Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
QqHWdVqNBs.exe

Overview

General Information

Sample name:QqHWdVqNBs.exe
renamed because original name is a hash value
Original sample name:45658cfd5c86375a3f47d821c8c8bfc7.exe
Analysis ID:1520445
MD5:45658cfd5c86375a3f47d821c8c8bfc7
SHA1:01dfdac7115839b4dabc96dfe381d7231010838c
SHA256:eca8448d70d825863070e154190f163d6917ba1f696402d8ed20ffe0e59f1bf5
Tags:exeuser-abuse_ch
Infos:

Detection

Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Sigma detected: Search for Antivirus process
AI detected suspicious sample
Drops PE files with a suspicious file extension
Found stalling execution ending in API Sleep call
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: WScript or CScript Dropper
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes many files with high entropy
Wscript called in batch mode (surpress errors)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • QqHWdVqNBs.exe (PID: 7344 cmdline: "C:\Users\user\Desktop\QqHWdVqNBs.exe" MD5: 45658CFD5C86375A3F47D821C8C8BFC7)
    • cmd.exe (PID: 7456 cmdline: "C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 7520 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 7528 cmdline: findstr /I "wrsa.exe opssvc.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 7568 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 7576 cmdline: findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 7612 cmdline: cmd /c md 369580 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • findstr.exe (PID: 7628 cmdline: findstr /V "MaskBathroomsCompoundInjection" Participants MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 7648 cmdline: cmd /c copy /b Massachusetts + Radius + Dental + Vendor + Fighting + June + Stockings + Convenience + Falls + Joke + Mask + Severe + Outreach + Sig + Bdsm 369580\Z MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Origin.pif (PID: 7692 cmdline: 369580\Origin.pif 369580\Z MD5: B06E67F9767E5023892D9698703AD098)
        • schtasks.exe (PID: 7772 cmdline: schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
          • conhost.exe (PID: 7780 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • timeout.exe (PID: 7728 cmdline: timeout 15 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
  • wscript.exe (PID: 7848 cmdline: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • SecureHawk.pif (PID: 7900 cmdline: "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif" "C:\Users\user\AppData\Local\LinkGuard Dynamics\r" MD5: B06E67F9767E5023892D9698703AD098)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST, CommandLine: schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 369580\Origin.pif 369580\Z, ParentImage: C:\Users\user\AppData\Local\Temp\369580\Origin.pif, ParentProcessId: 7692, ParentProcessName: Origin.pif, ProcessCommandLine: schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST, ProcessId: 7772, ProcessName: schtasks.exe
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js", CommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 932, ProcessCommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js", ProcessId: 7848, ProcessName: wscript.exe
Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: 369580\Origin.pif 369580\Z, CommandLine: 369580\Origin.pif 369580\Z, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\369580\Origin.pif, NewProcessName: C:\Users\user\AppData\Local\Temp\369580\Origin.pif, OriginalFileName: C:\Users\user\AppData\Local\Temp\369580\Origin.pif, ParentCommandLine: "C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exit, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7456, ParentProcessName: cmd.exe, ProcessCommandLine: 369580\Origin.pif 369580\Z, ProcessId: 7692, ProcessName: Origin.pif
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST, CommandLine: schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 369580\Origin.pif 369580\Z, ParentImage: C:\Users\user\AppData\Local\Temp\369580\Origin.pif, ParentProcessId: 7692, ParentProcessName: Origin.pif, ProcessCommandLine: schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST, ProcessId: 7772, ProcessName: schtasks.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exit, CommandLine: "C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\QqHWdVqNBs.exe", ParentImage: C:\Users\user\Desktop\QqHWdVqNBs.exe, ParentProcessId: 7344, ParentProcessName: QqHWdVqNBs.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exit, ProcessId: 7456, ProcessName: cmd.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST, CommandLine: schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 369580\Origin.pif 369580\Z, ParentImage: C:\Users\user\AppData\Local\Temp\369580\Origin.pif, ParentProcessId: 7692, ParentProcessName: Origin.pif, ProcessCommandLine: schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST, ProcessId: 7772, ProcessName: schtasks.exe
Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js", CommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 932, ProcessCommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js", ProcessId: 7848, ProcessName: wscript.exe

HIPS / PFW / Operating System Protection Evasion

barindex
Source: Process startedAuthor: Joe Security: Data: Command: findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" , CommandLine: findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exit, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7456, ParentProcessName: cmd.exe, ProcessCommandLine: findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" , ProcessId: 7576, ProcessName: findstr.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: QqHWdVqNBs.exeReversingLabs: Detection: 31%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 86.7% probability
Source: QqHWdVqNBs.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: QqHWdVqNBs.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C347B7 GetFileAttributesW,FindFirstFileW,FindClose,12_2_00C347B7
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C33B4F FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,12_2_00C33B4F
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C33E72 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,12_2_00C33E72
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C3C16C FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,12_2_00C3C16C
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C3CB81 FindFirstFileW,FindClose,12_2_00C3CB81
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C3CC0C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,12_2_00C3CC0C
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C3F445 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,12_2_00C3F445
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C3F5A2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,12_2_00C3F5A2
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C3F8A3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,12_2_00C3F8A3
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004F47B7 GetFileAttributesW,FindFirstFileW,FindClose,17_2_004F47B7
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004F3E72 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,17_2_004F3E72
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004FC16C FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,17_2_004FC16C
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004FCB81 FindFirstFileW,FindClose,17_2_004FCB81
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004FCC0C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,17_2_004FCC0C
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004FF445 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,17_2_004FF445
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004FF5A2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,17_2_004FF5A2
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004FF8A3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,17_2_004FF8A3
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004F3B4F FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,17_2_004F3B4F
Source: unknownDNS traffic detected: query: jZFqZYoOtpryMyRHD.jZFqZYoOtpryMyRHD replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C4279E InternetReadFile,InternetQueryDataAvailable,InternetReadFile,12_2_00C4279E
Source: global trafficDNS traffic detected: DNS query: jZFqZYoOtpryMyRHD.jZFqZYoOtpryMyRHD
Source: QqHWdVqNBs.exe, 00000000.00000003.1335365565.000000000289B000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000C.00000003.1443080760.00000000033E7000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 0000000C.00000002.2581379889.000000000407A000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, SecureHawk.pif.12.dr, Beginning.0.drString found in binary or memory: http://crl.globalsign.com/gs/gscodesigng2.crl0
Source: QqHWdVqNBs.exe, 00000000.00000003.1335365565.000000000289B000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000C.00000003.1443080760.00000000033E7000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 0000000C.00000002.2581379889.000000000407A000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, SecureHawk.pif.12.dr, Beginning.0.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingg2.crl0T
Source: QqHWdVqNBs.exe, 00000000.00000003.1335365565.000000000289B000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000C.00000003.1443080760.00000000033E7000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 0000000C.00000002.2581379889.000000000407A000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, SecureHawk.pif.12.dr, Beginning.0.drString found in binary or memory: http://crl.globalsign.net/root.crl0
Source: QqHWdVqNBs.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: QqHWdVqNBs.exe, 00000000.00000003.1335365565.000000000289B000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000C.00000003.1443080760.00000000033E7000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 0000000C.00000002.2581379889.000000000407A000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, SecureHawk.pif.12.dr, Beginning.0.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesigng20
Source: QqHWdVqNBs.exe, 00000000.00000003.1335365565.000000000289B000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000C.00000003.1443080760.00000000033E7000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 0000000C.00000002.2581379889.000000000407A000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, SecureHawk.pif.12.dr, Beginning.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesigng2.crt04
Source: QqHWdVqNBs.exe, 00000000.00000003.1335365565.000000000289B000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000C.00000003.1443080760.00000000033E7000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 0000000C.00000002.2581379889.000000000407A000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, SecureHawk.pif.12.dr, Beginning.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingg2.crt0
Source: QqHWdVqNBs.exe, 00000000.00000003.1335365565.000000000289B000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000C.00000003.1443080760.00000000033E7000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 0000000C.00000002.2581379889.000000000407A000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, SecureHawk.pif.12.dr, Beginning.0.drString found in binary or memory: http://www.autoitscript.com/autoit3/0
Source: QqHWdVqNBs.exe, 00000000.00000003.1373917786.000000000289A000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmp, Origin.pif, 0000000C.00000003.1443080760.00000000033E7000.00000004.00000800.00020000.00000000.sdmp, SecureHawk.pif, 00000011.00000002.2579283031.0000000000558000.00000002.00000001.01000000.00000009.sdmp, Origin.pif.2.dr, Studios.0.dr, SecureHawk.pif.12.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
Source: QqHWdVqNBs.exe, 00000000.00000003.1335365565.000000000289B000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000C.00000003.1443080760.00000000033E7000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 0000000C.00000002.2581379889.000000000407A000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, SecureHawk.pif.12.dr, Beginning.0.drString found in binary or memory: https://www.globalsign.com/repository/0
Source: QqHWdVqNBs.exe, 00000000.00000003.1335365565.000000000289B000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000C.00000003.1443080760.00000000033E7000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 0000000C.00000002.2581379889.000000000407A000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, SecureHawk.pif.12.dr, Beginning.0.drString found in binary or memory: https://www.globalsign.com/repository/03
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeCode function: 0_2_004050CD GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004050CD
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C44614 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,12_2_00C44614
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00504614 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,17_2_00504614
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C44416 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,12_2_00C44416
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C5CEDF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,12_2_00C5CEDF
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0051CEDF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,17_2_0051CEDF

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeFile created: C:\Users\user\AppData\Local\Temp\Fighting entropy: 7.99892313786Jump to dropped file
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeFile created: C:\Users\user\AppData\Local\Temp\June entropy: 7.99829631291Jump to dropped file
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeFile created: C:\Users\user\AppData\Local\Temp\Massachusetts entropy: 7.99846554018Jump to dropped file
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeFile created: C:\Users\user\AppData\Local\Temp\Radius entropy: 7.99902505433Jump to dropped file
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeFile created: C:\Users\user\AppData\Local\Temp\Stockings entropy: 7.99820786051Jump to dropped file
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeFile created: C:\Users\user\AppData\Local\Temp\Bdsm entropy: 7.99861815368Jump to dropped file
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeFile created: C:\Users\user\AppData\Local\Temp\Vendor entropy: 7.99556101212Jump to dropped file
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeFile created: C:\Users\user\AppData\Local\Temp\Convenience entropy: 7.99573659303Jump to dropped file
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeFile created: C:\Users\user\AppData\Local\Temp\Joke entropy: 7.99883402213Jump to dropped file
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeFile created: C:\Users\user\AppData\Local\Temp\Severe entropy: 7.99824795157Jump to dropped file
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeFile created: C:\Users\user\AppData\Local\Temp\Falls entropy: 7.99917331785Jump to dropped file
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeFile created: C:\Users\user\AppData\Local\Temp\Sig entropy: 7.9984885368Jump to dropped file
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeFile created: C:\Users\user\AppData\Local\Temp\Outreach entropy: 7.99921983985Jump to dropped file
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeFile created: C:\Users\user\AppData\Local\Temp\Dental entropy: 7.99901607447Jump to dropped file
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeFile created: C:\Users\user\AppData\Local\Temp\Mask entropy: 7.99382891469Jump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\369580\Z entropy: 7.99991695551Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifFile created: C:\Users\user\AppData\Local\LinkGuard Dynamics\r entropy: 7.99991695551Jump to dropped file

System Summary

barindex
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js"
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C340C1: CreateFileW,DeviceIoControl,CloseHandle,12_2_00C340C1
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C28D11 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,12_2_00C28D11
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeCode function: 0_2_00403883 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,CoUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,0_2_00403883
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C355E5 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,12_2_00C355E5
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004F55E5 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,17_2_004F55E5
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeCode function: 0_2_0040497C0_2_0040497C
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeCode function: 0_2_00406ED20_2_00406ED2
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeCode function: 0_2_004074BB0_2_004074BB
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BDB02012_2_00BDB020
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BD94E012_2_00BD94E0
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BD9C8012_2_00BD9C80
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C581C812_2_00C581C8
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BF232512_2_00BF2325
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C0643212_2_00C06432
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C0258E12_2_00C0258E
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BDE6F012_2_00BDE6F0
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BF275A12_2_00BF275A
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C088EF12_2_00C088EF
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C5080212_2_00C50802
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C069A412_2_00C069A4
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C2EB9512_2_00C2EB95
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BE0BE012_2_00BE0BE0
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BFCC8112_2_00BFCC81
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C38CB112_2_00C38CB1
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C50C7F12_2_00C50C7F
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C06F1612_2_00C06F16
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BF32E912_2_00BF32E9
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BFF33912_2_00BFF339
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BED45712_2_00BED457
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BF15E412_2_00BF15E4
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BEF57E12_2_00BEF57E
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BDF6A012_2_00BDF6A0
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BD166312_2_00BD1663
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BF77F312_2_00BF77F3
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BF1AD812_2_00BF1AD8
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BFDAD512_2_00BFDAD5
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C09C1512_2_00C09C15
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BEDD1412_2_00BEDD14
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BF1EF012_2_00BF1EF0
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BFBF0612_2_00BFBF06
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0049B02017_2_0049B020
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004994E017_2_004994E0
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00499C8017_2_00499C80
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_005181C817_2_005181C8
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004B232517_2_004B2325
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004C643217_2_004C6432
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004C258E17_2_004C258E
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0049E6F017_2_0049E6F0
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004B275A17_2_004B275A
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0051080217_2_00510802
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004C88EF17_2_004C88EF
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004C69A417_2_004C69A4
