 004525E9
                                            • FindClose.KERNEL32(?), ref: 004525FF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
                                            • String ID: *.*$\VH
                                            • API String ID: 2786137511-2657498754
                                            • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                            • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
                                            • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
                                            • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
                                            APIs
                                            • IsDebuggerPresent.KERNEL32 ref: 00421FC1
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
                                            • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
                                            • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
                                            • TerminateProcess.KERNEL32(00000000), ref: 00422004
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                            • String ID: pqI
                                            • API String ID: 2579439406-2459173057
                                            • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                            • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
                                            • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
                                            • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
                                            APIs
                                            • __wcsicoll.LIBCMT ref: 00433349
                                            • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
                                            • __wcsicoll.LIBCMT ref: 00433375
                                            • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __wcsicollmouse_event
                                            • String ID: DOWN
                                            • API String ID: 1033544147-711622031
                                            • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                            • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
                                            • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
                                            • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
                                            APIs
                                            • GetKeyboardState.USER32(?), ref: 0044C3D2
                                            • SetKeyboardState.USER32(00000080), ref: 0044C3F6
                                            • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
                                            • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
                                            • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: KeyboardMessagePostState$InputSend
                                            • String ID:
                                            • API String ID: 3031425849-0
                                            • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                            • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
                                            • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
                                            • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
                                            APIs
                                              • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                            • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
                                            • WSAGetLastError.WSOCK32(00000000), ref: 00476692
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ErrorLastinet_addrsocket
                                            • String ID:
                                            • API String ID: 4170576061-0
                                            • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                            • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
                                            • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
                                            • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
                                            APIs
                                              • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                            • IsWindowVisible.USER32 ref: 0047A368
                                            • IsWindowEnabled.USER32 ref: 0047A378
                                            • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
                                            • IsIconic.USER32 ref: 0047A393
                                            • IsZoomed.USER32 ref: 0047A3A1
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                            • String ID:
                                            • API String ID: 292994002-0
                                            • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                            • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
                                            • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
                                            • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
                                            APIs
                                              • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                            • CoInitialize.OLE32(00000000), ref: 00478442
                                            • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
                                            • CoUninitialize.OLE32 ref: 0047863C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CreateInitializeInstanceUninitialize_wcslen
                                            • String ID: .lnk
                                            • API String ID: 886957087-24824748
                                            • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                            • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
                                            • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
                                            • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
                                            APIs
                                            • OpenClipboard.USER32(?), ref: 0046DCE7
                                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                            • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                            • CloseClipboard.USER32 ref: 0046DD0D
                                            • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                            • CloseClipboard.USER32 ref: 0046DD41
                                            • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                            • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                            • CloseClipboard.USER32 ref: 0046DD99
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                            • String ID:
                                            • API String ID: 15083398-0
                                            • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                            • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
                                            • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
                                            • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID: U$\
                                            • API String ID: 4104443479-100911408
                                            • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                            • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
                                            • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
                                            • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
                                            APIs
                                            • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
                                            • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
                                            • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Find$File$CloseFirstNext
                                            • String ID:
                                            • API String ID: 3541575487-0
                                            • Opcode ID: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                                            • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
                                            • Opcode Fuzzy Hash: b82a98c6df9a243ef4fbf3c667c5144d50f68704456ba494e21579813087d3e5
                                            • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
                                            APIs
                                            • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
                                            • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
                                            • FindClose.KERNEL32(00000000), ref: 004339EB
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: FileFind$AttributesCloseFirst
                                            • String ID:
                                            • API String ID: 48322524-0
                                            • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                            • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
                                            • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
                                            • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
                                            APIs
                                            • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
                                            • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
                                              • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Internet$AvailableDataErrorFileLastQueryRead
                                            • String ID:
                                            • API String ID: 901099227-0
                                            • Opcode ID: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                                            • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
                                            • Opcode Fuzzy Hash: b48fbef154557e42056369557a390c5e15e1cd9efc8ac9760c34eb316c367bda
                                            • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
                                            APIs
                                            • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Proc
                                            • String ID:
                                            • API String ID: 2346855178-0
                                            • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                            • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
                                            • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
                                            • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
                                            APIs
                                            • BlockInput.USER32(00000001), ref: 0045A38B
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: BlockInput
                                            • String ID:
                                            • API String ID: 3456056419-0
                                            • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                            • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
                                            • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
                                            • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
                                            APIs
                                            • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: LogonUser
                                            • String ID:
                                            • API String ID: 1244722697-0
                                            • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                            • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
                                            • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
                                            • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
                                            APIs
                                            • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: NameUser
                                            • String ID:
                                            • API String ID: 2645101109-0
                                            • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                            • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
                                            • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
                                            • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
                                            APIs
                                            • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled
                                            • String ID:
                                            • API String ID: 3192549508-0
                                            • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                            • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
                                            • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
                                            • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: N@
                                            • API String ID: 0-1509896676
                                            • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                            • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
                                            • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
                                            • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                            • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
                                            • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
                                            • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                            • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
                                            • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                                            • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                            • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
                                            • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                                            • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                            • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
                                            • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                                            • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
                                            APIs
                                            • DeleteObject.GDI32(?), ref: 0045953B
                                            • DeleteObject.GDI32(?), ref: 00459551
                                            • DestroyWindow.USER32(?), ref: 00459563
                                            • GetDesktopWindow.USER32 ref: 00459581
                                            • GetWindowRect.USER32(00000000), ref: 00459588
                                            • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
                                            • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
                                            • GetClientRect.USER32(00000000,?), ref: 004596F8
                                            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
                                            • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
                                            • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
                                            • GlobalLock.KERNEL32(00000000), ref: 0045978F
                                            • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
                                            • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
                                            • CloseHandle.KERNEL32(00000000), ref: 004597AC
                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
                                            • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
                                            • GlobalFree.KERNEL32(00000000), ref: 004597E2
                                            • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
                                            • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
                                            • ShowWindow.USER32(?,00000004), ref: 00459865
                                            • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
                                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
                                            • GetStockObject.GDI32(00000011), ref: 004598CD
                                            • SelectObject.GDI32(00000000,00000000), ref: 004598D5
                                            • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
                                            • DeleteDC.GDI32(00000000), ref: 004598F8
                                            • _wcslen.LIBCMT ref: 00459916
                                            • _wcscpy.LIBCMT ref: 0045993A
                                            • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
                                            • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
                                            • GetDC.USER32(00000000), ref: 004599FC
                                            • SelectObject.GDI32(00000000,?), ref: 00459A0C
                                            • SelectObject.GDI32(00000000,00000007), ref: 00459A37
                                            • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
                                            • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
                                            • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
                                            • String ID: $AutoIt v3$DISPLAY$static
                                            • API String ID: 4040870279-2373415609
                                            • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                            • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
                                            • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
                                            • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
                                            APIs
                                            • GetSysColor.USER32(00000012), ref: 0044181E
                                            • SetTextColor.GDI32(?,?), ref: 00441826
                                            • GetSysColorBrush.USER32(0000000F), ref: 0044183D
                                            • GetSysColor.USER32(0000000F), ref: 00441849
                                            • SetBkColor.GDI32(?,?), ref: 00441864
                                            • SelectObject.GDI32(?,?), ref: 00441874
                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
                                            • GetSysColor.USER32(00000010), ref: 004418B2
                                            • CreateSolidBrush.GDI32(00000000), ref: 004418B9
                                            • FrameRect.USER32(?,?,00000000), ref: 004418CA
                                            • DeleteObject.GDI32(?), ref: 004418D5
                                            • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
                                            • FillRect.USER32(?,?,?), ref: 00441970
                                              • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
                                              • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
                                              • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                              • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
                                              • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
                                              • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                              • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
                                              • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
                                              • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
                                              • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                              • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                              • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                              • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
                                            • String ID:
                                            • API String ID: 69173610-0
                                            • Opcode ID: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
                                            • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
                                            • Opcode Fuzzy Hash: fbb8d870229eb44a1def9ba3881ac6b42e654f1da7cb1ff5097cb3e0d6ff825e
                                            • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
                                            APIs
                                            • DestroyWindow.USER32(?), ref: 004590F2
                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
                                            • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
                                            • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
                                            • GetClientRect.USER32(00000000,?), ref: 0045924E
                                            • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
                                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
                                            • GetStockObject.GDI32(00000011), ref: 004592AC
                                            • SelectObject.GDI32(00000000,00000000), ref: 004592B4
                                            • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
                                            • DeleteDC.GDI32(00000000), ref: 004592D6
                                            • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
                                            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
                                            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
                                            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
                                            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
                                            • GetStockObject.GDI32(00000011), ref: 004593D3
                                            • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
                                            • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                            • API String ID: 2910397461-517079104
                                            • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                            • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
                                            • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
                                            • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __wcsnicmp
                                            • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
                                            • API String ID: 1038674560-3360698832
                                            • Opcode ID: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                                            • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
                                            • Opcode Fuzzy Hash: 23f0f58ea95d18462155f90075fe93dcb11182f556a84baaa607307f542fa917
                                            • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
                                            APIs
                                            • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
                                            • SetCursor.USER32(00000000), ref: 0043075B
                                            • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
                                            • SetCursor.USER32(00000000), ref: 00430773
                                            • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
                                            • SetCursor.USER32(00000000), ref: 0043078B
                                            • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
                                            • SetCursor.USER32(00000000), ref: 004307A3
                                            • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
                                            • SetCursor.USER32(00000000), ref: 004307BB
                                            • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
                                            • SetCursor.USER32(00000000), ref: 004307D3
                                            • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
                                            • SetCursor.USER32(00000000), ref: 004307EB
                                            • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
                                            • SetCursor.USER32(00000000), ref: 00430803
                                            • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
                                            • SetCursor.USER32(00000000), ref: 0043081B
                                            • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
                                            • SetCursor.USER32(00000000), ref: 00430833
                                            • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
                                            • SetCursor.USER32(00000000), ref: 0043084B
                                            • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
                                            • SetCursor.USER32(00000000), ref: 00430863
                                            • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
                                            • SetCursor.USER32(00000000), ref: 0043087B
                                            • SetCursor.USER32(00000000), ref: 00430887
                                            • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
                                            • SetCursor.USER32(00000000), ref: 0043089F
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Cursor$Load
                                            • String ID:
                                            • API String ID: 1675784387-0
                                            • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                            • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
                                            • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
                                            • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
                                            APIs
                                            • GetSysColor.USER32(0000000E), ref: 00430913
                                            • SetTextColor.GDI32(?,00000000), ref: 0043091B
                                            • GetSysColor.USER32(00000012), ref: 00430933
                                            • SetTextColor.GDI32(?,?), ref: 0043093B
                                            • GetSysColorBrush.USER32(0000000F), ref: 0043094E
                                            • GetSysColor.USER32(0000000F), ref: 00430959
                                            • CreateSolidBrush.GDI32(?), ref: 00430962
                                            • GetSysColor.USER32(00000011), ref: 00430979
                                            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
                                            • SelectObject.GDI32(?,00000000), ref: 0043099C
                                            • SetBkColor.GDI32(?,?), ref: 004309A6
                                            • SelectObject.GDI32(?,?), ref: 004309B4
                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
                                            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
                                            • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
                                            • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
                                            • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
                                            • DrawFocusRect.USER32(?,?), ref: 00430A91
                                            • GetSysColor.USER32(00000011), ref: 00430A9F
                                            • SetTextColor.GDI32(?,00000000), ref: 00430AA7
                                            • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
                                            • SelectObject.GDI32(?,?), ref: 00430AD0
                                            • DeleteObject.GDI32(00000105), ref: 00430ADC
                                            • SelectObject.GDI32(?,?), ref: 00430AE3
                                            • DeleteObject.GDI32(?), ref: 00430AE9
                                            • SetTextColor.GDI32(?,?), ref: 00430AF0
                                            • SetBkColor.GDI32(?,?), ref: 00430AFB
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                            • String ID:
                                            • API String ID: 1582027408-0
                                            • Opcode ID: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
                                            • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
                                            • Opcode Fuzzy Hash: 550e896c7567608c30fce12d6ed7134b72d55419159f0474b5285c649df46e98
                                            • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
                                            APIs
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
                                            • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
                                            • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CloseConnectCreateRegistry
                                            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                            • API String ID: 3217815495-966354055
                                            • Opcode ID: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
                                            • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
                                            • Opcode Fuzzy Hash: c70c32215588f8ec8bb03fc6aa478a266b625616447da64362da41b73b816162
                                            • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
                                            APIs
                                            • GetCursorPos.USER32(?), ref: 004566AE
                                            • GetDesktopWindow.USER32 ref: 004566C3
                                            • GetWindowRect.USER32(00000000), ref: 004566CA
                                            • GetWindowLongW.USER32(?,000000F0), ref: 00456722
                                            • GetWindowLongW.USER32(?,000000F0), ref: 00456735
                                            • DestroyWindow.USER32(?), ref: 00456746
                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
                                            • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
                                            • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
                                            • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
                                            • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
                                            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
                                            • IsWindowVisible.USER32(?), ref: 0045682C
                                            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
                                            • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
                                            • GetWindowRect.USER32(?,?), ref: 00456873
                                            • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
                                            • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
                                            • CopyRect.USER32(?,?), ref: 004568BE
                                            • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
                                            • String ID: ($,$tooltips_class32
                                            • API String ID: 225202481-3320066284
                                            • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                            • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
                                            • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
                                            • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
                                            APIs
                                            • OpenClipboard.USER32(?), ref: 0046DCE7
                                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
                                            • GetClipboardData.USER32(0000000D), ref: 0046DD01
                                            • CloseClipboard.USER32 ref: 0046DD0D
                                            • GlobalLock.KERNEL32(00000000), ref: 0046DD37
                                            • CloseClipboard.USER32 ref: 0046DD41
                                            • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
                                            • GetClipboardData.USER32(00000001), ref: 0046DD8D
                                            • CloseClipboard.USER32 ref: 0046DD99
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