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004A0BE017_2_004A0BE0
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004EEB9517_2_004EEB95
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00510C7F17_2_00510C7F
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004BCC8117_2_004BCC81
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004F8CB117_2_004F8CB1
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004C6F1617_2_004C6F16
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004B32E917_2_004B32E9
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004BF33917_2_004BF339
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004AD45717_2_004AD457
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004AF57E17_2_004AF57E
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004B15E417_2_004B15E4
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0049166317_2_00491663
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0049F6A017_2_0049F6A0
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004B77F317_2_004B77F3
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004B1AD817_2_004B1AD8
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004BDAD517_2_004BDAD5
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004C9C1517_2_004C9C15
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004ADD1417_2_004ADD14
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004B1EF017_2_004B1EF0
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004BBF0617_2_004BBF06
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif 8498900E57A490404E7EC4D8159BEE29AED5852AE88BD484141780EAADB727BB
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\369580\Origin.pif 8498900E57A490404E7EC4D8159BEE29AED5852AE88BD484141780EAADB727BB
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeCode function: String function: 004062A3 appears 57 times
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: String function: 00BF8A60 appears 42 times
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: String function: 00BE1A36 appears 34 times
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: String function: 00BF0C42 appears 70 times
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: String function: 004A1A36 appears 34 times
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: String function: 004B0C42 appears 70 times
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: String function: 004B8A60 appears 42 times
Source: QqHWdVqNBs.exe, 00000000.00000003.1373917786.000000000289A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAutoIt3.exeB vs QqHWdVqNBs.exe
Source: QqHWdVqNBs.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: QqHWdVqNBs.exeStatic PE information: Section: .reloc ZLIB complexity 1.002685546875
Source: classification engineClassification label: mal92.rans.evad.winEXE@28/53@2/0
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C3A51A GetLastError,FormatMessageW,12_2_00C3A51A
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C28BCC AdjustTokenPrivileges,CloseHandle,12_2_00C28BCC
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C2917C LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,12_2_00C2917C
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004E8BCC AdjustTokenPrivileges,CloseHandle,17_2_004E8BCC
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004E917C LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,17_2_004E917C
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C33FB5 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,12_2_00C33FB5
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeCode function: 0_2_004024FB CoCreateInstance,0_2_004024FB
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C342AA __swprintf,__swprintf,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,12_2_00C342AA
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifFile created: C:\Users\user\AppData\Local\LinkGuard DynamicsJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7780:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7464:120:WilError_03
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeFile created: C:\Users\user~1\AppData\Local\Temp\nslA787.tmpJump to behavior
Source: QqHWdVqNBs.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: QqHWdVqNBs.exeReversingLabs: Detection: 31%
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeFile read: C:\Users\user\Desktop\QqHWdVqNBs.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\QqHWdVqNBs.exe "C:\Users\user\Desktop\QqHWdVqNBs.exe"
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exit
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 369580
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "MaskBathroomsCompoundInjection" Participants
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Massachusetts + Radius + Dental + Vendor + Fighting + June + Stockings + Convenience + Falls + Joke + Mask + Severe + Outreach + Sig + Bdsm 369580\Z
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\369580\Origin.pif 369580\Origin.pif 369580\Z
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 15
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif" "C:\Users\user\AppData\Local\LinkGuard Dynamics\r"
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exitJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 369580Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "MaskBathroomsCompoundInjection" Participants Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Massachusetts + Radius + Dental + Vendor + Fighting + June + Stockings + Convenience + Falls + Joke + Mask + Severe + Outreach + Sig + Bdsm 369580\ZJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\369580\Origin.pif 369580\Origin.pif 369580\ZJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 15Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHESTJump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif" "C:\Users\user\AppData\Local\LinkGuard Dynamics\r"Jump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
Source: QqHWdVqNBs.exeStatic file information: File size 17074946 > 1048576
Source: QqHWdVqNBs.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BF8AA5 push ecx; ret 12_2_00BF8AB8
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004B8AA5 push ecx; ret 17_2_004B8AB8

Persistence and Installation Behavior

barindex
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\369580\Origin.pifJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifFile created: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\369580\Origin.pifJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifFile created: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C5577B IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,12_2_00C5577B
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BE5EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,12_2_00BE5EDA
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_0051577B IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,17_2_0051577B
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004A5EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,17_2_004A5EDA
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BF32E9 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,12_2_00BF32E9
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeStalling execution: Execution stalls by calling Sleepgraph_0-3897
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifAPI coverage: 4.9 %
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifAPI coverage: 4.8 %
Source: C:\Windows\SysWOW64\timeout.exe TID: 7732Thread sleep count: 98 > 30Jump to behavior
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif TID: 7904Thread sleep count: 40 > 30Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C347B7 GetFileAttributesW,FindFirstFileW,FindClose,12_2_00C347B7
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C33B4F FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,12_2_00C33B4F
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C33E72 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,12_2_00C33E72
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C3C16C FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,12_2_00C3C16C
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C3CB81 FindFirstFileW,FindClose,12_2_00C3CB81
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C3CC0C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,12_2_00C3CC0C
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C3F445 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,12_2_00C3F445
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C3F5A2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,12_2_00C3F5A2
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C3F8A3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,12_2_00C3F8A3
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004F47B7 GetFileAttributesW,FindFirstFileW,FindClose,17_2_004F47B7
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004F3E72 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,17_2_004F3E72
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004FC16C FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,17_2_004FC16C
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004FCB81 FindFirstFileW,FindClose,17_2_004FCB81
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004FCC0C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,17_2_004FCC0C
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004FF445 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,17_2_004FF445
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004FF5A2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,17_2_004FF5A2
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004FF8A3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,17_2_004FF8A3
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004F3B4F FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,17_2_004F3B4F
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BE5D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,12_2_00BE5D13
Source: Origin.pif, 0000000C.00000002.2581379889.000000000407A000.00000004.00000020.00020000.00000000.sdmp, SecureHawk.pif, 00000011.00000002.2581102182.000000000409E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifAPI call chain: ExitProcess graph end node
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C443B9 BlockInput,12_2_00C443B9
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BE5240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,12_2_00BE5240
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C05BDC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,12_2_00C05BDC
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C286B0 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,12_2_00C286B0
Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BFA2B5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,12_2_00BFA2B5
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BFA284 SetUnhandledExceptionFilter,12_2_00BFA284
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004BA284 SetUnhandledExceptionFilter,17_2_004BA284
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_004BA2B5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,17_2_004BA2B5
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C2914C LogonUserW,12_2_00C2914C
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BE5240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,12_2_00BE5240
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C31932 SendInput,keybd_event,12_2_00C31932
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C350A7 mouse_event,12_2_00C350A7
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exitJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 369580Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "MaskBathroomsCompoundInjection" Participants Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Massachusetts + Radius + Dental + Vendor + Fighting + June + Stockings + Convenience + Falls + Joke + Mask + Severe + Outreach + Sig + Bdsm 369580\ZJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\369580\Origin.pif 369580\Origin.pif 369580\ZJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 15Jump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif" "C:\Users\user\AppData\Local\LinkGuard Dynamics\r"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C286B0 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,12_2_00C286B0
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C34D89 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,12_2_00C34D89
Source: Origin.pif, 0000000C.00000003.1443080760.00000000033D9000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 0000000C.00000000.1419131711.0000000000C85000.00000002.00000001.01000000.00000006.sdmp, SecureHawk.pif, 00000011.00000000.1472574751.0000000000545000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: Origin.pif, SecureHawk.pifBinary or memory string: Shell_TrayWnd
Source: QqHWdVqNBs.exe, 00000000.00000003.1373917786.0000000002891000.00000004.00000020.00020000.00000000.sdmp, Studios.0.drBinary or memory string: u3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00BF878B cpuid 12_2_00BF878B
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C3E0CA GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,12_2_00C3E0CA
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C10652 GetUserNameW,12_2_00C10652
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C0409A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,12_2_00C0409A
Source: C:\Users\user\Desktop\QqHWdVqNBs.exeCode function: 0_2_00406805 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406805
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: SecureHawk.pifBinary or memory string: WIN_81
Source: SecureHawk.pifBinary or memory string: WIN_XP
Source: SecureHawk.pifBinary or memory string: WIN_XPe
Source: SecureHawk.pif.12.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 2USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyteP
Source: SecureHawk.pifBinary or memory string: WIN_VISTA
Source: SecureHawk.pifBinary or memory string: WIN_7
Source: SecureHawk.pifBinary or memory string: WIN_8
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C46733 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,12_2_00C46733
Source: C:\Users\user\AppData\Local\Temp\369580\Origin.pifCode function: 12_2_00C46BF7 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,12_2_00C46BF7
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00506733 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,17_2_00506733
Source: C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pifCode function: 17_2_00506BF7 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,17_2_00506BF7
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information11
Scripting
2
Valid Accounts
1
Windows Management Instrumentation
11
Scripting
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
21
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts2
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol21
Input Capture
1
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Scheduled Task/Job
2
Valid Accounts
2
Valid Accounts
2
Obfuscated Files or Information
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin Shares3
Clipboard Data
1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCron1
Scheduled Task/Job
21
Access Token Manipulation
1
Software Packing
NTDS17
System Information Discovery
Distributed Component Object ModelInput Capture1
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
Process Injection
1
DLL Side-Loading
LSA Secrets31
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
Scheduled Task/Job
11
Masquerading
Cached Domain Credentials1
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
Valid Accounts
DCSync4
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Virtualization/Sandbox Evasion
Proc Filesystem1
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
Access Token Manipulation
/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron12
Process Injection
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1520445 Sample: QqHWdVqNBs.exe Startdate: 27/09/2024 Architecture: WINDOWS Score: 92 54 jZFqZYoOtpryMyRHD.jZFqZYoOtpryMyRHD 2->54 60 Multi AV Scanner detection for submitted file 2->60 62 Sigma detected: Search for Antivirus process 2->62 64 Sigma detected: Suspicious Command Patterns In Scheduled Task Creation 2->64 66 3 other signatures 2->66 10 QqHWdVqNBs.exe 95 2->10         started        14 wscript.exe 1 2->14         started        signatures3 process4 file5 46 C:\Users\user\AppData\Local\Temp\Vendor, data 10->46 dropped 48 C:\Users\user\AppData\Local\Temp\Stockings, data 10->48 dropped 50 C:\Users\user\AppData\Local\Temp\Sig, data 10->50 dropped 52 14 other files (13 malicious) 10->52 dropped 74 Found stalling execution ending in API Sleep call 10->74 76 Writes many files with high entropy 10->76 16 cmd.exe 3 10->16         started        78 Windows Scripting host queries suspicious COM object (likely to drop second stage) 14->78 20 SecureHawk.pif 14->20         started        signatures6 process7 file8 36 C:\Users\user\AppData\Local\...\Origin.pif, PE32 16->36 dropped 56 Drops PE files with a suspicious file extension 16->56 58 Writes many files with high entropy 16->58 22 Origin.pif 4 16->22         started        26 cmd.exe 2 16->26         started        28 conhost.exe 16->28         started        30 7 other processes 16->30 signatures9 process10 file11 38 C:\Users\user\AppData\...\SecureHawk.pif, PE32 22->38 dropped 40 C:\Users\user\AppData\Local\...\r, data 22->40 dropped 42 C:\Users\user\AppData\Local\...\SecureHawk.js, ASCII 22->42 dropped 68 Drops PE files with a suspicious file extension 22->68 70 Uses schtasks.exe or at.exe to add and modify task schedules 22->70 72 Writes many files with high entropy 22->72 32 schtasks.exe 1 22->32         started        44 C:\Users\user\AppData\Local\Temp\369580\Z, data 26->44 dropped signatures12 process13 process14 34 conhost.exe 32->34         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
QqHWdVqNBs.exe32%ReversingLabsWin32.Trojan.Generic
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif0%ReversingLabs
C:\Users\user\AppData\Local\Temp\369580\Origin.pif0%ReversingLabs
C:\Users\user\AppData\Local\Temp\Beginning0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
jZFqZYoOtpryMyRHD.jZFqZYoOtpryMyRHD
unknown
unknowntrue
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.autoitscript.com/autoit3/JQqHWdVqNBs.exe, 00000000.00000003.1373917786.000000000289A000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmp, Origin.pif, 0000000C.00000003.1443080760.00000000033E7000.00000004.00000800.00020000.00000000.sdmp, SecureHawk.pif, 00000011.00000002.2579283031.0000000000558000.00000002.00000001.01000000.00000009.sdmp, Origin.pif.2.dr, Studios.0.dr, SecureHawk.pif.12.drfalse
      unknown
      http://nsis.sf.net/NSIS_ErrorErrorQqHWdVqNBs.exefalse
      • URL Reputation: safe
      unknown
      http://www.autoitscript.com/autoit3/0QqHWdVqNBs.exe, 00000000.00000003.1335365565.000000000289B000.00000004.00000020.00020000.00000000.sdmp, Origin.pif, 0000000C.00000003.1443080760.00000000033E7000.00000004.00000800.00020000.00000000.sdmp, Origin.pif, 0000000C.00000002.2581379889.000000000407A000.00000004.00000020.00020000.00000000.sdmp, Origin.pif.2.dr, SecureHawk.pif.12.dr, Beginning.0.drfalse
        unknown
        No contacted IP infos
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1520445
        Start date and time:2024-09-27 11:12:32 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 7m 46s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:21
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:QqHWdVqNBs.exe
        renamed because original name is a hash value
        Original Sample Name:45658cfd5c86375a3f47d821c8c8bfc7.exe
        Detection:MAL
        Classification:mal92.rans.evad.winEXE@28/53@2/0
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 97
        • Number of non-executed functions: 298
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
        • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size exceeded maximum capacity and may have missing behavior information.
        • Report size exceeded maximum capacity and may have missing disassembly code.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtSetInformationFile calls found.
        • VT rate limit hit for: QqHWdVqNBs.exe
        TimeTypeDescription
        05:13:38API Interceptor1x Sleep call for process: QqHWdVqNBs.exe modified
        05:14:26API Interceptor2607x Sleep call for process: Origin.pif modified
        05:14:36API Interceptor990x Sleep call for process: SecureHawk.pif modified
        11:13:46Task SchedulerRun new task: SecureHawk path: wscript s>//B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js"
        No context
        No context
        No context
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Users\user\AppData\Local\Temp\369580\Origin.pif5daucomrx8.exeGet hashmaliciousRisePro StealerBrowse
          be5bb7f05c4f8de4d393134b63af2e6bf8a05e3ad3fb3.exeGet hashmaliciousRedLineBrowse
            be5bb7f05c4f8de4d393134b63af2e6bf8a05e3ad3fb3.exeGet hashmaliciousRedLineBrowse
              7632e569071acc40bce87af592e4cc2476d9c088906a1.exeGet hashmaliciousRedLineBrowse
                setup.exeGet hashmaliciousUnknownBrowse
                  setup.exeGet hashmaliciousUnknownBrowse
                    SecuriteInfo.com.Trojan.Siggen29.2381.17841.24795.exeGet hashmaliciousRedLineBrowse
                      Autodesk AutoCAD 2023.exeGet hashmaliciousVidarBrowse
                        oRALyHjeXB.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                          oRALyHjeXB.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                            C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif5daucomrx8.exeGet hashmaliciousRisePro StealerBrowse
                              be5bb7f05c4f8de4d393134b63af2e6bf8a05e3ad3fb3.exeGet hashmaliciousRedLineBrowse
                                be5bb7f05c4f8de4d393134b63af2e6bf8a05e3ad3fb3.exeGet hashmaliciousRedLineBrowse
                                  7632e569071acc40bce87af592e4cc2476d9c088906a1.exeGet hashmaliciousRedLineBrowse
                                    setup.exeGet hashmaliciousUnknownBrowse
                                      setup.exeGet hashmaliciousUnknownBrowse
                                        SecuriteInfo.com.Trojan.Siggen29.2381.17841.24795.exeGet hashmaliciousRedLineBrowse
                                          Autodesk AutoCAD 2023.exeGet hashmaliciousVidarBrowse
                                            oRALyHjeXB.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                                              oRALyHjeXB.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                                                Process:C:\Users\user\AppData\Local\Temp\369580\Origin.pif
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):188
                                                Entropy (8bit):4.841163940664851
                                                Encrypted:false
                                                SSDEEP:3:RiMIpGXJO9obdPHo55wWAX+d4a+kEkD5pM6iQEdcQ47c6Hc5uWAX+d4a+kEkD5p5:RiJuOybJHonwWD+vkD3Vi7L4A6HcwWDb
                                                MD5:F04512C216810D6E6D57DF679D16A4EB
                                                SHA1:FDEBC2A42CFD84710783EC1054DF14977028E273
                                                SHA-256:AD2D6B4FEA58057866439C8BEC60E91EAE779ED47D20FD55992D54540CC9BCFD
                                                SHA-512:767B37AE36E40A699D83E4FD9A67FB59ABFFE84DF033FBC1B75B4D8279E5BFEC8584E0ACF1F69F6682D95E41F6223EB1AC9735EC4693B4BFDDF36924B6BCF4A2
                                                Malicious:true
                                                Preview:new ActiveXObject("Wscript.Sh" + "ell").Exec("\"C:\\Users\\user\\AppData\\Local\\LinkGuard Dynamics\\SecureHawk.pif\" \"C:\\Users\\user\\AppData\\Local\\LinkGuard Dynamics\\r\"")
                                                Process:C:\Users\user\AppData\Local\Temp\369580\Origin.pif
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):937776
                                                Entropy (8bit):6.777413141364669
                                                Encrypted:false
                                                SSDEEP:12288:FJV3REMvnCG22lhtjVoAYxQl+u13a/sVyaVeK56ORMkkOlPlNKlga4Umff2lRO:F3hEW3hlVodGl+gUKrMkzXa4P6RO
                                                MD5:B06E67F9767E5023892D9698703AD098
                                                SHA1:ACC07666F4C1D4461D3E1C263CF6A194A8DD1544
                                                SHA-256:8498900E57A490404E7EC4D8159BEE29AED5852AE88BD484141780EAADB727BB
                                                SHA-512:7972C78ACEBDD86C57D879C12CB407120155A24A52FDA23DDB7D9E181DD59DAC1EB74F327817ADBC364D37C8DC704F8236F3539B4D3EE5A022814924A1616943
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Joe Sandbox View:
                                                • Filename: 5daucomrx8.exe, Detection: malicious, Browse
                                                • Filename: be5bb7f05c4f8de4d393134b63af2e6bf8a05e3ad3fb3.exe, Detection: malicious, Browse
                                                • Filename: be5bb7f05c4f8de4d393134b63af2e6bf8a05e3ad3fb3.exe, Detection: malicious, Browse
                                                • Filename: 7632e569071acc40bce87af592e4cc2476d9c088906a1.exe, Detection: malicious, Browse
                                                • Filename: setup.exe, Detection: malicious, Browse
                                                • Filename: setup.exe, Detection: malicious, Browse
                                                • Filename: SecuriteInfo.com.Trojan.Siggen29.2381.17841.24795.exe, Detection: malicious, Browse
                                                • Filename: Autodesk AutoCAD 2023.exe, Detection: malicious, Browse
                                                • Filename: oRALyHjeXB.exe, Detection: malicious, Browse
                                                • Filename: oRALyHjeXB.exe, Detection: malicious, Browse
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...y..U..........".................*.............@.................................w.....@...@.......@.....................L...|....................8..0....0...q...;..............................@X..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...............................@..@.reloc...q...0...r..................@..B................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\AppData\Local\Temp\369580\Origin.pif
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):1887862
                                                Entropy (8bit):7.999916955507098
                                                Encrypted:true
                                                SSDEEP:49152:eh1tn99JwLCa3od7rs8p0b4UC0OmHmEp7w21fKR3vBWu5Vo:Ktn9fA3od0+Dx0Z3j1yR75Vo
                                                MD5:CE540AF01EBE7AB061B8E799882D8031
                                                SHA1:67A6C762AA5E1CB1C3623561D2A3D6AD98F150AF
                                                SHA-256:15657816E7B9C8F5F8E3A73E2266186DDE03AFD3E680E20D6E14747446973684
                                                SHA-512:06F83915FEA36F523E99A56D5C71404AC4E4062AE690404A89262BE2D26968BDDC5A42AE091CDEC4CE568541B877E59DF71F92369566B228C3EDFE510A6BBC9F
                                                Malicious:true
                                                Preview:.p......C7...._9....8..5M...h..T..F..(..cd.:.#K85)]$."...r....4.j...<9...~..)qi.>...e..............O...D.H..?.....DS.&..l.H.....J.N.."...&l&.H.X.D.\....NJ...LS..^.M.1...%".~.|.Z.)T.t~...C.t.....H.....P...Rt..%.#..h....`B...................s..z.+...'..*.D.....m.............[..::...._....&..t....6..HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....R....C.<.'.F...h.............T......{T......{kC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E...`.[..r..}.!..,P..Myn.2..t.W.....L..f.P...T......{T......{m.....:c..8.5...x..2).U.j....2>.$#.~....E.....$h...}......H..l.{F...3G......`*w.r.3.*mq...K.R.......m%_^W...H.... .(.....6.F.|m#n...N:Ta.....<..)....... .^e.z...X b.^.....3g..+...4A...?.O.Q
                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:modified
                                                Size (bytes):937776
                                                Entropy (8bit):6.777413141364669
                                                Encrypted:false
                                                SSDEEP:12288:FJV3REMvnCG22lhtjVoAYxQl+u13a/sVyaVeK56ORMkkOlPlNKlga4Umff2lRO:F3hEW3hlVodGl+gUKrMkzXa4P6RO
                                                MD5:B06E67F9767E5023892D9698703AD098
                                                SHA1:ACC07666F4C1D4461D3E1C263CF6A194A8DD1544
                                                SHA-256:8498900E57A490404E7EC4D8159BEE29AED5852AE88BD484141780EAADB727BB
                                                SHA-512:7972C78ACEBDD86C57D879C12CB407120155A24A52FDA23DDB7D9E181DD59DAC1EB74F327817ADBC364D37C8DC704F8236F3539B4D3EE5A022814924A1616943
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Joe Sandbox View:
                                                • Filename: 5daucomrx8.exe, Detection: malicious, Browse
                                                • Filename: be5bb7f05c4f8de4d393134b63af2e6bf8a05e3ad3fb3.exe, Detection: malicious, Browse
                                                • Filename: be5bb7f05c4f8de4d393134b63af2e6bf8a05e3ad3fb3.exe, Detection: malicious, Browse
                                                • Filename: 7632e569071acc40bce87af592e4cc2476d9c088906a1.exe, Detection: malicious, Browse
                                                • Filename: setup.exe, Detection: malicious, Browse
                                                • Filename: setup.exe, Detection: malicious, Browse
                                                • Filename: SecuriteInfo.com.Trojan.Siggen29.2381.17841.24795.exe, Detection: malicious, Browse
                                                • Filename: Autodesk AutoCAD 2023.exe, Detection: malicious, Browse
                                                • Filename: oRALyHjeXB.exe, Detection: malicious, Browse
                                                • Filename: oRALyHjeXB.exe, Detection: malicious, Browse
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...y..U..........".................*.............@.................................w.....@...@.......@.....................L...|....................8..0....0...q...;..............................@X..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...............................@..@.reloc...q...0...r..................@..B................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):1887862
                                                Entropy (8bit):7.999916955507098
                                                Encrypted:true