                                            • String ID:
                                            • API String ID: 15083398-0
                                            • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                            • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
                                            • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
                                            • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
                                            APIs
                                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                            • GetWindowRect.USER32(?,?), ref: 00471CF7
                                            • GetClientRect.USER32(?,?), ref: 00471D05
                                            • GetSystemMetrics.USER32(00000007), ref: 00471D0D
                                            • GetSystemMetrics.USER32(00000008), ref: 00471D20
                                            • GetSystemMetrics.USER32(00000004), ref: 00471D42
                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
                                            • GetSystemMetrics.USER32(00000007), ref: 00471D79
                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
                                            • GetSystemMetrics.USER32(00000008), ref: 00471DAB
                                            • GetSystemMetrics.USER32(00000004), ref: 00471DCF
                                            • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
                                            • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
                                            • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00400000,00000000), ref: 00471E35
                                            • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
                                            • GetClientRect.USER32(?,?), ref: 00471E8A
                                            • GetStockObject.GDI32(00000011), ref: 00471EA6
                                            • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
                                            • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
                                            • String ID: @$AutoIt v3 GUI
                                            • API String ID: 867697134-3359773793
                                            • Opcode ID: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                                            • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
                                            • Opcode Fuzzy Hash: d466945cffb50a7196a7867ec3c7573785653ff52612d7c288cf7d01b72dc8e8
                                            • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
                                            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                            • API String ID: 1503153545-1459072770
                                            • Opcode ID: 76acf26b61918e0ebafe3e9c460c5efedcc98b6992261bc6c4f6588f91b2aee1
                                            • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
                                            • Opcode Fuzzy Hash: 76acf26b61918e0ebafe3e9c460c5efedcc98b6992261bc6c4f6588f91b2aee1
                                            • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __wcsicoll$__wcsnicmp
                                            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
                                            • API String ID: 790654849-32604322
                                            • Opcode ID: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                            • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
                                            • Opcode Fuzzy Hash: 29d435e902b015a153743909057decd258383f7606cc46ad0233eead686698a2
                                            • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
                                            • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
                                            • Opcode Fuzzy Hash: 7b3c0986a6774ad4839bdf3b3ab280162fe8917d12771473e04c5712f0602a0a
                                            • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
                                            APIs
                                              • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
                                            • _fseek.LIBCMT ref: 00452B3B
                                            • __wsplitpath.LIBCMT ref: 00452B9B
                                            • _wcscpy.LIBCMT ref: 00452BB0
                                            • _wcscat.LIBCMT ref: 00452BC5
                                            • __wsplitpath.LIBCMT ref: 00452BEF
                                            • _wcscat.LIBCMT ref: 00452C07
                                            • _wcscat.LIBCMT ref: 00452C1C
                                            • __fread_nolock.LIBCMT ref: 00452C53
                                            • __fread_nolock.LIBCMT ref: 00452C64
                                            • __fread_nolock.LIBCMT ref: 00452C83
                                            • __fread_nolock.LIBCMT ref: 00452C94
                                            • __fread_nolock.LIBCMT ref: 00452CB5
                                            • __fread_nolock.LIBCMT ref: 00452CC6
                                            • __fread_nolock.LIBCMT ref: 00452CD7
                                            • __fread_nolock.LIBCMT ref: 00452CE8
                                              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
                                              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
                                              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
                                              • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
                                              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
                                              • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
                                              • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
                                            • __fread_nolock.LIBCMT ref: 00452D78
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
                                            • String ID:
                                            • API String ID: 2054058615-0
                                            • Opcode ID: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                                            • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
                                            • Opcode Fuzzy Hash: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
                                            • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66
                                            APIs
                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Window
                                            • String ID: 0
                                            • API String ID: 2353593579-4108050209
                                            • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                            • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
                                            • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
                                            • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
                                            APIs
                                            • GetSysColor.USER32(0000000F), ref: 0044A05E
                                            • GetClientRect.USER32(?,?), ref: 0044A0D1
                                            • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
                                            • GetWindowDC.USER32(?), ref: 0044A0F6
                                            • GetPixel.GDI32(00000000,?,?), ref: 0044A108
                                            • ReleaseDC.USER32(?,?), ref: 0044A11B
                                            • GetSysColor.USER32(0000000F), ref: 0044A131
                                            • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
                                            • GetSysColor.USER32(0000000F), ref: 0044A14F
                                            • GetSysColor.USER32(00000005), ref: 0044A15B
                                            • GetWindowDC.USER32(?), ref: 0044A1BE
                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
                                            • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
                                            • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
                                            • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
                                            • ReleaseDC.USER32(?,00000000), ref: 0044A229
                                            • SetBkColor.GDI32(?,00000000), ref: 0044A24C
                                            • GetSysColor.USER32(00000008), ref: 0044A265
                                            • SetTextColor.GDI32(?,00000000), ref: 0044A270
                                            • SetBkMode.GDI32(?,00000001), ref: 0044A282
                                            • GetStockObject.GDI32(00000005), ref: 0044A28A
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
                                            • String ID:
                                            • API String ID: 1744303182-0
                                            • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                            • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
                                            • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
                                            • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
                                            APIs
                                            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
                                            • __mtterm.LIBCMT ref: 00417C34
                                              • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
                                              • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
                                              • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
                                              • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
                                            • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
                                            • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
                                            • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
                                            • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
                                            • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
                                            • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
                                            • __init_pointers.LIBCMT ref: 00417CE6
                                            • __calloc_crt.LIBCMT ref: 00417D54
                                            • GetCurrentThreadId.KERNEL32 ref: 00417D80
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
                                            • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                            • API String ID: 4163708885-3819984048
                                            • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                            • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
                                            • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
                                            • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: >>>AUTOIT SCRIPT<<<$\
                                            • API String ID: 0-1896584978
                                            • Opcode ID: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                            • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
                                            • Opcode Fuzzy Hash: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
                                            • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __wcsicoll$IconLoad
                                            • String ID: blank$info$question$stop$warning
                                            • API String ID: 2485277191-404129466
                                            • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                            • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
                                            • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
                                            • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
                                            APIs
                                            • LoadIconW.USER32(?,00000063), ref: 0045464C
                                            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
                                            • SetWindowTextW.USER32(?,?), ref: 00454678
                                            • GetDlgItem.USER32(?,000003EA), ref: 00454690
                                            • SetWindowTextW.USER32(00000000,?), ref: 00454697
                                            • GetDlgItem.USER32(?,000003E9), ref: 004546A8
                                            • SetWindowTextW.USER32(00000000,?), ref: 004546AF
                                            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
                                            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
                                            • GetWindowRect.USER32(?,?), ref: 004546F5
                                            • SetWindowTextW.USER32(?,?), ref: 00454765
                                            • GetDesktopWindow.USER32 ref: 0045476F
                                            • GetWindowRect.USER32(00000000), ref: 00454776
                                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
                                            • GetClientRect.USER32(?,?), ref: 004547D2
                                            • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
                                            • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                            • String ID:
                                            • API String ID: 3869813825-0
                                            • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                            • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
                                            • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
                                            • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
                                            APIs
                                            • _wcslen.LIBCMT ref: 00464B28
                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
                                            • _wcslen.LIBCMT ref: 00464C28
                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
                                            • _wcslen.LIBCMT ref: 00464CBA
                                            • _wcslen.LIBCMT ref: 00464CD0
                                            • _wcslen.LIBCMT ref: 00464CEF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _wcslen$Directory$CurrentSystem
                                            • String ID: D
                                            • API String ID: 1914653954-2746444292
                                            • Opcode ID: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
                                            • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
                                            • Opcode Fuzzy Hash: 44be7054643fd4ba856d6b2e359bfbfbb3de9f7e14d5395c76b411fe07bee919
                                            • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
                                            APIs
                                            • _wcsncpy.LIBCMT ref: 0045CE39
                                            • __wsplitpath.LIBCMT ref: 0045CE78
                                            • _wcscat.LIBCMT ref: 0045CE8B
                                            • _wcscat.LIBCMT ref: 0045CE9E
                                            • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
                                              • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                            • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
                                            • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
                                            • _wcscpy.LIBCMT ref: 0045CF61
                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
                                            • String ID: *.*
                                            • API String ID: 1153243558-438819550
                                            • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                            • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
                                            • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
                                            • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __wcsicoll
                                            • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
                                            • API String ID: 3832890014-4202584635
                                            • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                            • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
                                            • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
                                            • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
                                            APIs
                                            • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
                                            • GetFocus.USER32 ref: 0046A0DD
                                            • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
                                            • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessagePost$CtrlFocus
                                            • String ID: 0
                                            • API String ID: 1534620443-4108050209
                                            • Opcode ID: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
                                            • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
                                            • Opcode Fuzzy Hash: d1db05db4fd2a56646a253bb82972057caa917eb73d061b61dca20a17b51d953
                                            • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
                                            APIs
                                            • DestroyWindow.USER32(?), ref: 004558E3
                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0045592C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Window$CreateDestroy
                                            • String ID: ,$tooltips_class32
                                            • API String ID: 1109047481-3856767331
                                            • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                            • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
                                            • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
                                            • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
                                            APIs
                                            • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
                                            • GetMenuItemCount.USER32(?), ref: 00468C45
                                            • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
                                            • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
                                            • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
                                            • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
                                            • GetMenuItemCount.USER32 ref: 00468CFD
                                            • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
                                            • GetCursorPos.USER32(?), ref: 00468D3F
                                            • SetForegroundWindow.USER32(?), ref: 00468D49
                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
                                            • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
                                            • String ID: 0
                                            • API String ID: 1441871840-4108050209
                                            • Opcode ID: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                                            • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
                                            • Opcode Fuzzy Hash: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
                                            • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
                                            APIs
                                            • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                            • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                            • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                            • __swprintf.LIBCMT ref: 00460915
                                            • __swprintf.LIBCMT ref: 0046092D
                                            • _wprintf.LIBCMT ref: 004609E1
                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
                                            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                            • API String ID: 3631882475-2268648507
                                            • Opcode ID: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                            • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
                                            • Opcode Fuzzy Hash: 34748020dcaf007b6c88f6c4c4dd7bf7ecfb2d58ebabdf7d9dae9be74c8fa7b1
                                            • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
                                            APIs
                                            • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
                                            • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
                                            • SendMessageW.USER32 ref: 00471740
                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
                                            • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
                                            • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
                                            • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
                                            • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
                                            • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
                                            • SendMessageW.USER32 ref: 0047184F
                                            • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
                                            • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
                                            • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
                                            • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
                                            • String ID:
                                            • API String ID: 4116747274-0
                                            • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                            • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
                                            • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
                                            • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
                                            APIs
                                            • GetClassNameW.USER32(?,?,00000100), ref: 00461678
                                            • _wcslen.LIBCMT ref: 00461683
                                            • __swprintf.LIBCMT ref: 00461721
                                            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
                                            • GetClassNameW.USER32(?,?,00000400), ref: 00461811
                                            • GetDlgCtrlID.USER32(?), ref: 00461869
                                            • GetWindowRect.USER32(?,?), ref: 004618A4
                                            • GetParent.USER32(?), ref: 004618C3
                                            • ScreenToClient.USER32(00000000), ref: 004618CA
                                            • GetClassNameW.USER32(?,?,00000100), ref: 00461941
                                            • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
                                            • String ID: %s%u
                                            • API String ID: 1899580136-679674701
                                            • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                            • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
                                            • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
                                            • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
                                            APIs
                                            • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
                                            • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
                                            • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: InfoItemMenu$Sleep
                                            • String ID: 0
                                            • API String ID: 1196289194-4108050209
                                            • Opcode ID: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                                            • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
                                            • Opcode Fuzzy Hash: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
                                            • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
                                            APIs
                                            • GetDC.USER32(00000000), ref: 0043143E
                                            • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
                                            • CreateCompatibleDC.GDI32(00000000), ref: 00431459
                                            • SelectObject.GDI32(00000000,?), ref: 00431466
                                            • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
                                            • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
                                            • String ID: (
                                            • API String ID: 3300687185-3887548279
                                            • Opcode ID: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
                                            • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
                                            • Opcode Fuzzy Hash: 54198b849531af9165e9bec096bf8ea3e4974b91d89a9c814b262d795432971a
                                            • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
                                            APIs
                                              • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                              • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                            • GetDriveTypeW.KERNEL32 ref: 0045DB32
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
                                              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
                                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                            • API String ID: 1976180769-4113822522
                                            • Opcode ID: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                            • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
                                            • Opcode Fuzzy Hash: a85f7e6fea3b256bd08f49877ae03d0a36a67fa55ca674d77d79428d7feae10a
                                            • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _wcslen$_wcsncpy$LocalTime__fassign
                                            • String ID:
                                            • API String ID: 461458858-0
                                            • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                            • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
                                            • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
                                            • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
                                            APIs
                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
                                            • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
                                            • GlobalLock.KERNEL32(00000000), ref: 004300F6
                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
                                            • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
                                            • CloseHandle.KERNEL32(00000000), ref: 00430113
                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
                                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
                                            • GlobalFree.KERNEL32(00000000), ref: 00430150
                                            • GetObjectW.GDI32(?,00000018,?), ref: 00430177
                                            • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
                                            • DeleteObject.GDI32(?), ref: 004301D0
                                            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                            • String ID:
                                            • API String ID: 3969911579-0
                                            • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                            • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
                                            • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
                                            • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
                                            • String ID: 0
                                            • API String ID: 956284711-4108050209
                                            • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                            • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
                                            • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
                                            • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                            • String ID: 0.0.0.0
                                            • API String ID: 1965227024-3771769585
                                            • Opcode ID: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                                            • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
                                            • Opcode Fuzzy Hash: fae7ff6cb08d49b7abbddf1c7acdf758c3bbd000e7fec019eac0b45bea4aa72c
                                            • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
                                            APIs
                                              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
                                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
                                            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
                                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
                                            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: SendString$_memmove_wcslen
                                            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                            • API String ID: 369157077-1007645807
                                            • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                            • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
                                            • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
                                            • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
                                            APIs
                                            • GetParent.USER32 ref: 00445BF8
                                            • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
                                            • __wcsicoll.LIBCMT ref: 00445C33
                                            • __wcsicoll.LIBCMT ref: 00445C4F
                                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __wcsicoll$ClassMessageNameParentSend
                                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                            • API String ID: 3125838495-3381328864
                                            • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                            • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
                                            • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
                                            • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
                                            APIs
                                            • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
                                            • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
                                            • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
                                            • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
                                            • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
                                            • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
                                            • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
                                            • SendMessageW.USER32(?,00000402,?), ref: 00449399
                                            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSend$CharNext
                                            • String ID:
                                            • API String ID: 1350042424-0
                                            • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                            • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
                                            • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
                                            • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
                                            APIs
                                              • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
                                              • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
                                            • GetDriveTypeW.KERNEL32(?), ref: 004787B9
                                            • _wcscpy.LIBCMT ref: 004787E5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: BuffCharDriveLowerType_wcscpy_wcslen
                                            • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
                                            • API String ID: 3052893215-2127371420
                                            • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                            • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
                                            • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
                                            • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
                                            APIs
                                            • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
                                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                            • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
                                            • __swprintf.LIBCMT ref: 0045E7F7
                                            • _wprintf.LIBCMT ref: 0045E8B3
                                            • _wprintf.LIBCMT ref: 0045E8D7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                            • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                            • API String ID: 2295938435-2354261254
                                            • Opcode ID: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                            • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
                                            • Opcode Fuzzy Hash: bb058454d561a71d3962b6834df81d7638d9abf9c215052f6de6d44e2e152ebf
                                            • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __swprintf_wcscpy$__i64tow__itow
                                            • String ID: %.15g$0x%p$False$True
                                            • API String ID: 3038501623-2263619337
                                            • Opcode ID: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
                                            • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
                                            • Opcode Fuzzy Hash: dbd07ee36d68efbdb82b47f6bbdb5a558a403895529f1bd62c5843a789ef215e
                                            • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
                                            APIs
                                            • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
                                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                            • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
                                            • __swprintf.LIBCMT ref: 0045E5F6
                                            • _wprintf.LIBCMT ref: 0045E6A3
                                            • _wprintf.LIBCMT ref: 0045E6C7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
                                            • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                            • API String ID: 2295938435-8599901
                                            • Opcode ID: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                            • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
                                            • Opcode Fuzzy Hash: c66a723599ffab058b3f3cea1f0729b04811ebb293e3d225dd53f192e4035716
                                            • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
                                            APIs
                                            • timeGetTime.WINMM ref: 00443B67
                                              • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
                                            • Sleep.KERNEL32(0000000A), ref: 00443B9F
                                            • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00443BC8
                                            • SetActiveWindow.USER32(00000000), ref: 00443BEC
                                            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
                                            • SendMessageW.USER32(00000000,00000010,00000000,00000000), ref: 00443C22
                                            • Sleep.KERNEL32(000000FA), ref: 00443C2D
                                            • IsWindow.USER32(00000000), ref: 00443C3A
                                            • EndDialog.USER32(00000000,00000000), ref: 00443C4C
                                              • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                              • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                              • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                            • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
                                            • String ID: BUTTON
                                            • API String ID: 1834419854-3405671355
                                            • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                            • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
                                            • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
                                            • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
                                            APIs
                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
                                            • LoadStringW.USER32(00000000), ref: 00454040
                                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                            • _wprintf.LIBCMT ref: 00454074
                                            • __swprintf.LIBCMT ref: 004540A3
                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
                                            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                            • API String ID: 455036304-4153970271
                                            • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                            • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
                                            • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
                                            • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
                                            APIs
                                            • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
                                            • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
                                            • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
                                            • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
                                            • _memmove.LIBCMT ref: 00467EB8
                                            • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
                                            • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
                                            • _memmove.LIBCMT ref: 00467F6C
                                            • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
                                            • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
                                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                            • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
                                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                            • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
                                            • String ID:
                                            • API String ID: 2170234536-0
                                            • Opcode ID: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                                            • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
                                            • Opcode Fuzzy Hash: aa00afaeb95d016149156b33273ce501c4b0800cd775f7336c4c4d99d01e60ec
                                            • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
                                            APIs
                                            • GetKeyboardState.USER32(?), ref: 00453CE0
                                            • SetKeyboardState.USER32(?), ref: 00453D3B
                                            • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
                                            • GetKeyState.USER32(000000A0), ref: 00453D75
                                            • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
                                            • GetKeyState.USER32(000000A1), ref: 00453DB5
                                            • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
                                            • GetKeyState.USER32(00000011), ref: 00453DEF
                                            • GetAsyncKeyState.USER32(00000012), ref: 00453E18
                                            • GetKeyState.USER32(00000012), ref: 00453E26
                                            • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
                                            • GetKeyState.USER32(0000005B), ref: 00453E5D
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: State$Async$Keyboard
                                            • String ID:
                                            • API String ID: 541375521-0
                                            • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                            • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
                                            • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
                                            • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
                                            APIs
                                            • GetDlgItem.USER32(?,00000001), ref: 004357DB
                                            • GetWindowRect.USER32(00000000,?), ref: 004357ED
                                            • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
                                            • GetDlgItem.USER32(?,00000002), ref: 0043586A
                                            • GetWindowRect.USER32(00000000,?), ref: 0043587C
                                            • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
                                            • GetDlgItem.USER32(?,000003E9), ref: 004358DC
                                            • GetWindowRect.USER32(00000000,?), ref: 004358EE
                                            • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
                                            • GetDlgItem.USER32(?,000003EA), ref: 00435941
                                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Window$ItemMoveRect$Invalidate
                                            • String ID:
                                            • API String ID: 3096461208-0
                                            • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                            • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
                                            • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
                                            • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
                                            APIs
                                            • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
                                            • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
                                            • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
                                            • DeleteObject.GDI32(?), ref: 0047151E
                                            • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
                                            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
                                            • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
                                            • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
                                            • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
                                            • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
                                            • DeleteObject.GDI32(?), ref: 004715EA
                                            • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
                                            • String ID:
                                            • API String ID: 3218148540-0
                                            • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                            • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
                                            • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
                                            • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                            • String ID:
                                            • API String ID: 136442275-0
                                            • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                            • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
                                            • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
                                            • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
                                            APIs
                                            • _wcsncpy.LIBCMT ref: 00467490
                                            • _wcsncpy.LIBCMT ref: 004674BC
                                              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                            • _wcstok.LIBCMT ref: 004674FF
                                              • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                            • _wcstok.LIBCMT ref: 004675B2
                                            • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                            • _wcslen.LIBCMT ref: 00467793
                                            • _wcscpy.LIBCMT ref: 00467641
                                              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                            • _wcslen.LIBCMT ref: 004677BD
                                            • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                              • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
                                            • String ID: X
                                            • API String ID: 3104067586-3081909835
                                            • Opcode ID: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                                            • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
                                            • Opcode Fuzzy Hash: bae8ec41c075a4f6a2b7e9f416d910fa80a531229cf5203f8bd385032f306646
                                            • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
                                            APIs
                                            • OleInitialize.OLE32(00000000), ref: 0046CBC7
                                            • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
                                            • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
                                            • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
                                            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
                                            • _wcslen.LIBCMT ref: 0046CDB0
                                            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
                                            • CoTaskMemFree.OLE32(?), ref: 0046CE42
                                            • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
                                              • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
                                              • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
                                              • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
                                            Strings
                                            • NULL Pointer assignment, xrefs: 0046CEA6
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
                                            • String ID: NULL Pointer assignment
                                            • API String ID: 440038798-2785691316
                                            • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                            • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
                                            • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
                                            • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
                                            APIs
                                            • GetClassNameW.USER32(?,?,00000400), ref: 00461056
                                            • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
                                            • _wcslen.LIBCMT ref: 004610A3
                                            • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
                                            • GetClassNameW.USER32(?,?,00000400), ref: 00461124
                                            • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
                                            • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
                                            • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
                                            • GetWindowRect.USER32(?,?), ref: 00461248
                                              • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
                                            • String ID: ThumbnailClass
                                            • API String ID: 4136854206-1241985126
                                            • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                            • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
                                            • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
                                            • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
                                            APIs
                                            • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
                                            • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
                                            • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
                                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
                                            • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
                                            • GetClientRect.USER32(?,?), ref: 00471A1A
                                            • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
                                            • DestroyIcon.USER32(?), ref: 00471AF4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
                                            • String ID: 2
                                            • API String ID: 1331449709-450215437
                                            • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                            • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
                                            • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
                                            • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
                                            APIs
                                            • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
                                            • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
                                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
                                            • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
                                            • __swprintf.LIBCMT ref: 00460915
                                            • __swprintf.LIBCMT ref: 0046092D
                                            • _wprintf.LIBCMT ref: 004609E1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
                                            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
                                            • API String ID: 3054410614-2561132961
                                            • Opcode ID: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                            • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
                                            • Opcode Fuzzy Hash: 70def87c4b28ee4ab6614adc46955888b63d74e37d3694ee9c83f9e80406ad7b
                                            • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
                                            APIs
                                              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
                                            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
                                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
                                            • CLSIDFromString.OLE32(?,?), ref: 004587B3
                                            • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
                                            • RegCloseKey.ADVAPI32(?), ref: 004587C5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
                                            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                            • API String ID: 600699880-22481851
                                            • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                            • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
                                            • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
                                            • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: DestroyWindow
                                            • String ID: static
                                            • API String ID: 3375834691-2160076837
                                            • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                            • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
                                            • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
                                            • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0045D959
                                            • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
                                            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ErrorMode$DriveType
                                            • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
                                            • API String ID: 2907320926-3566645568
                                            • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                            • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
                                            • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
                                            • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
                                            APIs
                                              • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                            • DestroyAcceleratorTable.USER32(?), ref: 0047094A
                                            • ImageList_Destroy.COMCTL32(?), ref: 004709AD
                                            • ImageList_Destroy.COMCTL32(?), ref: 004709C5
                                            • ImageList_Destroy.COMCTL32(?), ref: 004709D5
                                            • DeleteObject.GDI32(005C0000), ref: 00470A04
                                            • DestroyIcon.USER32(00690074), ref: 00470A1C
                                            • DeleteObject.GDI32(77BC335A), ref: 00470A34
                                            • DestroyWindow.USER32(0050004D), ref: 00470A4C
                                            • DestroyIcon.USER32(?), ref: 00470A73
                                            • DestroyIcon.USER32(?), ref: 00470A81
                                            • KillTimer.USER32(00000000,00000000), ref: 00470B00
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
                                            • String ID:
                                            • API String ID: 1237572874-0
                                            • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                            • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
                                            • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
                                            • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
                                            APIs
                                            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
                                            • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
                                            • VariantInit.OLEAUT32(?), ref: 004793E1
                                            • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
                                            • VariantCopy.OLEAUT32(?,?), ref: 00479461
                                            • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
                                            • VariantClear.OLEAUT32(?), ref: 00479489
                                            • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
                                            • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
                                            • VariantClear.OLEAUT32(?), ref: 004794CA
                                            • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                            • String ID:
                                            • API String ID: 2706829360-0
                                            • Opcode ID: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                            • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
                                            • Opcode Fuzzy Hash: 604ca7338ef7579289b82c182b4992e50dced26e61eee24e9e1f7f7e4088d468
                                            • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
                                            APIs
                                            • GetKeyboardState.USER32(?), ref: 0044480E
                                            • GetAsyncKeyState.USER32(000000A0), ref: 00444899
                                            • GetKeyState.USER32(000000A0), ref: 004448AA
                                            • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
                                            • GetKeyState.USER32(000000A1), ref: 004448D9
                                            • GetAsyncKeyState.USER32(00000011), ref: 004448F5
                                            • GetKeyState.USER32(00000011), ref: 00444903
                                            • GetAsyncKeyState.USER32(00000012), ref: 0044491F
                                            • GetKeyState.USER32(00000012), ref: 0044492D
                                            • GetAsyncKeyState.USER32(0000005B), ref: 00444949
                                            • GetKeyState.USER32(0000005B), ref: 00444958
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: State$Async$Keyboard
                                            • String ID:
                                            • API String ID: 541375521-0
                                            • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                            • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
                                            • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
                                            • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: InitVariant$_malloc_wcscpy_wcslen
                                            • String ID:
                                            • API String ID: 3413494760-0
                                            • Opcode ID: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                                            • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
                                            • Opcode Fuzzy Hash: b3fce9f732112990bbb163bb6abadbd830b92813f31b22ad1e38064008f16c53
                                            • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: AddressProc_free_malloc$_strcat_strlen
                                            • String ID: AU3_FreeVar
                                            • API String ID: 2634073740-771828931
                                            • Opcode ID: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
                                            • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
                                            • Opcode Fuzzy Hash: b7b62cf44ead268743cea15c23fa0702c80810b5d7796ec40f0430e9877b9643
                                            • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
                                            APIs
                                            • CoInitialize.OLE32 ref: 0046C63A
                                            • CoUninitialize.OLE32 ref: 0046C645
                                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                              • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
                                              • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
                                            • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
                                            • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
                                            • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
                                            • IIDFromString.OLE32(?,?), ref: 0046C705
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
                                            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                            • API String ID: 2294789929-1287834457
                                            • Opcode ID: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                                            • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
                                            • Opcode Fuzzy Hash: 4dfaed0549f409efa28524cf643488acd2e6b782f2d71f2a42dfc1cbbaa944b5
                                            • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
                                            APIs
                                              • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
                                              • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
                                              • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
                                              • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
                                            • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
                                            • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
                                            • ImageList_EndDrag.COMCTL32 ref: 00471169
                                            • ReleaseCapture.USER32 ref: 0047116F
                                            • SetWindowTextW.USER32(?,00000000), ref: 00471206
                                            • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
                                            • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                            • API String ID: 2483343779-2107944366
                                            • Opcode ID: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                                            • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
                                            • Opcode Fuzzy Hash: 0c0f1ff16893fa866466cf5bd33a163e2c592d09522a7afef5934b76f638d362
                                            • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
                                            APIs
                                            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
                                            • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
                                            • _wcslen.LIBCMT ref: 00450720
                                            • _wcscat.LIBCMT ref: 00450733
                                            • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
                                            • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window_wcscat_wcslen
                                            • String ID: -----$SysListView32
                                            • API String ID: 4008455318-3975388722
                                            • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                            • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
                                            • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
                                            • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
                                            APIs
                                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                            • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
                                            • GetDlgCtrlID.USER32(00000000), ref: 00469C84
                                            • GetParent.USER32 ref: 00469C98
                                            • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
                                            • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
                                            • GetParent.USER32 ref: 00469CBC
                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSend$CtrlParent$_memmove_wcslen
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 2360848162-1403004172
                                            • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                            • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
                                            • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
                                            • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
                                            • String ID:
                                            • API String ID: 262282135-0
                                            • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                            • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