                                                SSDEEP:49152:eh1tn99JwLCa3od7rs8p0b4UC0OmHmEp7w21fKR3vBWu5Vo:Ktn9fA3od0+Dx0Z3j1yR75Vo
                                                MD5:CE540AF01EBE7AB061B8E799882D8031
                                                SHA1:67A6C762AA5E1CB1C3623561D2A3D6AD98F150AF
                                                SHA-256:15657816E7B9C8F5F8E3A73E2266186DDE03AFD3E680E20D6E14747446973684
                                                SHA-512:06F83915FEA36F523E99A56D5C71404AC4E4062AE690404A89262BE2D26968BDDC5A42AE091CDEC4CE568541B877E59DF71F92369566B228C3EDFE510A6BBC9F
                                                Malicious:true
                                                Preview:.p......C7...._9....8..5M...h..T..F..(..cd.:.#K85)]$."...r....4.j...<9...~..)qi.>...e..............O...D.H..?.....DS.&..l.H.....J.N.."...&l&.H.X.D.\....NJ...LS..^.M.1...%".~.|.Z.)T.t~...C.t.....H.....P...Rt..%.#..h....`B...................s..z.+...'..*.D.....m.............[..::...._....&..t....6..HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....R....C.<.'.F...h.............T......{T......{kC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E...`.[..r..}.!..,P..Myn.2..t.W.....L..f.P...T......{T......{m.....:c..8.5...x..2).U.j....2>.$#.~....E.....$h...}......H..l.{F...3G......`*w.r.3.*mq...K.R.......m%_^W...H.... .(.....6.F.|m#n...N:Ta.....<..)....... .^e.z...X b.^.....3g..+...4A...?.O.Q
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):10240
                                                Entropy (8bit):6.347014053077155
                                                Encrypted:false
                                                SSDEEP:192:RULsNQ6UUrUM6M1spD4QoHfqwipOcS0BiPyI+mHV8Fmepp2JaDwb7H:RUIi6J89nOrHV8Eepte7H
                                                MD5:E7AB122EBABDAE8843EEDA7A57C7F29A
                                                SHA1:0083D949CE43F5B549F06395BA4658461CF2A345
                                                SHA-256:EE31F3476D9C7A824EF34A4E639E02F793436E5608483F43D5FBDD3FBCB22C04
                                                SHA-512:614EE05987918709B61718D25305970A5FFBED46B1C88802EF9416F98C9469B795D2A917D3873F331A07C9985565119FFAB80821FE4134C03DA197BFDBEE89C8
                                                Malicious:false
                                                Preview:.j....Yf9H..K....~......8.u.E...f9P........M.C..D..f9P..U........E........ .................-~..H...}..H...}..H..u}...U.H.E.........}...E..M..E..u.PF..6...E..M..U......A.j.Yf9H...{~...M.IN.}...M........M...6...M.....6...M.....,~..;...$~...E..8...,....E.E..u...|...PF.5..3........!..I....A.j.Yf9H....~...M....}.....].C.]......}...u.E..u..u..u.P.E.P.E.PV.......&........A.j.Yf9H....}...E.HN..|.....E.........|....:5....|......;5...E..x.;.......Wju.s}...8..."}...8........8....}...8..U...L....8!...|...8#........|...u.3..u..u..u.QPRS......x....M...4...M...4...M...4...M...4...M...4....|.....4...M...4...._^[..].....x|..H..,|...M.....E..U.j.[...........A.j.Yf9H....|...}........Wjt.|...A.j.Yf9H...k|...E.M......E..M......U.E..M.j.[....k.......c.......Y.....|...U.JN.}...U.ts.M...3...M.....3...U..x.;.......Wh......{...A.j.Yf9H....{...E.HN.}...E.t..M..|3...M....3...E...x.;.......Wjx.{...^..^...^..E....^..........@..GD.^.@.n.@.A.@...@...@...@...@.O.@.p.@.........U.......SVW
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):134774
                                                Entropy (8bit):7.998618153684933
                                                Encrypted:true
                                                SSDEEP:3072:kQuFArbnYPs0H3CV0ZZd1v8M1P+8rLpNCoqn:kQuFUbnBjVWhvP+8rDin
                                                MD5:C7E15E6E38E166594B2C9C2A60945065
                                                SHA1:B0F80F15FE6AE9AEDB5A9BBE0D3C01D8867E2FBC
                                                SHA-256:6AFE68081A9F723647DAC3276C79B46EA0577D4B3DEE7673438DB1D95989E95B
                                                SHA-512:917CE2DA529CC9FA1CA9A9C9AB0685016C1EB6BEDC658138DA076A0A4028B7B7BD915169E497F7C01AA2012A4175D2E71FC78A93950B64C57C5CC36F85279475
                                                Malicious:true
                                                Preview:-..q..K...^....%[..d..b..c..*J.....dy.Kj....m.h..Q.1..5......A.z..^../eR'.ps...f.....D`.h..0.."!{5......>.,..h.9;.SU.F.o.OV...tIa..)eOc..Yw.V....I.....#.6 ...u>..{.Hnqc.w..M`..|...... .5..`.x4..Nk.......C...mD...^*.J/.../p...~......+..O..2."..14....A;...|.r...<..`z..[..}....Kk!......M...q...9)........0O>x...~.....WfV...`...=...i.2.O......Y.W.w.&.....%.)Ju....(.5...f.k..x...iw......{...d...\..-.m.7....{._..o.*......*.......V.gy...S.0...o5y"-..h23:.s...XZs...n|Z.EV.k..0...m....\z......-.y.L...../.N?..Sq.B../....{..]....A.].V.%...]r... D...J..Q..:....h..=N2=.!.J...-..g.O2..x.F....@h.p.`..c...v.5.^.|:.3..(.=.e..o...B...u..H\.a.{8F.....0..5..4...#.-\x..Qe..q.L...m.......q...k.......4.r..q.j.....x...U..N.%...W..(.A5OM.t.EfEL.m<$NU."......52.W>H..b....t%2q.Ex.d.........QNe..Z\&..Q...XO..\.`.3E.....L.....*.w..];..L.g..W...B..[....W..X.P8....S.&>/..L..cV.3.M..>.w.W.....|..D...\....09....?2........^..g..#....NU/N.o..Lf@.3..`.......ah...."..?..:..
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:DOS executable (COM)
                                                Category:dropped
                                                Size (bytes):11884
                                                Entropy (8bit):7.30812932734099
                                                Encrypted:false
                                                SSDEEP:192:D1SXWsR2tlitnzx98QVQ/8tVkUTgBxe1HCjv4pdhhmGj7l0ieJ2Q:DopEitriaIKJ7775i
                                                MD5:0FBD02AFE1832C658A9087680614B367
                                                SHA1:C3C30D9184A9AFBA434FE35679AB2D268139CEF3
                                                SHA-256:D68E51F51EC32BBD131A65995DBC0387216B206DFAC652EC28A30D78D787ADA8
                                                SHA-512:AB0BD0B5249AB9BCBAA3D914488AE601F93EB10E45407EE2D4A01777884EBC14BF978147134640148A7BB9642965DF1F00A9F794A3CA73214DD4D51548E089C8
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Preview:.5.6>6g6.6.6.6.7C7N7t7.7.7.7.8a8q8.8.8.8!9I9q9.9.;.<.<.<"<&<*<.<2<6<:<><B<F<J<N<R<x<.<.<.<.<R=.=]>y>.>.>e?......p....1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.1.2.2"2(2D2.2.2.2.2.2.2.284.5g5.7.7.7.7.7.7.7.7.8.8.8.9W>j>t>.>.?!?V?.?....H....0.0.0.2.2.2.2.2.3.3W4.5c5.5.6.8.:.:.:.:2;.<U=.=.=.=.>/?^?.?.?......X...31.2y2.2L3j3.3.4,4.4'5f5l5.5[6.6'7J7s7.7.8.8.949u9.:z:.;`;.;F<}=.=.=3>X>.>.>c?.?....`...g0.0.0)1v1.1.2.2*212[2.2.2.2.2.2.3.3(393J3[3l3.3%4B4.4.4.4.4.5.5.6.6.6*7.8.8.8.8.9.;.;.>. ..(...h1.1.2.3&5.626A7v7.:X>.>.>.>.?.?.0......g0r0.0.0.0.1#3.3.3.3.3.4#4(4?5E5N5m5.5.5.5.5.6.6.6.6.6.9/:>:S:r:.:.:.:.:.:.;.;P;};.;.;.<@<t<.<.<.<.<.<.=/=f=.=.=.=v>.?...@..p...11.1v2{2.2.2.2.363@3h3.3.3.3.4#4c4.4.4.7+808\8v8.8.8.8'9W9.9.9.9&:Q:X;x;.;.;.=.=.=O>{>.>.>.>.>0?w?.?.?.?.P..L....0S1.1.2.3.3U3)4.4E7U7.7.7.7.7.8^8.8.9.9.:.<9<a<.<.</=m=u=.=.=.=.=4>.`......l0.0.0.1.1.1.1W3.3.5.5.5.556F6.6.6.6.6.6.7'7C7Q7_7u7.7.7.7.7.7*8D8W8t8.8.9$9f9.9.9.:!:.:.:.:.;B;];.;.;.;.;.<+<.<.<.<t=.=.=.=.>1>:>.>.?B?H?.?.?...p......<0`0z0.0
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):56320
                                                Entropy (8bit):6.785206989556843
                                                Encrypted:false
                                                SSDEEP:1536:/27MlRHq6EQU7uLQT6unj5ctpYuYtWGJG2kQi:e7MlRKecTF5c2p02kQi
                                                MD5:D4F1427F4E333A46E2B9399B3A386ACE
                                                SHA1:8ABBA4EC1B6DD2BAB5A6702BE3EB0FF3BE18EBFD
                                                SHA-256:21D0FF8C6969D0D4917B4536726EEF4406A3B41321AF3657A1AA3C31F74C79B4
                                                SHA-512:D561321878FE7C0440F0C9F54C0BEF073152A167EEDB8B536756A40F2AEA6B988BFACB6AA0E346E2D8C2A7324DDCD16BF70FF4E97FD255C7311527904EAB2D70
                                                Malicious:false
                                                Preview:...............t3.p...t,.........t..+................3.......}....5..K.V.O..Y.k.....p..............e..Y.....g..K.....itd..nt%..o..=..............y[.............M..............x.................. t.f................z.....@.....................u........................3........u...guV..........J;.~.........=....~7..]...W.k...............Y..t............................................G.............P...............P............VP.5<.K...8.I............t!.......u.......PV.5H.K...8.I...YY......gu...u.......PV.5D.K...8.I...YY.>-..(.........F....................j.....s......HH...........k...j'.........X..........|....Q.....0................^......3......... t...@t...G.....G.....@t..G........O.....@t.;...|.;.s........................u...........y.3.B................;.~......u........u..J..............t=.......RPWQ.....0................9~...............N.............E.+.F............t6..t..>0t-N........0.!..u..5..K.....I.8.t.@..u.+.....................@t5......t......-
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):8192
                                                Entropy (8bit):6.565667666829138
                                                Encrypted:false
                                                SSDEEP:192:Fsmnze84mcy29iFnyq7S6XgRZi3LdB1gPOf0WcKPVo1FNVvmQ23:FsmC84Ll9iRrNXxdB1gv4PSTNVvmQ8
                                                MD5:827E7D95831EA2B7AE99AFB191C98832
                                                SHA1:E0432635061534BC2B5C06A8B7D5D7EDAF983183
                                                SHA-256:BDD60D53935978F3ADF4DC5AEFAF8156360F0C680E387A91AF7C4E1FC8AFDD25
                                                SHA-512:23FFC2964E7F14F783BAC607A733D1015C1592A32121CD52CBFDD7A4F839234393B8CDF175EAC0E219F14AF0B1F2F5A1838F2889878BE9B91D3FCF6D4E8F4B96
                                                Malicious:false
                                                Preview:u.W....Y.p.S3.PPPPVWPP....I....t$;.}.V..S."...Y3.E.QQSPVWQQ....I..E.[_^..].SW3...PPj.SPh........I.....t-V3.j.Z.........Q....YW..Vj.Sj.h........I...^_[.U..E.Ht.Hu=.u..prL..u..u..$.=.rL..t$.}..t..u...rL..u..u..P.............2.]...U..Q.e...=.rL..t!.E...rL.P.u.........k.....t.......E..prL.P.u..Q..........]...U....S..M.V3.W.s..s..A..u..C...t....A..C..A..C..9.;........3..j Z.........3...........P...Y..t!.8...O.E.x......i..... Oy.E.3.....C.93~H..u..E..s...x....N......G..F..G..F..G.P.....G..M..F... .E.@.M..E.;.|._^..[..]...V..N........^........U..V..N......~'H.....o...j.X3.F.j.Z.........Q....Y....f.E..F.....f..3..f.H...^]...Vh.^F..q..6j Q.^...V.(...Y..^...U..M...u.3..%.E.V.u..;.}.....t.+........t.+...^]...U....SV..M.W.....u..u.....I....`...3.].9].u.3.G.........W.M.."...f9.t.W.M.G.....j;Yf9.u.....}..v..G.P.M......j;Yf9.t.....3.j Z...........3...........P....Y..t!.....K.E...x......... Ky.E.3...3..M....F..E.P.E..].P.E.].P.E..E.....P.E.P.E.PS._.......uF.E..}.