                                            • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
                                            • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
                                            APIs
                                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
                                            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
                                            • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
                                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
                                            • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
                                            • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
                                            • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
                                            • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
                                            • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSend$LongWindow
                                            • String ID:
                                            • API String ID: 312131281-0
                                            • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                            • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
                                            • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
                                            • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
                                            APIs
                                              • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
                                            • SendMessageW.USER32(753E23D0,00001001,00000000,?), ref: 00448E16
                                            • SendMessageW.USER32(753E23D0,00001026,00000000,?), ref: 00448E25
                                              • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSend$BrushCreateDeleteObjectSolid
                                            • String ID:
                                            • API String ID: 3771399671-0
                                            • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                            • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
                                            • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
                                            • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
                                            APIs
                                            • GetCurrentThreadId.KERNEL32 ref: 00434643
                                            • GetForegroundWindow.USER32(00000000), ref: 00434655
                                            • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
                                            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
                                            • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
                                            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
                                            • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
                                            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
                                            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
                                            • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                            • String ID:
                                            • API String ID: 2156557900-0
                                            • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                            • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
                                            • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
                                            • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                            • API String ID: 0-1603158881
                                            • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                            • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
                                            • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
                                            • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
                                            APIs
                                            • CreateMenu.USER32 ref: 00448603
                                            • SetMenu.USER32(?,00000000), ref: 00448613
                                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
                                            • IsMenu.USER32(?), ref: 004486AB
                                            • CreatePopupMenu.USER32 ref: 004486B5
                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
                                            • DrawMenuBar.USER32 ref: 004486F5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                            • String ID: 0
                                            • API String ID: 161812096-4108050209
                                            • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                            • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
                                            • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
                                            • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
                                            APIs
                                            • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe), ref: 00434057
                                            • LoadStringW.USER32(00000000), ref: 00434060
                                            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
                                            • LoadStringW.USER32(00000000), ref: 00434078
                                            • _wprintf.LIBCMT ref: 004340A1
                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
                                            Strings
                                            • C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe, xrefs: 00434040
                                            • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: HandleLoadModuleString$Message_wprintf
                                            • String ID: %s (%d) : ==> %s: %s %s$C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe
                                            • API String ID: 3648134473-3308624084
                                            • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                            • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
                                            • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
                                            • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
                                            • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
                                            • Opcode Fuzzy Hash: dfbce8e1a613c74e072c21ad89e7d3e14579d4917e2b3053f757fec35ca8a5d3
                                            • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                            • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
                                            • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
                                            • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
                                            APIs
                                              • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe,0040F545,C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe,004A90E8,C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe,?,0040F545), ref: 0041013C
                                              • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                            • lstrcmpiW.KERNEL32(?,?), ref: 00453900
                                            • MoveFileW.KERNEL32(?,?), ref: 00453932
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: File$AttributesFullMoveNamePathlstrcmpi
                                            • String ID:
                                            • API String ID: 978794511-0
                                            • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                            • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
                                            • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
                                            • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                            • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
                                            • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
                                            • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ClearVariant
                                            • String ID:
                                            • API String ID: 1473721057-0
                                            • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                            • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
                                            • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
                                            • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _memmove$_memcmp
                                            • String ID: '$\$h
                                            • API String ID: 2205784470-1303700344
                                            • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                            • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
                                            • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
                                            • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
                                            APIs
                                            • VariantInit.OLEAUT32(00000000), ref: 0045EA56
                                            • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
                                            • VariantClear.OLEAUT32 ref: 0045EA6D
                                            • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
                                            • __swprintf.LIBCMT ref: 0045EC33
                                            • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
                                            Strings
                                            • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Variant$InitTime$ClearCopySystem__swprintf
                                            • String ID: %4d%02d%02d%02d%02d%02d
                                            • API String ID: 2441338619-1568723262
                                            • Opcode ID: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
                                            • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
                                            • Opcode Fuzzy Hash: 35eb9c3aeff660f135fd63a8918d5c45c4a90ea0b18b9c33d96ad8571bc730e4
                                            • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
                                            APIs
                                            • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
                                            • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
                                            • Sleep.KERNEL32(0000000A), ref: 0042C67F
                                            • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
                                            • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Interlocked$DecrementIncrement$Sleep
                                            • String ID: @COM_EVENTOBJ
                                            • API String ID: 327565842-2228938565
                                            • Opcode ID: 9e658ec2980077184a1632dd5c21727ba620fa2cdb3865c7e3de5124d93aa359
                                            • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
                                            • Opcode Fuzzy Hash: 9e658ec2980077184a1632dd5c21727ba620fa2cdb3865c7e3de5124d93aa359
                                            • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
                                            APIs
                                            • VariantClear.OLEAUT32(?), ref: 0047031B
                                            • VariantClear.OLEAUT32(?), ref: 0047044F
                                            • VariantInit.OLEAUT32(?), ref: 004704A3
                                            • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
                                            • VariantClear.OLEAUT32(?), ref: 00470516
                                              • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
                                            • VariantCopy.OLEAUT32(?,?), ref: 0047057A
                                              • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
                                            • VariantClear.OLEAUT32(00000000), ref: 0047060D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Variant$Clear$Copy$CallDispFuncInit
                                            • String ID: H
                                            • API String ID: 3613100350-2852464175
                                            • Opcode ID: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
                                            • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
                                            • Opcode Fuzzy Hash: f2b9533c7a0a825d738ebca76906f6301bd96a0988b7340563647801aa66eb79
                                            • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
                                            APIs
                                            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
                                            • DestroyWindow.USER32(?), ref: 00426F50
                                            • UnregisterHotKey.USER32(?), ref: 00426F77
                                            • FreeLibrary.KERNEL32(?), ref: 0042701F
                                            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
                                            • String ID: close all
                                            • API String ID: 4174999648-3243417748
                                            • Opcode ID: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                                            • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
                                            • Opcode Fuzzy Hash: 4fd900de9a28da208b58a3ba22ecdd4c26f042792ef41b4fe823b5ed5eb78ac9
                                            • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
                                            APIs
                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
                                            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
                                            • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
                                            • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
                                            • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
                                              • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
                                            • String ID:
                                            • API String ID: 1291720006-3916222277
                                            • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                            • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
                                            • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
                                            • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
                                            APIs
                                            • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
                                            • IsMenu.USER32(?), ref: 0045FC5F
                                            • CreatePopupMenu.USER32 ref: 0045FC97
                                            • GetMenuItemCount.USER32(?), ref: 0045FCFD
                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Menu$Item$CountCreateInfoInsertPopup
                                            • String ID: 0$2
                                            • API String ID: 93392585-3793063076
                                            • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                            • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
                                            • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
                                            • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
                                            APIs
                                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
                                            • VariantClear.OLEAUT32(?), ref: 00435320
                                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
                                            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
                                            • VariantClear.OLEAUT32(?), ref: 004353B3
                                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
                                            • String ID: crts
                                            • API String ID: 586820018-3724388283
                                            • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                            • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
                                            • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
                                            • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
                                            APIs
                                              • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe,0040F545,C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe,004A90E8,C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe,?,0040F545), ref: 0041013C
                                            • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
                                            • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
                                            • _wcscat.LIBCMT ref: 0044BCAF
                                            • _wcslen.LIBCMT ref: 0044BCBB
                                            • _wcslen.LIBCMT ref: 0044BCD1
                                            • SHFileOperationW.SHELL32(?), ref: 0044BD17
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
                                            • String ID: \*.*
                                            • API String ID: 2326526234-1173974218
                                            • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                            • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
                                            • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
                                            • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
                                            APIs
                                              • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
                                            • _wcslen.LIBCMT ref: 004335F2
                                            • GetFileAttributesW.KERNEL32(?), ref: 0043361C
                                            • GetLastError.KERNEL32 ref: 0043362B
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
                                            • _wcsrchr.LIBCMT ref: 00433666
                                              • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
                                            • String ID: \
                                            • API String ID: 321622961-2967466578
                                            • Opcode ID: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                                            • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
                                            • Opcode Fuzzy Hash: bb0dad1fe383a450cc5ca78da39c882eba2540a6c71c70dd25c8590f96c38e52
                                            • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __wcsnicmp
                                            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                            • API String ID: 1038674560-2734436370
                                            • Opcode ID: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                                            • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
                                            • Opcode Fuzzy Hash: 8f8f9edfa5db0492502b932a8328ea4ae50c7534afe07431ae24ccbcd5f30aff
                                            • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
                                            APIs
                                            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
                                            • __lock.LIBCMT ref: 00417981
                                              • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
                                              • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
                                              • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
                                            • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
                                            • __lock.LIBCMT ref: 004179A2
                                            • ___addlocaleref.LIBCMT ref: 004179C0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
                                            • String ID: KERNEL32.DLL$pI
                                            • API String ID: 637971194-197072765
                                            • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                            • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
                                            • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
                                            • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _memmove$_malloc
                                            • String ID:
                                            • API String ID: 1938898002-0
                                            • Opcode ID: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
                                            • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
                                            • Opcode Fuzzy Hash: ed671e0929b530e8a80a3994f14b14e6c4fa5d49d1ff8bec0f484948025a4d18
                                            • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
                                            APIs
                                            • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
                                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                            • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
                                            • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
                                            • _memmove.LIBCMT ref: 0044B555
                                            • _memmove.LIBCMT ref: 0044B578
                                            • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
                                            • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
                                            • String ID:
                                            • API String ID: 2737351978-0
                                            • Opcode ID: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
                                            • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
                                            • Opcode Fuzzy Hash: c49c3180d4577c37a1564da55573a5370bada98f09f15d951758cfc7caeaac8d
                                            • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
                                            APIs
                                            • ___set_flsgetvalue.LIBCMT ref: 0041523A
                                            • __calloc_crt.LIBCMT ref: 00415246
                                            • __getptd.LIBCMT ref: 00415253
                                            • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
                                            • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
                                            • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
                                            • _free.LIBCMT ref: 0041529E
                                            • __dosmaperr.LIBCMT ref: 004152A9
                                              • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                            • String ID:
                                            • API String ID: 3638380555-0
                                            • Opcode ID: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                                            • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
                                            • Opcode Fuzzy Hash: 75aec11f1c25db1a83b42845bb08a83361ad021f560e0ff3c611ac6fdc7cb8ab
                                            • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 0046C96E
                                              • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                              • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Variant$Copy$ClearErrorInitLast
                                            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                            • API String ID: 3207048006-625585964
                                            • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                            • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
                                            • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
                                            • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
                                            APIs
                                            • WSAStartup.WSOCK32(00000101,?), ref: 00465559
                                              • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                            • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
                                            • gethostbyname.WSOCK32(?), ref: 004655A6
                                            • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
                                            • _memmove.LIBCMT ref: 004656CA
                                            • GlobalFree.KERNEL32(00000000), ref: 0046575C
                                            • WSACleanup.WSOCK32 ref: 00465762
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
                                            • String ID:
                                            • API String ID: 2945290962-0
                                            • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                            • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
                                            • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
                                            • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
                                            APIs
                                            • GetSystemMetrics.USER32(0000000F), ref: 00440527
                                            • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
                                            • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
                                            • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
                                            • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
                                            • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
                                            • String ID:
                                            • API String ID: 1457242333-0
                                            • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                            • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
                                            • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
                                            • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
                                            APIs
                                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ConnectRegistry_memmove_wcslen
                                            • String ID:
                                            • API String ID: 15295421-0
                                            • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                            • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
                                            • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
                                            • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
                                            APIs
                                              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                            • _wcstok.LIBCMT ref: 004675B2
                                              • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
                                            • _wcscpy.LIBCMT ref: 00467641
                                            • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
                                            • _wcslen.LIBCMT ref: 00467793
                                            • _wcslen.LIBCMT ref: 004677BD
                                              • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
                                            • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
                                            • String ID: X
                                            • API String ID: 780548581-3081909835
                                            • Opcode ID: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                                            • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
                                            • Opcode Fuzzy Hash: 5a7296b1c5eaaf12ad4c2d2a839e078d9dce1648221bbe8eaefb4bf91c000afd
                                            • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
                                            APIs
                                              • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                              • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                              • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                            • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
                                            • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
                                            • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
                                            • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
                                            • CloseFigure.GDI32(?), ref: 0044751F
                                            • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
                                            • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
                                            • String ID:
                                            • API String ID: 4082120231-0
                                            • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                            • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
                                            • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
                                            • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
                                            APIs
                                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
                                            • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
                                            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
                                            • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
                                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
                                            • RegCloseKey.ADVAPI32(?), ref: 0046B49D
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
                                            • String ID:
                                            • API String ID: 2027346449-0
                                            • Opcode ID: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                                            • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
                                            • Opcode Fuzzy Hash: 2b9cac7d06e9b3c82fe541c1c7e321d1f48fab5647307c3a769b9fb80d6ae4cb
                                            • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
                                            APIs
                                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                              • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                            • GetMenu.USER32 ref: 0047A703
                                            • GetMenuItemCount.USER32(00000000), ref: 0047A74F
                                            • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
                                            • _wcslen.LIBCMT ref: 0047A79E
                                            • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
                                            • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
                                            • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
                                            • String ID:
                                            • API String ID: 3257027151-0
                                            • Opcode ID: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                                            • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
                                            • Opcode Fuzzy Hash: c981ea3ceee1feb4f68cdf1bad830475cd4f783826951488cb1c5ff232b53bc9
                                            • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
                                            APIs
                                            • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
                                            • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ErrorLastselect
                                            • String ID:
                                            • API String ID: 215497628-0
                                            • Opcode ID: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
                                            • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
                                            • Opcode Fuzzy Hash: a2339aeea388287f00fab5c9ba0e4a7d07c2007cb3e616b5232981a1bd598a56
                                            • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
                                            APIs
                                            • GetParent.USER32(?), ref: 0044443B
                                            • GetKeyboardState.USER32(?), ref: 00444450
                                            • SetKeyboardState.USER32(?), ref: 004444A4
                                            • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
                                            • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
                                            • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
                                            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessagePost$KeyboardState$Parent
                                            • String ID:
                                            • API String ID: 87235514-0
                                            • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                            • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
                                            • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
                                            • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
                                            APIs
                                            • GetParent.USER32(?), ref: 00444633
                                            • GetKeyboardState.USER32(?), ref: 00444648
                                            • SetKeyboardState.USER32(?), ref: 0044469C
                                            • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
                                            • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
                                            • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
                                            • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessagePost$KeyboardState$Parent
                                            • String ID:
                                            • API String ID: 87235514-0
                                            • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                            • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
                                            • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
                                            • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
                                            APIs
                                            • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
                                            • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
                                            • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
                                            • DeleteObject.GDI32(?), ref: 00455736
                                            • DeleteObject.GDI32(?), ref: 00455744
                                            • DestroyIcon.USER32(?), ref: 00455752
                                            • DestroyWindow.USER32(?), ref: 00455760
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
                                            • String ID:
                                            • API String ID: 2354583917-0
                                            • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                            • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
                                            • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
                                            • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                            • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
                                            • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
                                            • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
                                            APIs
                                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
                                            • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
                                            • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                            • EnableWindow.USER32(?,00000001), ref: 00448B72
                                            • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                            • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                            • EnableWindow.USER32(?,00000001), ref: 00448C09
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Window$Enable$Show$MessageMoveSend
                                            • String ID:
                                            • API String ID: 896007046-0
                                            • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                            • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
                                            • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
                                            • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
                                            APIs
                                            • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
                                            • GetFocus.USER32 ref: 00448ACF
                                            • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                            • EnableWindow.USER32(?,00000001), ref: 00448B72
                                            • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                            • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                            • EnableWindow.USER32(?,00000001), ref: 00448C09
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Window$Enable$Show$FocusMessageSend
                                            • String ID:
                                            • API String ID: 3429747543-0
                                            • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                            • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
                                            • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
                                            • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
                                            APIs
                                              • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
                                              • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
                                              • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                            • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
                                            • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
                                            • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
                                            • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
                                            • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
                                            • String ID:
                                            • API String ID: 3300667738-0
                                            • Opcode ID: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                                            • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
                                            • Opcode Fuzzy Hash: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
                                            • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0045D459
                                            • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
                                            • __swprintf.LIBCMT ref: 0045D4E9
                                            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ErrorMode$InformationVolume__swprintf
                                            • String ID: %lu$\VH
                                            • API String ID: 3164766367-2432546070
                                            • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                            • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
                                            • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
                                            • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
                                            APIs
                                            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
                                            • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
                                            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
                                            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
                                            • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID: Msctls_Progress32
                                            • API String ID: 3850602802-3636473452
                                            • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                            • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
                                            • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
                                            • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
                                            • String ID:
                                            • API String ID: 3985565216-0
                                            • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                            • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
                                            • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
                                            • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
                                            APIs
                                            • _malloc.LIBCMT ref: 0041F707
                                              • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
                                              • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
                                              • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
                                            • _free.LIBCMT ref: 0041F71A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: AllocateHeap_free_malloc
                                            • String ID: [B
                                            • API String ID: 1020059152-632041663
                                            • Opcode ID: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                                            • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
                                            • Opcode Fuzzy Hash: a147dbbc68d3dd3311601ddf04658a1c9df9f8119054b67091eb48bbc5a1b0d2
                                            • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
                                            APIs
                                            • ___set_flsgetvalue.LIBCMT ref: 00413DA4
                                            • __calloc_crt.LIBCMT ref: 00413DB0
                                            • __getptd.LIBCMT ref: 00413DBD
                                            • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
                                            • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
                                            • _free.LIBCMT ref: 00413E07
                                            • __dosmaperr.LIBCMT ref: 00413E12
                                              • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
                                            • String ID:
                                            • API String ID: 155776804-0
                                            • Opcode ID: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                                            • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
                                            • Opcode Fuzzy Hash: 9a8a6ace70da3d00e2637234252d24079791dfe2cea1a90c5afbc93b71b6aba3
                                            • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
                                            APIs
                                              • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
                                              • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
                                            • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
                                            • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
                                            • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
                                            • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
                                            • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
                                            • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                            • String ID:
                                            • API String ID: 1957940570-0
                                            • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                            • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
                                            • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
                                            • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
                                            APIs
                                            • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                              • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                              • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                            • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                              • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                            • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                            • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                            • ExitThread.KERNEL32 ref: 00413D4E
                                            • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                            • __freefls@4.LIBCMT ref: 00413D74
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                            • String ID:
                                            • API String ID: 259663610-0
                                            • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                            • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
                                            • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
                                            • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
                                            APIs
                                            • GetClientRect.USER32(?,?), ref: 004302E6
                                            • GetWindowRect.USER32(00000000,?), ref: 00430316
                                            • GetClientRect.USER32(?,?), ref: 00430364
                                            • GetSystemMetrics.USER32(0000000F), ref: 004303B1
                                            • GetWindowRect.USER32(?,?), ref: 004303C3
                                            • ScreenToClient.USER32(?,?), ref: 004303EC
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Rect$Client$Window$MetricsScreenSystem
                                            • String ID:
                                            • API String ID: 3220332590-0
                                            • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                            • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
                                            • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
                                            • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _malloc_wcslen$_strcat_wcscpy
                                            • String ID:
                                            • API String ID: 1612042205-0
                                            • Opcode ID: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                                            • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
                                            • Opcode Fuzzy Hash: 1b9af233a2167b707cd0fb77bd31ffbeeda7ae7db272e33850c6ed6ee2362a10
                                            • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _memmove_strncmp
                                            • String ID: >$U$\
                                            • API String ID: 2666721431-237099441
                                            • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                            • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
                                            • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
                                            • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
                                            APIs
                                            • GetKeyboardState.USER32(?), ref: 0044C570
                                            • SetKeyboardState.USER32(00000080), ref: 0044C594
                                            • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
                                            • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
                                            • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
                                            • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessagePost$KeyboardState$InputSend
                                            • String ID:
                                            • API String ID: 2221674350-0
                                            • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                            • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
                                            • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
                                            • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _wcscpy$_wcscat
                                            • String ID:
                                            • API String ID: 2037614760-0
                                            • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                            • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
                                            • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
                                            • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
                                            APIs
                                            • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                            • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                            • VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                            • VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                            • VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                            • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Variant$Copy$AllocClearErrorLastString
                                            • String ID:
                                            • API String ID: 960795272-0
                                            • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                            • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
                                            • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
                                            • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
                                            APIs
                                            • BeginPaint.USER32(00000000,?), ref: 00447BDF
                                            • GetWindowRect.USER32(?,?), ref: 00447C5D
                                            • ScreenToClient.USER32(?,?), ref: 00447C7B
                                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                            • EndPaint.USER32(?,?), ref: 00447D13
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
                                            • String ID:
                                            • API String ID: 4189319755-0
                                            • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                            • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
                                            • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
                                            • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
                                            APIs
                                            • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
                                            • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
                                            • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
                                            • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
                                            • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSend$LongWindow$InvalidateRect
                                            • String ID:
                                            • API String ID: 1976402638-0
                                            • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                            • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
                                            • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
                                            • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
                                            APIs
                                            • ShowWindow.USER32(?,00000000), ref: 00440A8A
                                            • EnableWindow.USER32(?,00000000), ref: 00440AAF
                                            • ShowWindow.USER32(?,00000000), ref: 00440B18
                                            • ShowWindow.USER32(?,00000004), ref: 00440B2B
                                            • EnableWindow.USER32(?,00000001), ref: 00440B50
                                            • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Window$Show$Enable$MessageSend
                                            • String ID:
                                            • API String ID: 642888154-0
                                            • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                            • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
                                            • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
                                            • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Variant$Copy$ClearErrorLast
                                            • String ID: NULL Pointer assignment$Not an Object type
                                            • API String ID: 2487901850-572801152
                                            • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                            • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
                                            • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
                                            • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
                                            APIs
                                            • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
                                            • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                            • EnableWindow.USER32(?,00000001), ref: 00448B72
                                            • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                            • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                            • EnableWindow.USER32(?,00000001), ref: 00448C09
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Window$Enable$Show$MessageSend
                                            • String ID:
                                            • API String ID: 1871949834-0
                                            • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                            • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
                                            • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
                                            • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                            • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
                                            • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
                                            • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
                                            APIs
                                            • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
                                            • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
                                            • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
                                            • SendMessageW.USER32 ref: 00471AE3
                                            • DestroyIcon.USER32(?), ref: 00471AF4
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
                                            • String ID:
                                            • API String ID: 3611059338-0
                                            • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                            • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
                                            • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
                                            • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: DestroyWindow$DeleteObject$IconMove
                                            • String ID:
                                            • API String ID: 1640429340-0
                                            • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                            • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
                                            • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
                                            • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
                                            APIs
                                              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                            • _wcslen.LIBCMT ref: 004438CD
                                            • _wcslen.LIBCMT ref: 004438E6
                                            • _wcstok.LIBCMT ref: 004438F8
                                            • _wcslen.LIBCMT ref: 0044390C
                                            • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
                                            • _wcstok.LIBCMT ref: 00443931
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
                                            • String ID:
                                            • API String ID: 3632110297-0
                                            • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                            • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
                                            • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
                                            • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Destroy$DeleteMenuObject$IconWindow
                                            • String ID:
                                            • API String ID: 752480666-0
                                            • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                            • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
                                            • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
                                            • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                            • String ID:
                                            • API String ID: 3275902921-0
                                            • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                            • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
                                            • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
                                            • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Destroy$DeleteObjectWindow$IconImageList_
                                            • String ID:
                                            • API String ID: 3275902921-0
                                            • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                            • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
                                            • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
                                            • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
                                            APIs
                                            • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                            • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
                                            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: PerformanceQuery$CounterSleep$Frequency
                                            • String ID:
                                            • API String ID: 2833360925-0
                                            • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                            • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
                                            • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
                                            • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
                                            APIs
                                            • SendMessageW.USER32 ref: 004555C7
                                            • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
                                            • DeleteObject.GDI32(?), ref: 00455736
                                            • DeleteObject.GDI32(?), ref: 00455744
                                            • DestroyIcon.USER32(?), ref: 00455752
                                            • DestroyWindow.USER32(?), ref: 00455760
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: DeleteDestroyMessageObjectSend$IconWindow
                                            • String ID:
                                            • API String ID: 3691411573-0
                                            • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                            • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
                                            • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
                                            • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
                                            APIs
                                              • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                              • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                              • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                            • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
                                            • LineTo.GDI32(?,?,?), ref: 004472AC
                                            • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
                                            • LineTo.GDI32(?,?,?), ref: 004472C6
                                            • EndPath.GDI32(?), ref: 004472D6
                                            • StrokePath.GDI32(?), ref: 004472E4
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
                                            • String ID:
                                            • API String ID: 372113273-0
                                            • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                            • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
                                            • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
                                            • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
                                            APIs
                                            • GetDC.USER32(00000000), ref: 0044CC6D
                                            • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
                                            • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
                                            • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
                                            • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CapsDevice$Release
                                            • String ID:
                                            • API String ID: 1035833867-0
                                            • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                            • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
                                            • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
                                            • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
                                            APIs
                                            • __getptd.LIBCMT ref: 0041708E
                                              • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                              • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                            • __amsg_exit.LIBCMT ref: 004170AE
                                            • __lock.LIBCMT ref: 004170BE
                                            • InterlockedDecrement.KERNEL32(?), ref: 004170DB
                                            • _free.LIBCMT ref: 004170EE
                                            • InterlockedIncrement.KERNEL32(02FC2CF0), ref: 00417106
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                                            • String ID:
                                            • API String ID: 3470314060-0
                                            • Opcode ID: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                                            • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
                                            • Opcode Fuzzy Hash: 80714434994c9102abdbbcfc383ede657addd51ae4f203e3d2298efcf25a3187
                                            • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
                                            APIs
                                            • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
                                            • EnterCriticalSection.KERNEL32(?), ref: 0044B666
                                            • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
                                            • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
                                              • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
                                            • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                            • String ID:
                                            • API String ID: 3495660284-0
                                            • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                            • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
                                            • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
                                            • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
                                            APIs
                                            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
                                            • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
                                            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
                                            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
                                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Virtual
                                            • String ID:
                                            • API String ID: 4278518827-0
                                            • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                            • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
                                            • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
                                            • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
                                            APIs
                                            • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                              • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                              • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                            • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                              • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                            • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                            • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                            • ExitThread.KERNEL32 ref: 004151ED
                                            • __freefls@4.LIBCMT ref: 00415209
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
                                            • String ID:
                                            • API String ID: 442100245-0
                                            • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                            • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
                                            • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
                                            • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
                                            APIs
                                              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                            • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
                                            • _wcslen.LIBCMT ref: 0045F94A
                                            • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
                                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                            • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
                                            • String ID: 0
                                            • API String ID: 621800784-4108050209
                                            • Opcode ID: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                                            • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
                                            • Opcode Fuzzy Hash: ba56779765e6f71d67f6246429d0af9e67b9def047912433c0c15b7e926c8fa5
                                            • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
                                            APIs
                                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                            • SetErrorMode.KERNEL32 ref: 004781CE
                                            • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
                                              • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
                                            • SetErrorMode.KERNEL32(?), ref: 00478270
                                            • SetErrorMode.KERNEL32(?), ref: 00478340
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ErrorMode$AttributesFile_memmove_wcslen
                                            • String ID: \VH
                                            • API String ID: 3884216118-234962358
                                            • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                            • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
                                            • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
                                            • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
                                            APIs
                                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
                                            • IsMenu.USER32(?), ref: 0044854D
                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
                                            • DrawMenuBar.USER32 ref: 004485AF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Menu$Item$DrawInfoInsert
                                            • String ID: 0
                                            • API String ID: 3076010158-4108050209
                                            • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                            • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
                                            • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
                                            • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
                                            APIs
                                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
                                            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
                                            • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
                                              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSend$_memmove_wcslen
                                            • String ID: ComboBox$ListBox
                                            • API String ID: 1589278365-1403004172
                                            • Opcode ID: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
                                            • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
                                            • Opcode Fuzzy Hash: 4395ff4c2c8cdf0c8fa99ec605851f177d12593d5a8a66f2884a0b9051c55526
                                            • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Handle
                                            • String ID: nul
                                            • API String ID: 2519475695-2873401336
                                            • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                            • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
                                            • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
                                            • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
                                            APIs
                                            • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Handle
                                            • String ID: nul
                                            • API String ID: 2519475695-2873401336
                                            • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                            • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
                                            • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
                                            • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
                                            APIs
                                            • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
                                              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                            • _wcsncpy.LIBCMT ref: 00401C41
                                            • _wcscpy.LIBCMT ref: 00401C5D
                                            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
                                            • String ID: Line:
                                            • API String ID: 1874344091-1585850449
                                            • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                            • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
                                            • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
                                            • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: SysAnimate32
                                            • API String ID: 0-1011021900
                                            • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                            • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
                                            • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
                                            • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
                                            APIs
                                              • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
                                              • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
                                              • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                              • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                              • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
                                              • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
                                            • GetFocus.USER32 ref: 0046157B
                                              • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
                                              • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
                                            • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
                                            • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
                                            • __swprintf.LIBCMT ref: 00461608
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
                                            • String ID: %s%d
                                            • API String ID: 2645982514-1110647743
                                            • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                            • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
                                            • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
                                            • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                            • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
                                            • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
                                            • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
                                            APIs
                                            • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
                                            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
                                            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
                                            • CloseHandle.KERNEL32(00000000), ref: 00475A4D
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Process$CloseCountersCurrentHandleOpen
                                            • String ID:
                                            • API String ID: 3488606520-0
                                            • Opcode ID: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                            • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
                                            • Opcode Fuzzy Hash: ce4ed15879a0d4705bc9675b55154bd71a0022cbb1f9dd3a70cee976304ba055
                                            • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
                                            APIs
                                              • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
                                              • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ConnectRegistry_memmove_wcslen
                                            • String ID:
                                            • API String ID: 15295421-0
                                            • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                            • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
                                            • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
                                            • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
                                            APIs
                                            • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
                                            • GetProcAddress.KERNEL32(?,?), ref: 004648F7
                                            • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
                                            • GetProcAddress.KERNEL32(?,?), ref: 0046495A
                                            • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: AddressProc$Library$FreeLoad
                                            • String ID:
                                            • API String ID: 2449869053-0
                                            • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                            • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
                                            • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
                                            • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
                                            APIs
                                            • GetCursorPos.USER32(?), ref: 004563A6
                                            • ScreenToClient.USER32(?,?), ref: 004563C3
                                            • GetAsyncKeyState.USER32(?), ref: 00456400
                                            • GetAsyncKeyState.USER32(?), ref: 00456410
                                            • GetWindowLongW.USER32(?,000000F0), ref: 00456466
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: AsyncState$ClientCursorLongScreenWindow
                                            • String ID:
                                            • API String ID: 3539004672-0
                                            • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                            • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
                                            • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
                                            • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
                                            APIs
                                            • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
                                            • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
                                            • Sleep.KERNEL32(0000000A), ref: 0047D455
                                            • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
                                            • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Interlocked$DecrementIncrement$Sleep
                                            • String ID:
                                            • API String ID: 327565842-0
                                            • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                            • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
                                            • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
                                            • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
                                            APIs
                                            • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
                                            • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
                                            • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
                                            • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: PrivateProfile$SectionWrite$String
                                            • String ID:
                                            • API String ID: 2832842796-0
                                            • Opcode ID: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                                            • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
                                            • Opcode Fuzzy Hash: a5613791a7b7745f301c2db32c82459f4eb77f00fff265897707edd8741bbf57
                                            • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
                                            APIs
                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
                                            • RegCloseKey.ADVAPI32(?), ref: 00441CFE
                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Enum$CloseDeleteOpen
                                            • String ID:
                                            • API String ID: 2095303065-0
                                            • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                            • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
                                            • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
                                            • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
                                            APIs
                                            • GetWindowRect.USER32(?,?), ref: 00436A24
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: RectWindow
                                            • String ID:
                                            • API String ID: 861336768-0
                                            • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                            • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
                                            • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
                                            • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
                                            APIs
                                            • SendMessageW.USER32 ref: 00449598
                                              • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                            • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
                                            • _wcslen.LIBCMT ref: 0044960D
                                            • _wcslen.LIBCMT ref: 0044961A
                                            • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSend$_wcslen$_wcspbrk
                                            • String ID:
                                            • API String ID: 1856069659-0
                                            • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                            • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
                                            • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
                                            • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
                                            APIs
                                            • GetCursorPos.USER32(?), ref: 004478E2
                                            • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
                                            • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
                                            • GetCursorPos.USER32(00000000), ref: 0044796A
                                            • TrackPopupMenuEx.USER32(02FC64D0,00000000,00000000,?,?,00000000), ref: 00447991
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CursorMenuPopupTrack$Proc
                                            • String ID:
                                            • API String ID: 1300944170-0
                                            • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                            • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
                                            • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
                                            • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
                                            APIs
                                            • GetClientRect.USER32(?,?), ref: 004479CC
                                            • GetCursorPos.USER32(?), ref: 004479D7
                                            • ScreenToClient.USER32(?,?), ref: 004479F3
                                            • WindowFromPoint.USER32(?,?), ref: 00447A34
                                            • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Client$CursorFromPointProcRectScreenWindow
                                            • String ID:
                                            • API String ID: 1822080540-0
                                            • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                            • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
                                            • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
                                            • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
                                            APIs
                                            • GetWindowRect.USER32(?,?), ref: 00447C5D
                                            • ScreenToClient.USER32(?,?), ref: 00447C7B
                                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
                                            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
                                            • EndPaint.USER32(?,?), ref: 00447D13
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ClientPaintRectRectangleScreenViewportWindow
                                            • String ID:
                                            • API String ID: 659298297-0
                                            • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                            • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
                                            • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
                                            • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
                                            APIs
                                            • EnableWindow.USER32(?,00000000), ref: 00448B5C
                                            • EnableWindow.USER32(?,00000001), ref: 00448B72
                                            • ShowWindow.USER32(?,00000000), ref: 00448BE8
                                            • ShowWindow.USER32(?,00000004), ref: 00448BF4
                                            • EnableWindow.USER32(?,00000001), ref: 00448C09
                                              • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
                                              • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
                                              • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
                                              • Part of subcall function 00440D98: SendMessageW.USER32(02FC1AE8,000000F1,00000000,00000000), ref: 00440E6E
                                              • Part of subcall function 00440D98: SendMessageW.USER32(02FC1AE8,000000F1,00000001,00000000), ref: 00440E9A
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Window$EnableMessageSend$LongShow
                                            • String ID:
                                            • API String ID: 142311417-0
                                            • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                            • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
                                            • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
                                            • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                            • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
                                            • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
                                            • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
                                            APIs
                                            • IsWindowVisible.USER32(?), ref: 00445879
                                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
                                            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
                                            • _wcslen.LIBCMT ref: 004458FB
                                            • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
                                            • String ID:
                                            • API String ID: 3087257052-0
                                            • Opcode ID: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
                                            • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
                                            • Opcode Fuzzy Hash: f69ffadf962ece00da2d3b786a5ca76815724ee7e4437aac7967cccaf73e78c3
                                            • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
                                            APIs
                                              • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
                                            • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
                                            • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
                                            • connect.WSOCK32(00000000,?,00000010), ref: 00465446
                                            • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
                                            • closesocket.WSOCK32(00000000,00000000), ref: 00465481
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ErrorLast$closesocketconnectinet_addrsocket
                                            • String ID:
                                            • API String ID: 245547762-0
                                            • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                            • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
                                            • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
                                            • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
                                            APIs
                                            • DeleteObject.GDI32(00000000), ref: 004471D8
                                            • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                            • SelectObject.GDI32(?,00000000), ref: 00447228
                                            • BeginPath.GDI32(?), ref: 0044723D
                                            • SelectObject.GDI32(?,00000000), ref: 00447266
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Object$Select$BeginCreateDeletePath
                                            • String ID:
                                            • API String ID: 2338827641-0
                                            • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                            • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
                                            • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
                                            • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
                                            APIs
                                            • Sleep.KERNEL32(00000000), ref: 00434598
                                            • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
                                            • Sleep.KERNEL32(00000000), ref: 004345D4
                                            • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CounterPerformanceQuerySleep
                                            • String ID:
                                            • API String ID: 2875609808-0
                                            • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                            • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
                                            • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
                                            • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
                                            APIs
                                            • GetDlgItem.USER32(?,000003E9), ref: 00460C17
                                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
                                            • MessageBeep.USER32(00000000), ref: 00460C46
                                            • KillTimer.USER32(?,0000040A), ref: 00460C68
                                            • EndDialog.USER32(?,00000001), ref: 00460C83
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                                            • String ID:
                                            • API String ID: 3741023627-0
                                            • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                            • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
                                            • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
                                            • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Destroy$DeleteObjectWindow$Icon
                                            • String ID:
                                            • API String ID: 4023252218-0
                                            • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                            • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
                                            • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
                                            • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
                                            APIs
                                            • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
                                            • DeleteObject.GDI32(?), ref: 00455736
                                            • DeleteObject.GDI32(?), ref: 00455744
                                            • DestroyIcon.USER32(?), ref: 00455752
                                            • DestroyWindow.USER32(?), ref: 00455760
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: DeleteDestroyObject$IconMessageSendWindow
                                            • String ID:
                                            • API String ID: 1489400265-0
                                            • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                            • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
                                            • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
                                            • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
                                            APIs
                                              • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
                                            • DestroyWindow.USER32(?), ref: 00455728
                                            • DeleteObject.GDI32(?), ref: 00455736
                                            • DeleteObject.GDI32(?), ref: 00455744
                                            • DestroyIcon.USER32(?), ref: 00455752
                                            • DestroyWindow.USER32(?), ref: 00455760
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
                                            • String ID:
                                            • API String ID: 1042038666-0
                                            • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                            • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
                                            • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
                                            • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
                                            APIs
                                            • __getptd.LIBCMT ref: 0041780F
                                              • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
                                              • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
                                            • __getptd.LIBCMT ref: 00417826
                                            • __amsg_exit.LIBCMT ref: 00417834
                                            • __lock.LIBCMT ref: 00417844
                                            • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                            • String ID:
                                            • API String ID: 938513278-0
                                            • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                            • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
                                            • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
                                            • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
                                            APIs
                                              • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                            • ___set_flsgetvalue.LIBCMT ref: 00413D20
                                              • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                              • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                            • ___fls_getvalue@4.LIBCMT ref: 00413D2B
                                              • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                            • ___fls_setvalue@8.LIBCMT ref: 00413D3E
                                            • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
                                            • ExitThread.KERNEL32 ref: 00413D4E
                                            • GetCurrentThreadId.KERNEL32 ref: 00413D54
                                            • __freefls@4.LIBCMT ref: 00413D74
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                            • String ID:
                                            • API String ID: 2403457894-0
                                            • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                            • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
                                            • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
                                            • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
                                            APIs