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):43008
                                                Entropy (8bit):5.316829091033339
                                                Encrypted:false
                                                SSDEEP:768:DI4kSmEusWjcdeDvFQC7VkrHpluuxdCvEHKKgI0:vusWjcdmQuklluhvEHKT
                                                MD5:5CBB6AC4AFB2BDF6988C7581A9E19D46
                                                SHA1:CE87849C6CAD83A7A145283F233BF02D72358BF3
                                                SHA-256:A3D48BCB65A8B7651FBAB2C36260E25487929495CCA8A9B98EF26AF3DE802517
                                                SHA-512:0F1435F9961DD7929016598F9B115210F609A263F4CDB6A08AC5BDAF9357DEBC9CD926F711BE03463AB250D6C0FB5BF6784A5017602645560875EDD98B89FF91
                                                Malicious:false
                                                Preview:.j.?=...Mpm........?c..+...?................Bp.VV..?........Q9V.%..?........]|.=3..?......?|.._P..?.%.....?..Zq\.? ,6....?.5DKB.?.@IK...?.Xf...?v......?..'....?+..3...?2...y..?g.../.p<.......?7C.....?.......................?........E.D;..?..........h7.r.?...=...?.(...r.?..EV.w.?......?.......?0.SM`..?...?3..?./..*2.?5.6Y.z.?......?..G.e.?.4.....?.%..KV.........?..r..H.?.................I,+...?..........U&X>.?..........i....?.c4...?.......?.......?..N..T.?..j8.6.?.f*"!..?~w."...?nJ.R...?1...7!.?|.GD.|.?.......?...*.a.?.}. ..<.......?.pA..?................ZM..$^.@........].>.=..@........Z..7.@.abK...?..Z...@...t...?..,....@.T..4s.?.a.g...@Xp.M...@.D.$_..@.n}in..@..).M..@......@P(.*.C.?. ...mz........@.E3.&..................fY.eY.!@..........,..d&@........#7.B.,@.......@=..U.&2@UUUUUU.@9.E4..7@.......@.}..=m=@.......@. 8..B@.[..[..@.u+E6.G@.......@.......?...............@.........................HO..3.........oX... ?..........%......#.Z..."S-...>Q..!.r.?.M%....;..
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):37888
                                                Entropy (8bit):7.9957365930290685
                                                Encrypted:true
                                                SSDEEP:768:qWPn6K+BXIxpEno35N+hHrpQcJ+nPnZVJSRMueLPwYtebtefV:oxBKEo35MHrJ2HJEeL4YteboV
                                                MD5:B0F0B5535514047C83C7B2FA25324DCC
                                                SHA1:A010BF77C2684BF4D567243A8A1DCBD0AC07A734
                                                SHA-256:5754A22B9CCA09B0E018139D55BC32FC3206E399D416DB20F7207AA9F5A38425
                                                SHA-512:14EEA51CDC1E07399A9A2D599CF6057362852EDA34D5D2DA82C84E66B37D324E6875A1A43C3B0F93077B9A76A6BAE05C77679CE2495EABCB50341ECDD3D0CB8A
                                                Malicious:true
                                                Preview:...l..W.7MaZ&.Wf%.].......I.F.....m.....j...>....6..x....~.dV......,`...hWGA..r..T.5.9.3.m.^Q..:.o.H..r.1...^..V.og.u9.{w.PL4;.Y........... H.+EM|.].H.o.Fv.V~8.PG.n"..Ng..d...!..Dc.C,%d.-....1.....'.i..?8..w..C:..G.X.I.....( .$...d.0...M..w2-+...`...U.x.)..-)..x...p...Z.....[.L.fU)..Tp./..7I.A.-./AH.r.+...J....M...."?D..6...l.M(.O......J...#|'ZN.>..&._1..?...J.......?..3..ss3.}...h.!...j..-~i.L.Q+l..};.K6.}G+...Q..of\.)......V...."...>^....t.JB..5v.J..,=..+......F.8%.b...s..X)W......1.O..X._ez.{../%a..\...u..RI@[ .....&......c...K.......f._(*K..pA..p.l!..~.#,d..a&EP;....B......F.7F.M....ix........)NL....8./Z......K&.......9.#(Yc.HG*..u...$I.w.B.N.H.!U.....eo..9.9.#8...t.t_.{.&v...8..L.......E../.....O......%t..Y'..4[.....D.......D.......#Q.`K~...&..[.3...UU9X.;6k........0.Z.EK.E.R-....$/..y.....k.5.\@..&.......p..g5).+.V.jy}z...+..O.D.H.d#...sQ....q.^...[w^.p.W.+...hX...c...j.}..2......z...s..4..y=G.r.......sG*0.R.Q........<....+.c.Q.
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):44032
                                                Entropy (8bit):7.9428180907324295
                                                Encrypted:false
                                                SSDEEP:768:qNcNngX+F+2tzjOrnhILBWdinOEgg+ys6kQ3+laXM77HLqno09q6R6gx+gXr:qNcpzjIqIinTglynkQ3+EX0eomqewg
                                                MD5:24DD5D66C756FA9137D34729169A7940
                                                SHA1:1E3446FEBCB5280185648C3B763B709A10D0A3CF
                                                SHA-256:564193BF3415F803065F54113098012C86B9904A7D09DAD7C004658858248C48
                                                SHA-512:12D6721155D381BEA89B03CC3446357195BF3863AEBD07A3C2C5863160449A7C0E8EB0588071064E3D80A665E9E3460266FC45EC0BF09136B51440CE524DD2C0
                                                Malicious:false
                                                Preview:.H$......K..bb.`&.!<t....|..6l.T.:.?.Z.......,p,...i.K......Zk..%...kx....78..wcvv.V.N.o..._.(B.#..{.........^.$u6..Y..o......F<...C. ......"f.h{.\.3)....c.FZ..x< ..k.m/M.:.)...Q..."(m4@e....r..F..lv..-..../..(.l5.....>.H......[.r%..Fl..4.O`I.K..l..L..F..r.*.q..b).3E.&..X$2I.&C........n......b.Y....i\..c.......">....#...../}.K.....j.D..2+...7-.v..Nv.X..M..""4.M.9r.[.n...p..?.coM.......A....\4.....hS. .~....]k...Y.m....Q.J..b../~.X5.b..n..g*...k..%~.H..B..c..q,.....".C......_`X..9..@..I.f..A....3.].m.a..>?......:.........P...PG..]..e....&.i.|.n..ah..7..4;..L./.....G..."...-.....<..2..v(&W..d....#Ph........BG)..a..:J!.....R..stH..B....T.........O=.....Q*..l4......v0D...Mt~*.{.H....|..:..;w...>.G..E..bj.(~...j.*d.Y...FFFL......Ix..~.....ih..P...Zi..(.....P..).x*w6...;m.K%d.Y.v.8..s.f..X........Cj...pp.C.:x..]Q.Z.(.p....._..7&..A.#<..0.0..:C...@..d...x.bkzI.,...@.......x..l.^.c||..v{.....j..'&&x.I.X.5).z....J...7U..........f$0J......L..xq..#.}..E3.
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):29696
                                                Entropy (8bit):6.542041223780247
                                                Encrypted:false
                                                SSDEEP:768:sgckS9cAXKOd+3Avgmy/bJCVKSb279sAOOWNu:s/tcATs3AS/4KS+9sAOa
                                                MD5:E599A7F1BA05A669849EE5C4D2657057
                                                SHA1:84176DEDF0F3886EB8AB41846A4FF5334CFF844D
                                                SHA-256:5224518DDE347FD8DB57CAA13D4B502859BCF911D40D90291A67B4E9942D59FD
                                                SHA-512:C25657D8F4389D76CE3974D869A26EB221F24A2E9C1AFAA1E44546C7053757D7D3B03976CBA9B2714E2D292BDCEBAFC5690E0662C0A1F4B018EDD49EC36C739F
                                                Malicious:false
                                                Preview:.......M......6...].j......E..F.j..E.....j..E.[S........E.SPW......j........Y.....y.........F....._^..[..].y..u....@..3..U..y..u....E......J..H..J..H..J..H......M.h..I.....E.]...U..VW...6...j..G......~.....Y..t....a.....3..E..7_.F.^]...U...8SVW.}...]...... ..u.2../.....@..t..G..8......}..t.......3...P................E...~..w....6........v.Ou.}.j..3......3YYj.XP..E........H..p..M...O...%....=......9...=......"...=..........=......,............E.PW..@.I.f.M.3....C......wS...,.F..$...F..E.PW..(.I..........M.V.u.V.....P........W..$.I.........]....E............@.........E......E.PW..(.I..........e...........}.j.....Y..t.. ..`...X...3..M.U.....@..f.M......t.W.u..E.f.M.P.&..........f..f.E.E..E.M.E.P.E.........E..}.@.E.;.|..J....E.PW..(.I.3.C....>....e......+....e...}.j..3...Y..t.. ..`...X...3..U.....@..f.E.E..E.E.E...P.p....E..G;.|.......E.PW..(.I.3.C.........e...........}.j.....Y..t.. ..`...X...3..M.j....Xf.E.E.....E.E...P.....G;.|..m.]...&....4....E.PW..(.I.3.
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:OpenPGP Public Key
                                                Category:dropped
                                                Size (bytes):203776
                                                Entropy (8bit):7.999016074472303
                                                Encrypted:true
                                                SSDEEP:6144:H6QNJ4nbgSiR+ZjmxwRd+gV3dBwc8f8Hno/MG:vJ4HiR+usdBwth/MG
                                                MD5:82A2EEC72B87B87BA9DD721BE71A6731
                                                SHA1:A36C87743A61C1496EE55AF68D0845961DBA1BE2
                                                SHA-256:5E9D5F9719BA700F9331886B257E5CE074DDF8B07BFD097183D990833AFB208D
                                                SHA-512:0F5E57AC362340EAFA7BB2A1A52C89537A2225A6902B0020ED96A4782B17EB82552AA8D636C973B0C53171DBB4C28AE5B743C03DC25C57B5EFD4A83BC80F1CF0
                                                Malicious:true
                                                Preview:...,.7b..[8{JHz././4...@. <[...2.6...l{.G......6Y2.b.<...V...UV...m..Q[.#?.U.|..j'..x.l"*T...P..Jb..Eq...)w..S[...W3..M......5.0^.......)..E......o.......U..h.aV......s.V......@&W=...Q...[...7.<.]...m...%W......k../.=.....)........4F...`..u.%P8bWnu..gTY..LJ$.<-..P...r..;...2.R..f....i..A..*.......r%.).].v[.9.u...UO....T~..$.....xC..O.>...<..wY;x~..I.{N.*ya..\..S..)]S.0%...h.`g,..[-.h3E3.^<..1.Kp.<....sNq..M..6...)..D./d....(..q44....$SP3*........S.Y.Cp.......m..A....Y...h.F....@..h.|../d.(W.....N...~.!7..0..y..5E..&...!........U....0..Qv..*..eT.|.(-.1 ...,..nTbN...M.x...=.%.q..{...}.A.[.F.....". ..6..m..(.@Ja.v....5f....l.S.,.2>....i.."..x..$..~.;.D@D.>ZW..F.?C.F5.......W.. .[..../.(..XM5.r.`=NJ..Y.D...I.0.Pd]o.k.2.F...Y..G/.'.4..(.8. .5.k?1U..T....*?Tr......'..Ii.R..T.5...z...T.....3.aF.o.i..PB... .+.]..xUd....T.8....^....K2..4..{...r..%..;=.+lV.)d.{.Xm.i.d...rc.;g..q..=.VI....BP.&zX...g.K..~.{....v$.qca.wPSH-.J......3.cj..i...0<......
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):43008
                                                Entropy (8bit):6.513834863558758
                                                Encrypted:false
                                                SSDEEP:768:c4ypQ9Fsqib9futLZzWaIxyKw7nxZL96Yk4iARefFilP4Bwh1QwTMvcVPDl:9yy9FskzWaIxOv/pAfkF/bIQJ
                                                MD5:0653D5B9F678E342AC539C35C588F8F8
                                                SHA1:164512131FF6E3985D44A01804A1FDDDCAF6BFD5
                                                SHA-256:D49CEB2DB490B316AA89C83CB694758604EFC348445B3F61ACDD5413780466CD
                                                SHA-512:28B34858973AC560B1FFFC8A0B928A25CD11CF19FE755A3F28F68EDD88C3FEF3C994AF6D5E2DC093D5EDDA1D2669F028086B9B4E94D0502946D8AC2F82EA8CB9
                                                Malicious:false
                                                Preview:...i..Q.F9.....I...i..R..j.Q..T.I...i...~8....i..WQ....I..u......i...u...gL...d......hL...i...u...gL..d......hL...j....hL..u........(..R.....hL...j..j.j.j.PWj...D.I..E...u..M.....j..M..E.Qj.PW....I....E..E.jP3.PPj.WP..D.I..E...u..M.j.P.E.P...PW....I..E..M..=<.I...t(Qj.h.....u.....I..~ .t..v ..E..F .M..E...t(Pj.h.....u.....I..~$.t..v$..E..F$.M..E..}.....Ui......#..Ji..j.j..u...X.I..ti....)..............Q.........j..j.^;......................i........j..D$........Ph..............I..D$...........b....Ct......H@..t........f;D$.t..PQ....I.9............Ct...................<.............:.u........t.V...h......:.v.........Ct............ug.......f..x[.......f..xOf;.~JH.D$8....f.......Kt.............D$L.D$8P............P.D$.h=.............I.F;.......1...........L$..t$.;.u.;.....t....D$..............;.~.IQV..........................ah........;.|,...Ct.......t........u.W...g..O;.}.|$..L$..T$.3................................7..<.I...@....g...w@....I...g.............g..9E....g..
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:ASCII text, with very long lines (1341), with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):17805
                                                Entropy (8bit):5.067129531655874
                                                Encrypted:false
                                                SSDEEP:384:c2HgCk/+61O1xLW6KCDR/1eKCRagtGbqadxfpYTk96afqirXNq:rd1xLW6L/IK1gqqad9p3Uafqyq
                                                MD5:E1B45CCFF8C4F9B3F37B9BE092E5FC81
                                                SHA1:69E30F418DAD45C89C119DB58E023F90952B3C12
                                                SHA-256:FB199496184C801EEA454E0534DEC3CE932573892155FD8DD79EFBD4AA734B4B
                                                SHA-512:C507BD87B190AE0CFCA5A9FBF6C7AEC464165F67DF2BEC5518D8EDF7F26A0014A4E642042EA7A2685DD4D22D5821BD749E8F7A817EF81CBF61C340D982323D2B
                                                Malicious:false
                                                Preview:Set Guide= ..bnBundle Device ..dFAiLithuania Movers Convergence Finances ..NpYNMustang Dice Luxembourg Tribe Saudi ..GzSelections Reader Merchants Worcester ..MzjMAf Australia Sheet Employees Communist Airport ..NXRDesigners Humans Schools Lazy Stronger ..HlHey Preserve Deaf Batman Film ..YEdFLlc Hugo Glory Remaining Injuries ..Set Salvador=a..UpCMany Surface Math Elegant Roster Jon Aj ..MwgExtra Spare ..XnrZFilms Espn Algorithm Silence ..eeDiffer ..fgActivists Pressed Costa Segment Headlines Confidential Brings Enabled ..PmCult Hell ..eqTComputed Boats Fashion Dave Spy Recruiting Designed Reality ..XgvYellow Egypt Exception Cell Licensing Choir Attorneys ..UigBPhillips Slow Oriental Hughes Aim ..cnRomania ..Set Point=i..ronFixes Sec Flexible Reputation Chuck Two Biology ..CRQEnhancing Vision Assistance Publicly Ending Babes Holocaust Blade Zinc ..wqgUPartners Powder Centre Bill Thumbs ..lPmSeal Laser ..BXmcLafayette Sculpture Shoot Occupational Reproductive Automotive ..MzJvFavors Jew
                                                Process:C:\Windows\SysWOW64\cmd.exe
                                                File Type:ASCII text, with very long lines (1341), with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):17805
                                                Entropy (8bit):5.067129531655874
                                                Encrypted:false
                                                SSDEEP:384:c2HgCk/+61O1xLW6KCDR/1eKCRagtGbqadxfpYTk96afqirXNq:rd1xLW6L/IK1gqqad9p3Uafqyq
                                                MD5:E1B45CCFF8C4F9B3F37B9BE092E5FC81
                                                SHA1:69E30F418DAD45C89C119DB58E023F90952B3C12
                                                SHA-256:FB199496184C801EEA454E0534DEC3CE932573892155FD8DD79EFBD4AA734B4B
                                                SHA-512:C507BD87B190AE0CFCA5A9FBF6C7AEC464165F67DF2BEC5518D8EDF7F26A0014A4E642042EA7A2685DD4D22D5821BD749E8F7A817EF81CBF61C340D982323D2B
                                                Malicious:false
                                                Preview:Set Guide= ..bnBundle Device ..dFAiLithuania Movers Convergence Finances ..NpYNMustang Dice Luxembourg Tribe Saudi ..GzSelections Reader Merchants Worcester ..MzjMAf Australia Sheet Employees Communist Airport ..NXRDesigners Humans Schools Lazy Stronger ..HlHey Preserve Deaf Batman Film ..YEdFLlc Hugo Glory Remaining Injuries ..Set Salvador=a..UpCMany Surface Math Elegant Roster Jon Aj ..MwgExtra Spare ..XnrZFilms Espn Algorithm Silence ..eeDiffer ..fgActivists Pressed Costa Segment Headlines Confidential Brings Enabled ..PmCult Hell ..eqTComputed Boats Fashion Dave Spy Recruiting Designed Reality ..XgvYellow Egypt Exception Cell Licensing Choir Attorneys ..UigBPhillips Slow Oriental Hughes Aim ..cnRomania ..Set Point=i..ronFixes Sec Flexible Reputation Chuck Two Biology ..CRQEnhancing Vision Assistance Publicly Ending Babes Holocaust Blade Zinc ..wqgUPartners Powder Centre Bill Thumbs ..lPmSeal Laser ..BXmcLafayette Sculpture Shoot Occupational Reproductive Automotive ..MzJvFavors Jew
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):198656
                                                Entropy (8bit):7.999173317848576
                                                Encrypted:true
                                                SSDEEP:6144:suCQ3s8VJwgcSoNfAXamj3rIKbawOjtFkmwTJ:s2s8V+lN03rI3Gx1
                                                MD5:84C31C7B0C8D4DF12F022A32DED12AA2
                                                SHA1:DC5CA7CBAB70171827B0E979CAB55388E5BF6442
                                                SHA-256:86EA718EECEA2F320F22AA87FE6F11D6DD582D70506F8D53F711324C38227DDB
                                                SHA-512:B82B3213BBB01EE4587CBB157B2A6974177560789710E6E59FCB652990C5C169D2FE0AF3053D971B6CBD0BB3812E64FFA1CF697F0556D5A4D6E69998ED0A902B
                                                Malicious:true
                                                Preview:.Z.Ai....H.b..W.BS.........Q h...>{.a[..J._ZZ{..W..-..(...S6.........'B.......,.s.L...'D.5.`...3.o.U.hl....|A0.<N\...@..R.>..3.b$....z.........[S.l....%.T.4.D...0.q{.5....o..'.vc.^7....`.f.....k...5A....2..)......Q....$..#;_.`.......8!.0.u|..99....\T....2.r=.i...$7...=.....b,...fSe..U.;F...~_Qg.<.....iT.......A....JC...`....eH.@]bh..Ms......=.x....Y...H".H......N..(..;&.PU...v...d<..Q....z`1oN(f(.&8..\.....=.y...hi;U._n..n.>.G..xa...(%.uY.(.f.....v..T.K..F&.6-.z{....n...k..0..N..ZtG .=.....}.$~...)...{./...u{.....a..._..h;p.4............f(r....;....He...r.&Q[.9........4h.,..;*....i../m.O&.J.t.G..j......y....EC...:......>\....8.O^..t....R.....g..}.1.../.g.H...V.....G...bH.\....of...2w....M|!.3....}..z..DQNq@..7.d~)=..DCb=.v.I....]K+.r....Th$...._.......}..!.GE'...o.NcNXcV7x...~.....g.+.I.....:.a....*?..~M..?...u.iY.W..$.......g..-.E5.......-..W.i..z}%|@..`wG.....A...$...zL..p.X5h-5.q..p`.U.L){......%...8...l..^F[....k.nZ}.X...n.n...'.!\
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):62464
                                                Entropy (8bit):6.704844761239483
                                                Encrypted:false
                                                SSDEEP:1536:PhrNCsGJh5yA05E22VelTXzSj9xb7XDh1RlyxcZqvinN8p:ZlAYrlTGj91DhrlyU8p
                                                MD5:E9616A6147473B1C11D5997AF70AA41D
                                                SHA1:26D9932473118C39D788C20DBCD4EDFFCB2E195D
                                                SHA-256:3AAD09EB2199702AC0845A37A25AEAE969CA90438C97D0556AAD8E1C2489093D
                                                SHA-512:C985B09EB8D0D0E9404E80F67A670409AE8F4B92F36F6A32F08A8189FC9E34FE7EA3A6AB2C53E47F6054CBACA330324C6A3951522CE98E768F055D13FEC0D3E8
                                                Malicious:false
                                                Preview:.........$...FD.......$....&..;~|...&...~.....&...~.....%....F4;....%...Fh.............s.....%......o....U.;U....$...N|;........E...uT.V...t.j..F.PQ..............S$...,.V....+.;.w f..f;F4u......3$..f.G.f;F6..%$...E.U....................$...D..............;~|.......~.........~..........F4;........Fh........................w4t......t....A.......#...2;~|..]...f.?...S.......K.........t............g#...~l...]#...%.........w<..J#........w...<#.......3#.... ..*#................#........._ ..w/...#..... ........... ....."..../ .....".........0....."............w<............w...}........t..... ..."...f............"...U....._ ..w/..G...... ....n"..... ..../...../ ....V"..........0....E".............w...2"................ ".........( ..........) .....".............w........A.......!..................!...................FD.......!...}.........!...FD.......!...b......wZ.FD.......!...K........r!...FD......e!...0......w(.FD......N!............@!...FD......3!...E.B@.U.P.u....V.u..u..y........