                                              • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
                                            • ___set_flsgetvalue.LIBCMT ref: 004151C0
                                              • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
                                              • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
                                            • ___fls_getvalue@4.LIBCMT ref: 004151CB
                                              • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
                                            • ___fls_setvalue@8.LIBCMT ref: 004151DD
                                            • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
                                            • ExitThread.KERNEL32 ref: 004151ED
                                            • __freefls@4.LIBCMT ref: 00415209
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
                                            • String ID:
                                            • API String ID: 4247068974-0
                                            • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                            • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
                                            • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
                                            • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: )$U$\
                                            • API String ID: 0-3705770531
                                            • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                            • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
                                            • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
                                            • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
                                            APIs
                                              • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
                                            • CoInitialize.OLE32(00000000), ref: 0046E505
                                            • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
                                            • CoUninitialize.OLE32 ref: 0046E53D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CreateInitializeInstanceUninitialize_wcslen
                                            • String ID: .lnk
                                            • API String ID: 886957087-24824748
                                            • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                            • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
                                            • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
                                            • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID: \
                                            • API String ID: 4104443479-2967466578
                                            • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                            • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
                                            • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
                                            • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID: \
                                            • API String ID: 4104443479-2967466578
                                            • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                            • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
                                            • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
                                            • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID: \
                                            • API String ID: 4104443479-2967466578
                                            • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                            • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
                                            • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
                                            • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
                                            Strings
                                            • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
                                            • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                            • API String ID: 708495834-557222456
                                            • Opcode ID: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                                            • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
                                            • Opcode Fuzzy Hash: 0835c6591df01f69715f5e8aca6b92cd03353c77de4b2b2244ddd74c7a14709d
                                            • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
                                            APIs
                                              • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
                                            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
                                              • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
                                              • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
                                              • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
                                              • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
                                            • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                            • String ID: @
                                            • API String ID: 4150878124-2766056989
                                            • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                            • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
                                            • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
                                            • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID: \$]$h
                                            • API String ID: 4104443479-3262404753
                                            • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                            • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
                                            • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
                                            • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
                                            APIs
                                            • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
                                              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                            • CloseHandle.KERNEL32(?), ref: 00457E09
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CloseExecuteHandleShell_wcscpy_wcslen
                                            • String ID: <$@
                                            • API String ID: 2417854910-1426351568
                                            • Opcode ID: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                                            • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
                                            • Opcode Fuzzy Hash: 456975d6943100b9bccf6a944bdff1bb50055e47ea808eda8884d41227499f4e
                                            • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
                                            APIs
                                            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
                                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
                                              • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
                                            • String ID:
                                            • API String ID: 3705125965-3916222277
                                            • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                            • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
                                            • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
                                            • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
                                            APIs
                                            • GetMenuItemInfoW.USER32 ref: 0045FAC4
                                            • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
                                            • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Menu$Delete$InfoItem
                                            • String ID: 0
                                            • API String ID: 135850232-4108050209
                                            • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                            • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
                                            • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
                                            • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
                                            APIs
                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
                                            • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Window$Long
                                            • String ID: SysTreeView32
                                            • API String ID: 847901565-1698111956
                                            • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                            • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
                                            • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
                                            • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
                                            APIs
                                            • LoadLibraryA.KERNEL32(?), ref: 00434B10
                                            • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
                                            • FreeLibrary.KERNEL32(?), ref: 00434B9F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Library$AddressFreeLoadProc
                                            • String ID: AU3_GetPluginDetails
                                            • API String ID: 145871493-4132174516
                                            • Opcode ID: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
                                            • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
                                            • Opcode Fuzzy Hash: 525874d34911f66d3e6dd89a42f64d0fb8abb6a055dcd3ee386d4a3c405b38ac
                                            • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
                                            APIs
                                            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window
                                            • String ID: SysMonthCal32
                                            • API String ID: 2326795674-1439706946
                                            • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                            • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
                                            • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
                                            • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
                                            APIs
                                            • DestroyWindow.USER32(00000000), ref: 00450A2F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: DestroyWindow
                                            • String ID: msctls_updown32
                                            • API String ID: 3375834691-2298589950
                                            • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                            • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
                                            • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
                                            • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID: $<
                                            • API String ID: 4104443479-428540627
                                            • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                            • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
                                            • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
                                            • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ErrorMode$DiskFreeSpace
                                            • String ID: \VH
                                            • API String ID: 1682464887-234962358
                                            • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                            • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
                                            • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
                                            • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
                                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
                                            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ErrorMode$DiskFreeSpace
                                            • String ID: \VH
                                            • API String ID: 1682464887-234962358
                                            • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                            • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
                                            • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
                                            • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
                                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
                                            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ErrorMode$DiskFreeSpace
                                            • String ID: \VH
                                            • API String ID: 1682464887-234962358
                                            • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                            • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
                                            • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
                                            • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
                                            • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
                                            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ErrorMode$InformationVolume
                                            • String ID: \VH
                                            • API String ID: 2507767853-234962358
                                            • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                            • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
                                            • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
                                            • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
                                            • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
                                            • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ErrorMode$InformationVolume
                                            • String ID: \VH
                                            • API String ID: 2507767853-234962358
                                            • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                            • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
                                            • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
                                            • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
                                            APIs
                                            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
                                            • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
                                            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID: msctls_trackbar32
                                            • API String ID: 3850602802-1010561917
                                            • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                            • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
                                            • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
                                            • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
                                            APIs
                                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                            • CLSIDFromString.OLE32(?,00000000), ref: 00435236
                                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
                                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
                                            • String ID: crts
                                            • API String ID: 943502515-3724388283
                                            • Opcode ID: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
                                            • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
                                            • Opcode Fuzzy Hash: 1c951fdfbdf5c5f88c618ab4611406fe4b678f9348836ee2954194ca176c3974
                                            • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
                                            APIs
                                            • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
                                            • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
                                            • SetErrorMode.KERNEL32(?), ref: 0045D35C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ErrorMode$LabelVolume
                                            • String ID: \VH
                                            • API String ID: 2006950084-234962358
                                            • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                            • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
                                            • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
                                            • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
                                            APIs
                                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                            • GetMenuItemInfoW.USER32 ref: 00449727
                                            • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
                                            • DrawMenuBar.USER32 ref: 00449761
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Menu$InfoItem$Draw_malloc
                                            • String ID: 0
                                            • API String ID: 772068139-4108050209
                                            • Opcode ID: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
                                            • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
                                            • Opcode Fuzzy Hash: 1167fa92614d233b3003e6fb28f1152d6dc9f7ab2b98f531c98f2f78594b2958
                                            • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _wcslen$_wcscpy
                                            • String ID: 3, 3, 8, 1
                                            • API String ID: 3469035223-357260408
                                            • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                            • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
                                            • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
                                            • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
                                            APIs
                                            • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
                                            • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: ICMP.DLL$IcmpCloseHandle
                                            • API String ID: 2574300362-3530519716
                                            • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                            • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
                                            • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
                                            • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
                                            APIs
                                            • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
                                            • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: ICMP.DLL$IcmpCreateFile
                                            • API String ID: 2574300362-275556492
                                            • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                            • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
                                            • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
                                            • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
                                            APIs
                                            • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
                                            • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: ICMP.DLL$IcmpSendEcho
                                            • API String ID: 2574300362-58917771
                                            • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                            • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
                                            • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
                                            • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
                                            APIs
                                            • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
                                            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: AddressLibraryLoadProc
                                            • String ID: RegDeleteKeyExW$advapi32.dll
                                            • API String ID: 2574300362-4033151799
                                            • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                            • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
                                            • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
                                            • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
                                            APIs
                                            • VariantInit.OLEAUT32(?), ref: 0047950F
                                            • SysAllocString.OLEAUT32(00000000), ref: 004795D8
                                            • VariantCopy.OLEAUT32(?,?), ref: 0047960F
                                            • VariantClear.OLEAUT32(?), ref: 00479650
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Variant$AllocClearCopyInitString
                                            • String ID:
                                            • API String ID: 2808897238-0
                                            • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                            • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
                                            • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
                                            • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
                                            APIs
                                            • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
                                            • __itow.LIBCMT ref: 004699CD
                                              • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
                                            • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
                                            • __itow.LIBCMT ref: 00469A97
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSend$__itow
                                            • String ID:
                                            • API String ID: 3379773720-0
                                            • Opcode ID: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                            • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
                                            • Opcode Fuzzy Hash: f450223117ea95bfee34014d9d84978b58918b7dbb146b9b64e9adf8c20a5af9
                                            • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
                                            APIs
                                            • GetWindowRect.USER32(?,?), ref: 00449A4A
                                            • ScreenToClient.USER32(?,?), ref: 00449A80
                                            • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Window$ClientMoveRectScreen
                                            • String ID:
                                            • API String ID: 3880355969-0
                                            • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                            • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
                                            • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
                                            • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                            • String ID:
                                            • API String ID: 2782032738-0
                                            • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                            • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
                                            • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
                                            • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
                                            APIs
                                            • ClientToScreen.USER32(00000000,?), ref: 0044169A
                                            • GetWindowRect.USER32(?,?), ref: 00441722
                                            • PtInRect.USER32(?,?,?), ref: 00441734
                                            • MessageBeep.USER32(00000000), ref: 004417AD
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Rect$BeepClientMessageScreenWindow
                                            • String ID:
                                            • API String ID: 1352109105-0
                                            • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                            • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
                                            • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
                                            • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
                                            APIs
                                            • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
                                            • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
                                            • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
                                            • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CreateHardLink$DeleteErrorFileLast
                                            • String ID:
                                            • API String ID: 3321077145-0
                                            • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                            • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
                                            • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
                                            • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
                                            APIs
                                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
                                            • __isleadbyte_l.LIBCMT ref: 004208A6
                                            • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
                                            • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                            • String ID:
                                            • API String ID: 3058430110-0
                                            • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                            • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
                                            • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
                                            • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
                                            APIs
                                            • GetParent.USER32(?), ref: 004503C8
                                            • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
                                            • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
                                            • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Proc$Parent
                                            • String ID:
                                            • API String ID: 2351499541-0
                                            • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                            • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
                                            • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
                                            • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
                                            APIs
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
                                            • TranslateMessage.USER32(?), ref: 00442B01
                                            • DispatchMessageW.USER32(?), ref: 00442B0B
                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Message$Peek$DispatchTranslate
                                            • String ID:
                                            • API String ID: 1795658109-0
                                            • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                            • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
                                            • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
                                            • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
                                            APIs
                                            • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
                                              • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
                                              • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
                                              • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
                                            • GetCaretPos.USER32(?), ref: 004743B2
                                            • ClientToScreen.USER32(00000000,?), ref: 004743E8
                                            • GetForegroundWindow.USER32 ref: 004743EE
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                            • String ID:
                                            • API String ID: 2759813231-0
                                            • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                            • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
                                            • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
                                            • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
                                            APIs
                                              • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
                                            • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
                                            • _wcslen.LIBCMT ref: 00449519
                                            • _wcslen.LIBCMT ref: 00449526
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSend_wcslen$_wcspbrk
                                            • String ID:
                                            • API String ID: 2886238975-0
                                            • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                            • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
                                            • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
                                            • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __setmode$DebugOutputString_fprintf
                                            • String ID:
                                            • API String ID: 1792727568-0
                                            • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                            • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
                                            • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
                                            • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
                                            APIs
                                              • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
                                            • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
                                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
                                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
                                            • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Window$Long$AttributesLayered
                                            • String ID:
                                            • API String ID: 2169480361-0
                                            • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                            • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
                                            • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
                                            • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
                                            APIs
                                              • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
                                              • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
                                              • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
                                            • lstrlenW.KERNEL32(?), ref: 00434CF6
                                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                            • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
                                            • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: lstrcmpilstrcpylstrlen$_malloc
                                            • String ID: cdecl