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):29696
                                                Entropy (8bit):6.429381666176089
                                                Encrypted:false
                                                SSDEEP:768:JFR97T98+sDkXLAlMoLVNIo8DJWxWWbP75qcD:JFTR7bAlHL/4aj5VD
                                                MD5:35D5F58D663AF5854AF8B15634FADFCF
                                                SHA1:0D918B8ECA29301C4CD8BE1764F96BF779D6622D
                                                SHA-256:B87A61A0D630FA8EE70C61BA1E4F38A8ED4EE4B592BC900E826EB5CDB9CA64DD
                                                SHA-512:0184DD2AEE63324BEE5FF0FBAA4123382B6DE48F88E3E8A7FC63E59066A3D4C4650E68400994D046DB1FD1F691F51212616E7DF4AC51A704F15050B174A6490E
                                                Malicious:true
                                                Preview:_....F|.U.+...;...S...........f..Of.........].U.f;...................S..U....E.;F........N..U....E.D...E.F.+E......E.......E.......E.E.+Fx.......I.........K....E..M.@P.u....V.u....@dJ..u...C................m..... .............6....._^[..]._^3.[..].O.........i...........,dJ.... dJ..E..U.}..u..E.......;....}.]..............t.......M..........}.;U........................E...@..P.u.V.u..u..........}.........}.................d$..U.;U...2....N|;...~....}..u(.V.....-....u.F.PQ..................U.........%....=......1....E.....F.................E.B@.U.P.u....V.u..u.............~....^.....b............\.A..$.T.A..B.....]..........U..E........ dJ..M....,dJ..E..M..................E........$.....E.......M.;F|...........%....=.....................................M..........}.........E...}.@P.u...V.u..u.........................$........C.f.<Cw..Ct.]..I....E.....M.@P.u...V.u..u.............>....-i.........M..E......E.E.@P.u....V.u....@dJ..u...C.......... ............
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:modified
                                                Size (bytes):147456
                                                Entropy (8bit):7.998923137857825
                                                Encrypted:true
                                                SSDEEP:3072:HlYKLVe9n25kVLIV1GWWKnqX+xhURTwcXCIDv4D7vZsSx4EDpbdE6:HlYgUVIV1GhoEoKFwcSIDve7RsSCEDpB
                                                MD5:6876D6C44BAD4FBFC21325B46B63484C
                                                SHA1:9A37D6D6D4E7178A6FD840DB172184BDFF67B15F
                                                SHA-256:3A97464DF93B328E7F78CD32C3734B67B41F3808B8C645846EEFC30CCCADDB7E
                                                SHA-512:10D4634A6226320C85A5519C798258B6F0A27646817309549C624FFD44F82BE04413F8BC87E6935272852FA8EA695FE92668B59A7E223259525259A0393D4E51
                                                Malicious:true
                                                Preview:..F... ..$z2!...sU.![..Z...0.@R...}<..1...1..Z|.fI.%...-.>...+.."N.d.=.(\.8\E.@.*.\R"+S..g!.g.../.l4...],..e_...Vb...B.7T.e9@*%.E....w+?0$v#D..$...1..#...h4P.x+....c..C.MI.....>.........E]..b...S.......M...M..h]......"..6:....7=.Kq.*.E/w<..f9 GS..[/.uC.e....N&..A.4.:......r....a..-.wvv....s.._.....k..v.].7Z.@Z.S.:.I+..f4K......(.e=.7.....5..|O@.^....z)...A.pS..-....x..Ne.1...w...1.'N...5.&....pf^3[.....\.c..o.....D..(..P..o.4..o...-q..~{...V0.{.xW..e..M..a......yrf.....w.r......i.......9X.3.E...g<y..%..S.`....h...Y_.....3...t1...\.cf.O..J.`...y..#.Q..wJ.~`.40a.D{Q...=*Q..f%......&...._.k...?.a?.W....J..g..vDx..l......%.R.C*..... .N1.{..c.G....].c..<..[.+_..Nib&....e~1.\~.RN......%.......t.y....N.. . .....H.-t?.(MgnW9.A......S......g...L........~Rq....6..]...s. .iB.?.`%......#?...5.Ah@.$...}..m.r3...Gm.f2;f..1...._.6)....d. ..~..em.;..r.....o....U..5.R..M."u...I....B5d..u........\."..s..... ....w...7....z.*.'.S+...p;A9.&..Bt...9U..v.l]Wo.a.X.S
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):5120
                                                Entropy (8bit):6.193659885817098
                                                Encrypted:false
                                                SSDEEP:96:Y63b/WPJonc1yGu8B3E8CoCMS2d/Xcyetj3sTSo59X5OqsW:N3LWMch9B0ze/syedEXAqH
                                                MD5:D41AD902B6AEEABC9DF8D5EB457D56FF
                                                SHA1:E65E181C4957CC6536AF3918CFAB9C4790DD9DB9
                                                SHA-256:DA4B25CB663E611C0F10233467FD9BF43A528CACE938DF16C04D4DDECB19F916
                                                SHA-512:08596C48EF2253D0A1E81A2EAD4D575CAA6B1A76570BA733FB88AEF0768BC9F6120CB25047C68CCA431A05457C78FE8EF58FF75BE49EF28BB54392687E1D2A9B
                                                Malicious:false
                                                Preview:^3.[..]...U..SV.u.WV....}..3..CS.|......Um...F..p....8\........j..v..5.......Cm.._^3.[]...U..Q...SVW.13.N.M.x@..>.+....S..o...0.u..`E..YY..x.~..{..M.;.~.;....._^[..]....s.......U..VW.....O..@........u........F.P.`...F.P........*...F(.............F,.......v0.S....F4..,..........F8P.*..........FH..<....FL..@....FP..H...t..FT........Q........<..._^]...U...8VWjX.......Y.......................N.........P.._........P.N..(*.........N8.F(.......F,.........F0.......F4..,...P..)....<....M.FH..@....FL..H....FP.......FT."...P...O..@....q....M...Z...M...Z.._..^..].3..J...U..QS3.V.u....P.H....<....t.I...dL..@...f9X.u..8!t...t.^3.[Y].......U...hSVW.M.....3..E..I..E.M..E....E.E.E.E..}...H.E..}....]..u.jHY.S....E..........@.f;........E.@....E..f.....j.......f.x.3...j...0.M..(...E.3...t".u.....U..Q....u.G;.r.u..]..E.;....j...E.P.M..xX.......S....f.x.AuH.}..uB.A.3.........@.f..G..G...jH[f;.]...0...f;E.......f;E...*....G...}...........E..@.E.....@.f;E.......AjH_.....f9x..}..
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):64512
                                                Entropy (8bit):6.549624693115074
                                                Encrypted:false
                                                SSDEEP:1536:TkdIlDbKffUCJ5h3FsoejQ1/9klkp5VLGW:TkuVKfPf3qoT1/Qkp5IW
                                                MD5:A353180038BC0C56585D8B18BCD2D039
                                                SHA1:0DCDF81CB067BACFF96E58423198B9D53A68AC4D
                                                SHA-256:3BC8119C6931103ABD71E920A57AB160331201005BD379236240C499E6811D1E
                                                SHA-512:E036630A140587DF95FCD97A654D3C4E68A6316C5457DD1342170409AC41DFC26E6EB9614A2E3192669E6BF9A50A1C203BE25A53A3054162D1D0BB64CB1D84A3
                                                Malicious:false
                                                Preview:L$<.D$..g.....D$...................;........D$8P.L$...&..h..K..L$...'...D$..L$x+.N@VP.D$@P.>#...D$xP.L$..&.....K..L$.V.'..Vj..?T..YY....S...V.L$..'..3.F9t$.v&V.L$..$..f.8|u.V.L$..$..3.f..F;t$.r.}..r..G..H.....D$$h.....k...YP.L$..Q...}..r5.G..p....n[...F..t$..0V.D=..YY....j.j..H....,}........t$.3.f..jX..$....j.P.5=...D$0....}....$.....D$...$.....D$4..$.....D$(..$..........$....X....$..........$.....$......I........G..H..]......u.G..H..]....xf.G..H..]....t.....G..H..~]....t.... ...G..H..i]....t........G..H..T]....t........G..H..?]....t........}....$......$....P..........I...........$.................':..Y..$.....L$\....&....$.......3..2P..:...L$\..$..K....%....$.....L$\.%....$.........p..$....f9.u..M..D$XP.[...L$X..)...,....I...t...$.....M...[....3.P..j..H....={...D$...u.P....Y.t$.....Y.D$0..u.P....Y.t$,....Y.L$8.(...L$..(...L$h.(...L$H.(...L$x.|(.._^3.[..]...U...\...SVW.=..I.......P.u..M.2.......tq......h..I.P..B..YY..tH......h..K.P..B..YY..t1......P....I...