                                            • API String ID: 3850814276-3896280584
                                            • Opcode ID: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
                                            • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
                                            • Opcode Fuzzy Hash: 21c69cf6c29ea855f725dfe2a9cb2720d4b8dbea94fc3a7d57af4f6d050de3c2
                                            • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
                                            APIs
                                              • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
                                            • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
                                            • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
                                            • _memmove.LIBCMT ref: 0046D475
                                            • inet_ntoa.WSOCK32(?), ref: 0046D481
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
                                            • String ID:
                                            • API String ID: 2502553879-0
                                            • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                            • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
                                            • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
                                            • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
                                            APIs
                                            • SendMessageW.USER32 ref: 00448C69
                                            • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
                                            • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
                                            • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSend$LongWindow
                                            • String ID:
                                            • API String ID: 312131281-0
                                            • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                            • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
                                            • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
                                            • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
                                            APIs
                                            • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
                                            • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
                                            • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
                                            • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ErrorLastacceptselect
                                            • String ID:
                                            • API String ID: 385091864-0
                                            • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                            • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
                                            • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
                                            • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
                                            APIs
                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                            • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
                                            • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
                                            • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00400000,00000000), ref: 00430242
                                            • GetStockObject.GDI32(00000011), ref: 00430258
                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
                                            • ShowWindow.USER32(00000000,00000000), ref: 0043027D
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Window$CreateMessageObjectSendShowStock
                                            • String ID:
                                            • API String ID: 1358664141-0
                                            • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                            • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
                                            • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
                                            • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
                                            APIs
                                            • GetCurrentThreadId.KERNEL32 ref: 00443CA6
                                            • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
                                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
                                            • CloseHandle.KERNEL32(00000000), ref: 00443CF9
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                            • String ID:
                                            • API String ID: 2880819207-0
                                            • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                            • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
                                            • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
                                            • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
                                            APIs
                                            • GetWindowRect.USER32(?,?), ref: 00430BA2
                                            • ScreenToClient.USER32(?,?), ref: 00430BC1
                                            • ScreenToClient.USER32(?,?), ref: 00430BE2
                                            • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ClientRectScreen$InvalidateWindow
                                            • String ID:
                                            • API String ID: 357397906-0
                                            • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                            • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
                                            • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
                                            • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
                                            APIs
                                            • __wsplitpath.LIBCMT ref: 0043392E
                                              • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
                                            • __wsplitpath.LIBCMT ref: 00433950
                                            • __wcsicoll.LIBCMT ref: 00433974
                                            • __wcsicoll.LIBCMT ref: 0043398A
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
                                            • String ID:
                                            • API String ID: 1187119602-0
                                            • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                            • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
                                            • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
                                            • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _wcslen$_malloc_wcscat_wcscpy
                                            • String ID:
                                            • API String ID: 1597257046-0
                                            • Opcode ID: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
                                            • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
                                            • Opcode Fuzzy Hash: 3c6fc8acff7e2f2e7aee9de07fb73a2c390eddda5e8305f0b40f95221864db4e
                                            • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
                                            APIs
                                            • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
                                            • __malloc_crt.LIBCMT ref: 0041F5B6
                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: EnvironmentStrings$Free__malloc_crt
                                            • String ID:
                                            • API String ID: 237123855-0
                                            • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                            • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
                                            • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
                                            • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: DeleteDestroyObject$IconWindow
                                            • String ID:
                                            • API String ID: 3349847261-0
                                            • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                            • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
                                            • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
                                            • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
                                            APIs
                                            • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
                                            • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
                                            • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
                                            • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CriticalSection$Leave$EnterExchangeInterlocked
                                            • String ID:
                                            • API String ID: 2223660684-0
                                            • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                            • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
                                            • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
                                            • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
                                            APIs
                                              • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
                                              • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
                                              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
                                              • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
                                              • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
                                            • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
                                            • LineTo.GDI32(?,?,?), ref: 00447326
                                            • EndPath.GDI32(?), ref: 00447336
                                            • StrokePath.GDI32(?), ref: 00447344
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
                                            • String ID:
                                            • API String ID: 2783949968-0
                                            • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                            • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
                                            • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
                                            • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
                                            APIs
                                            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
                                            • GetCurrentThreadId.KERNEL32 ref: 004364A3
                                            • AttachThreadInput.USER32(00000000), ref: 004364AA
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                            • String ID:
                                            • API String ID: 2710830443-0
                                            • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                            • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
                                            • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
                                            • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
                                            APIs
                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
                                            • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
                                            • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
                                            • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
                                              • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
                                              • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                            • String ID:
                                            • API String ID: 146765662-0
                                            • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                            • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
                                            • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
                                            • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
                                            APIs
                                            • GetDesktopWindow.USER32 ref: 00472B63
                                            • GetDC.USER32(00000000), ref: 00472B6C
                                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
                                            • ReleaseDC.USER32(00000000,?), ref: 00472B99
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CapsDesktopDeviceReleaseWindow
                                            • String ID:
                                            • API String ID: 2889604237-0
                                            • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                            • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
                                            • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
                                            • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
                                            APIs
                                            • GetDesktopWindow.USER32 ref: 00472BB2
                                            • GetDC.USER32(00000000), ref: 00472BBB
                                            • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
                                            • ReleaseDC.USER32(00000000,?), ref: 00472BE8
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CapsDesktopDeviceReleaseWindow
                                            • String ID:
                                            • API String ID: 2889604237-0
                                            • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                            • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
                                            • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
                                            • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
                                            APIs
                                            • __getptd_noexit.LIBCMT ref: 00415150
                                              • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
                                              • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
                                              • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
                                              • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
                                              • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
                                            • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
                                            • __freeptd.LIBCMT ref: 0041516B
                                            • ExitThread.KERNEL32 ref: 00415173
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
                                            • String ID:
                                            • API String ID: 1454798553-0
                                            • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                            • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
                                            • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
                                            • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _strncmp
                                            • String ID: Q\E
                                            • API String ID: 909875538-2189900498
                                            • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                            • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
                                            • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
                                            • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
                                            APIs
                                            • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
                                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                              • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
                                              • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
                                              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
                                              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000068,?), ref: 00451C0E
                                              • Part of subcall function 00451B42: VariantCopy.OLEAUT32(-00000088,?), ref: 00451C27
                                              • Part of subcall function 00451B42: VariantClear.OLEAUT32(-00000058), ref: 00451CA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
                                            • String ID: AutoIt3GUI$Container
                                            • API String ID: 2652923123-3941886329
                                            • Opcode ID: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                                            • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
                                            • Opcode Fuzzy Hash: 662e4c56437cfc6d97a34dfd7b47562ea5a254ee8eeedf1ae9933f7f1d1523bc
                                            • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _memmove_strncmp
                                            • String ID: U$\
                                            • API String ID: 2666721431-100911408
                                            • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                            • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
                                            • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
                                            • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
                                            APIs
                                              • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
                                              • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
                                            • __wcsnicmp.LIBCMT ref: 00467288
                                            • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Connection__wcsnicmp_wcscpy_wcslen
                                            • String ID: LPT
                                            • API String ID: 3035604524-1350329615
                                            • Opcode ID: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                                            • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
                                            • Opcode Fuzzy Hash: df00d6e4b866e053a8717e7cd00b83b505630e9b2d4c108cf88e8e3b58e1c49d
                                            • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID: \$h
                                            • API String ID: 4104443479-677774858
                                            • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                            • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
                                            • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
                                            • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _memcmp
                                            • String ID: &
                                            • API String ID: 2931989736-1010288
                                            • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                            • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
                                            • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
                                            • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID: \
                                            • API String ID: 4104443479-2967466578
                                            • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                            • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
                                            • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
                                            • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
                                            APIs
                                            • _wcslen.LIBCMT ref: 00466825
                                            • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CrackInternet_wcslen
                                            • String ID: |
                                            • API String ID: 596671847-2343686810
                                            • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                            • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
                                            • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
                                            • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
                                            APIs
                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID: '
                                            • API String ID: 3850602802-1997036262
                                            • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                            • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
                                            • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
                                            • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
                                            APIs
                                            • _strlen.LIBCMT ref: 0040F858
                                              • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
                                              • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
                                            • _sprintf.LIBCMT ref: 0040F9AE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _memmove$_sprintf_strlen
                                            • String ID: %02X
                                            • API String ID: 1921645428-436463671
                                            • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                            • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
                                            • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
                                            • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
                                            APIs
                                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID: Combobox
                                            • API String ID: 3850602802-2096851135
                                            • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                            • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
                                            • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
                                            • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
                                            APIs
                                            • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
                                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: LengthMessageSendTextWindow
                                            • String ID: edit
                                            • API String ID: 2978978980-2167791130
                                            • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                            • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
                                            • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
                                            • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
                                            APIs
                                            • Sleep.KERNEL32(00000000), ref: 00476CB0
                                            • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: GlobalMemorySleepStatus
                                            • String ID: @
                                            • API String ID: 2783356886-2766056989
                                            • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                            • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
                                            • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
                                            • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: htonsinet_addr
                                            • String ID: 255.255.255.255
                                            • API String ID: 3832099526-2422070025
                                            • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                            • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
                                            • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
                                            • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
                                            APIs
                                            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: InternetOpen
                                            • String ID: <local>
                                            • API String ID: 2038078732-4266983199
                                            • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                            • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
                                            • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
                                            • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: __fread_nolock_memmove
                                            • String ID: EA06
                                            • API String ID: 1988441806-3962188686
                                            • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                            • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
                                            • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
                                            • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _memmove
                                            • String ID: u,D
                                            • API String ID: 4104443479-3858472334
                                            • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                            • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
                                            • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
                                            • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
                                            APIs
                                            • _wcslen.LIBCMT ref: 00401B11
                                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                            • _memmove.LIBCMT ref: 00401B57
                                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
                                              • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
                                              • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
                                            • String ID: @EXITCODE
                                            • API String ID: 2734553683-3436989551
                                            • Opcode ID: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                                            • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
                                            • Opcode Fuzzy Hash: b6d17f11840b334af4eb2c0dc4703dd6ec7fe6b5974f9b569570c14fa5f7c58b
                                            • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
                                            APIs
                                            • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
                                              • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
                                            • wsprintfW.USER32 ref: 0045612A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: MessageSend_mallocwsprintf
                                            • String ID: %d/%02d/%02d
                                            • API String ID: 1262938277-328681919
                                            • Opcode ID: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                                            • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
                                            • Opcode Fuzzy Hash: 0791508f4d5d4d8a4d88f52051df625728301e413c657ab928a68c4181838543
                                            • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
                                            APIs
                                            • InternetCloseHandle.WININET(?), ref: 00442663
                                            • InternetCloseHandle.WININET ref: 00442668
                                              • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: CloseHandleInternet$ObjectSingleWait
                                            • String ID: aeB
                                            • API String ID: 857135153-906807131
                                            • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                            • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
                                            • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
                                            • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
                                            APIs
                                            Strings
                                            • C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe, xrefs: 0043324B
                                            • ^B, xrefs: 00433248
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: _wcsncpy
                                            • String ID: ^B$C:\Users\user\Desktop\z1RFT798549034687-HJW90789-VXT9KGUINUII.exe
                                            • API String ID: 1735881322-3255177947
                                            • Opcode ID: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                            • Instruction ID: 95fca152a805ab331260cabc3645652019b64b11bc5d0d7a1f408bc65d2df1f2
                                            • Opcode Fuzzy Hash: f7c3fd886c497ae33bdd3057849675e3afdb83c7c480df0bc310b3c11edf5eb4
                                            • Instruction Fuzzy Hash: ADE0C23360051A7B9710DE4AD841DBBF37DEEC4A20B08802AF90883200E2B1BD1A43E4
                                            APIs
                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
                                            • PostMessageW.USER32(00000000), ref: 00441C05
                                              • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: FindMessagePostSleepWindow
                                            • String ID: Shell_TrayWnd
                                            • API String ID: 529655941-2988720461
                                            • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                            • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
                                            • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
                                            • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
                                            APIs
                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
                                            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
                                              • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: FindMessagePostSleepWindow
                                            • String ID: Shell_TrayWnd
                                            • API String ID: 529655941-2988720461
                                            • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                            • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
                                            • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
                                            • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
                                            APIs
                                            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
                                              • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000001.00000002.1357810475.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000001.00000002.1357787882.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357865972.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357886024.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357906638.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357925920.00000000004A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000001.00000002.1357969544.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_1_2_400000_z1RFT798549034687-HJW90789-VXT9KGUINUII.jbxd
                                            Similarity
                                            • API ID: Message_doexit
                                            • String ID: AutoIt$Error allocating memory.
                                            • API String ID: 1993061046-4017498283
                                            • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                            • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
                                            • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
                                            • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D