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):34816
                                                Entropy (8bit):6.665252092241425
                                                Encrypted:false
                                                SSDEEP:768:5IDJ0vLyktlgwYtfKUGabl8UvrcyzJsDXtk:5sJitgXKUvl8UTcyzJWu
                                                MD5:59391B69D439FC7599CCB7D333193250
                                                SHA1:497BE4625681164C552963A2F02CDF18CF30EDC0
                                                SHA-256:DB29B88D44504EA00B87EE4F177BB7837B17022AA82805F72FFAB6A9F4929717
                                                SHA-512:E386B1A96734534A949988574F8BC2D957529E52EF61BD938142E9663C97DFC0A5CF22FF27B817BAC75A386E360A7CEDF5CCC877CD1BFCF006A25F22AF634619
                                                Malicious:false
                                                Preview:t....N@..t.Q....f@..N(.FL......G..V.:..Y_..^...U..E...$P..P.I.]...U.........SVW....$.....|$\.G(..$.....G,..$.....G0..$.....G4..$.......E.P.B...E..L$`..$.....@..D$...D...O<.D$`P..}.....L$`.t$<.%G..3........8^ ..g....O<.F..\$D.......v...Y...T$.......D$...j..L$ ...D$d..I..\$h.\$l.\$p^.\$(.\$0.D$4.....D$x.,I..\$|..$......$.....D$L..I..D$ .D$P.\$T.\$X.D$tG....D$@H....D$H@....D$<;H.|.;........\$.;H........L$..A..D$$...f9X.uO.I..L$..D..f.x.3t...D$......;...(....L$.....8$u..D$.....8........D$$F...f9X.t..D$$F...f.x.Au3.|$$..F.....@.f;D$tu.A..f;D$@u.Ix...f;D$Hu..u.|$\9T$D}..E..L$.........L$(P.g......L$(.v...\$(.D$4.....D$.P.L$|....D$(P.L$d.....L$D.l$..A.T$.F.L$D......p..a...D$<j.^.D$......x....B....D$d.D$ .L$..\$..I..L$.......8$t..8.u.......D$.F...f9X.t.3..........G.\$......@.f;D$tu.A.~f;D$@ulIyt.D$Dj..|$(.|$`[9D$.~h.O<.F..D$..D$$..P.D$,P.D$ P.t$..{...........D$..L$L.@.....0.Kt...D$.j......P.D$0P.8f;D$Hu...t.G....h....D$..L$L....0..t...D$.j......P.D$(.0.D$..@.....0..a...D$$.T$
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):129024
                                                Entropy (8bit):7.998834022130344
                                                Encrypted:true
                                                SSDEEP:3072:ID7ENq/W4iLe+KHHdF4aUDTTbxD26RIp5yYY8a2/Fvn9PuiojJe:IDkq/W4iLcHHUaUDTvB22i5yY82LPt/
                                                MD5:39B3BEE454F0BF8C20FA9D852BF08493
                                                SHA1:811D50772A534D58584DC59E186CD234FF7CEEAF
                                                SHA-256:895AF83CCDD17BBF71E3491C2E1580DA75735A69698A586762552066C4D5BE4D
                                                SHA-512:78AC7BB6EF711D04BBDB4E60EBA41F0F4655BA13DD8720A354853DD66D4F12A6FEC32093A491D0380C2279C4ACFFF3A482F8961F8F0DBC201C630B9F11699AB9
                                                Malicious:true
                                                Preview:.L....?..R3...^f..g+1.....\p..tFN?.{..Bx...Btz......,.L..s..~...T:R?}F.T9..#..i....ph.-N..C......3.I..$J...A. 6.%.......H..8n.D...y.u...~..4....m.....U.."1..Xg[.sQ<..7.l..-J!..X3'..o.]...D....v.]......\.T}.n~...rq.Sy...m.}D.I`.<.'......?.e.......V..........y@.P...@.%..LQV...Q;4.....5....jX/V.c.....zh...r.J.L=~Q)a..P.h`....yXp`."Tsl...=..k.c..!.Y1.....575.t.R.i....(......vV..7....a...^$2.>.../.z...y........B\.......q.1pV^.R:_KO4.Ib.."......n-tv.A..E......m{Q.#.K.%)...n0T.J..G..W.Y..g.T.V(...b..]8..G.....u.UZ...kA.......%......62e...7C...+...'.Sy....5-\.n.y. ...?......6GN. P....o...2M.Z.`em.........{n..7V.....q.5..@\`.WZ.',I@.W..*.......gV..y.....^a. .....o.?x.b..r.o..G.K. .U!..8."jR,...+..S.8....!.....[...].#.......+.)./&.......C.{.,.3..h...g._Y.N.K.Y&.+..y..k...h....r.>n..c....B.5g....m\Ff.O.=Z......u<.....n....,Q...S...6..a...[..Fb.V.HD...\x&..qt""X#....>.......x...,.._=K..R.96..B:.W.KZdu}YN>.6.6_....g.[^.B...U...-..;..k.N..!b...F9....$.L
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):98304
                                                Entropy (8bit):7.9982963129133156
                                                Encrypted:true
                                                SSDEEP:1536:sen7o747R/unr+gsSac1Sr9lVKz3i1Pq3wkpR45Vv58BpYviyP5TlxqkuQ37V5Ek:P7c4V/O+g0c1mv6y1Pq3rb4fiBGjBukh
                                                MD5:77B0DEDD52B512CEA8C5CFC3E03125C0
                                                SHA1:E73DF32202E72E667994BA0E16D730F452B446D2
                                                SHA-256:598AF1825F5038A77F75014D31A737C61A3577B8AA7C2CE0AD26487C504A3D75
                                                SHA-512:0FE49732697F300A8CA84517BBC2D7C043263111F26A392880EAF8114CBBE33F8045B5297943E89577CB65C7609D4BE5A0BEA318C049678F7E0E3F3EE598261A
                                                Malicious:true
                                                Preview:.D.....:...]...3#:.E....5'd.j`............pbH........a..J..7...9.B....\.Z....W#..n.)Hz5\.ZG..r.`...M....&.....S."]..s.I.1;....`?..Y%.......]I...Z..F.Z%...IB #.a.F<.m.Q...#.2.T.0m..,...*...F.......r...-........~....k../9.. .F .x.......~..{....^...Q{.G.D.M.$..*.....5qj...L.k.BW.....?..s...xC..6..P..c.7...UC..<\..)@(Q.5.n\,.i+.....7.H.._...@.lZ..Q..y.-...w..x..+..|..1.J\.%6....E..._./.W,..2T.........!.......{wt.+......s.....4...F.bU...k..=2N.\...&.zJ@4.l...y.....xR.^J......f.&..W..8..Ka...[c.....gu.....p..W....#u..e...}...:u.@...x(r....k...7.....@...3.E.^D...&g.!.%.......9.See.../S.b...PXRO.XK.G.m.p(..W.e....6.n@I...W.j;...!l'....A....8..+v......7{_.Y.'V..|...6.B.<...7J.vX9n..r^.S.q..u....g...."r.{.,cMtY...".).|..~).@...-.....3-~.....N..@G..Q.BS.}...U.....K.5.].,.o..9,..%.3..m..t.t...|=.nR_@A\..!@...|.K.r.flD.......F...5S.8..|ml....H.p.6.<.5........\...L.h......Z...(.7...&YDKqs..T.V....[..u.].w'..@.\..gV...9...(.....Q.8p>.\..4e.S.....=..'...
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):16384
                                                Entropy (8bit):7.166072462000539
                                                Encrypted:false
                                                SSDEEP:384:5kXDylnffltltZZzz11ppz9KvLoXM4INduLbbOxiVnoXM4INduLbbOxidDQxq:5dK8M4INduPbOUGM4INduPbOU+q
                                                MD5:567BA9CE87CE234A38F42A10967EB55E
                                                SHA1:8730552D2CB7357B49279B25B34D4EBBF8834184
                                                SHA-256:DFB3AEB55AF835CBEA30F3595E2845236B45305F73C7CE06A9B8E9E53329EC45
                                                SHA-512:BC7579FD1827127791F7FBDA3C71E46638D58D2F4E6EC0F9B20B64598EB7363CA9632289364FB3D6E56DE2670A440E1E1550638C61149884D30AFACB1B82414A
                                                Malicious:false
                                                Preview:.cC<-.a`.N..y.....n<.<........z..v<'*6.....*(...<.,.v..........<.O.V+4.......5.<.'.6Go...T...c.<)TH.....5.d+.2.<H!..o........<.U:.~$....s...<$"U.8b..qU..M..<.;.f.....G..+.<..e<......o . .<s_..u......."a.<.gBV._.....F.D.<...s....Ul...e<bN.6.....g.....<..L..%.........<.D..h....../..<.*B...D_.Y..{<6w......<(...`.<...77...b. ..<ON..}..'.+..q<.........X4m.<d.]{f.......|'.<\%>..U...Zsn.i.<..yUk....3.w..<..Z.......-.f$.<..O..3.........<F^..v....._...t<..K........0.ns<.R......Y....<K.W..g..h..l,kg<i... ......6.p.<{..J-.....=...t<.....X......PZ.<.2.......J.s..<^.{3.....:`..t<.?...P..&I..'o.<........ .A..<'Za.......1.d.<@En[vP....M;.w<..............?.........9..B..@...2b....................................0<..0<.dW..dW................................@.......................................B.......B.................8..B..?0g.W..=.......................................?.......?......................0C......0C................................U....I.?.. ....u}.M.U..UUU
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):16384
                                                Entropy (8bit):6.604564417541617
                                                Encrypted:false
                                                SSDEEP:384:hPti51O51Yd5XMSArl8OezLN1ENX6QGuYsUhLgdcgT2k9B:Rtw1E1Yd5dArqsfGuYJhLgBF9B
                                                MD5:8CDD220B6EDD5261639FF15FB19FF044
                                                SHA1:A76846914B9AF25DA85DFD57A09C0C18406B5EF5
                                                SHA-256:95E71E48E27559C30A9DD0C333A69C22F8C13BF512A459BDC7A44D045F30C5DF
                                                SHA-512:16799000C537303EB7F6F99FB2F649680C4792810AA18FA6E3C0C9B450B2457B7754D5C187D65F08AC19426CBA3F6D4F66E9D2ECF03804BBB890A6A9E41F929B
                                                Malicious:false
                                                Preview:YY_^..].....=.QL.............\$..D$.%....=....u..<$f..$f...f....d$.uZ.*.....=.QL..t2.....\$..D$.%....=....u..<$f..$f...f....d$.u............$.T$..D$..........T$......P..<$f.<$..t..D..........T$..............Y.....................L$.....S............u....=.IL....y.......K..........=.IL....\.......K.......N...Z.T$......D$..u.A.3..........D$..u.........3...3.%.....D$.u.T$.....D$...%..........=....u..T$.u...u...t..Q.....$.\$...q.........Y.a.....t..............B....D$.%.....D$.........D$.%.....D$.t=.f....l$.....D$.....t..-..I...t.................Q......J........A.........................-..I.....................u.....K............u.......U..QQ.E.P..t.I..M..E......*j.h.....!Nb.PQ.X......|...=.o@.v......M...t....Q...].U..j@.u..u.........].j.h..K..6..3.M.3..}........u..8.........';..3.....3..]........t.3.f9......t..3......u...u..e8..........3..E.f9.u .N8........j..E.PhP.K..........V.u.SW...........}..E.............*6...u..}.V.U...Y.U..V.u.W.....u...7.........m:.....
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):27648
                                                Entropy (8bit):7.99382891468895
                                                Encrypted:true
                                                SSDEEP:768:g3mH77WgmVWcQ8KysW5AS3jVjGSSRC+LT+:8KKPWcQM5AqjVj+ZT+
                                                MD5:EE95191B367041AB62585FE75D565559
                                                SHA1:6BC56BE81FB1B29A0E38D9DF2D3854F36704739C
                                                SHA-256:2D57FB7B3B3BF691627260F165754B5C7BC296B233197BC092BEBEDD10199198
                                                SHA-512:567580B9780C00CCCE14DBC13D14169EF8AB8BA5EF98AE9E9577D37568AC4E81BD25A3D9C43DED217B323B6842000D8550ECF1008B64B16F30DF95DFCC1081A4
                                                Malicious:true
                                                Preview:.W.<.9....%.*......q&Cz..h.S...[>A...}w.W..,...L.Y..d.../m......0.I.l..~....Y,...Q...>.k..+.......vFo)YM@Ou..+C..zXdrP.....].x.9.D....b..iZY....W6RIj.2p1.\....[,.E(./.(...0.:....F..A.N.......s?......6...A....O.d..5u..Q1<.e...w.VSi..."FKv3.V.{t<....b.${.~.P...M......./B.^M..h...LY.Q.5.....0.......T.*s.;..J../...>i.z#~.IL..@g."..~.0-6....#..#.{.h../.....Wr7q...c..=\.P....s..J,j...<,..eQ.Z...Q.O.:4*2.)'<......0...j.u....ULL...8..).h........8-...v\.......!:.M..+...*.iX.7.......d...:d..h..."w.......s....?....&...9.A.......'PE..v..V.1X..onK_uH.c...&=.I.O..=9.mlUR4...S.b..i........Y.G..H...K....H../gs..>..&p.E.%.C.X.....a_v`2>.>..N.........!.......=....[V#.=..j.2...k#.o..O..]..x.......p..y.9.....ml......V.....4c?......B...dX4._.+Y...]....Y...s.^.9.ID..wrK+g..k.-.A...>..qq.U.:.G...4.F...\bO.m.7.......M.C.\.[YV.`.~..\B.v./.@....f..Ibdj.<.(J.l|mP.m..$...rfJ9<.C.X.g..5..V@E%.{S....^..d_~p.3kX..cE<^>.].E.K.......c..g1.<.0.....Lq.>U...m..V.....
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):136192
                                                Entropy (8bit):7.998465540176465
                                                Encrypted:true
                                                SSDEEP:3072:KoqcNY/5QXNTEODIZikpT17L4dPvsBMnkptG6aSR9y+3/:KonNY/5Qd+ZRp94lvJnQ9y+P
                                                MD5:B1200B786C5397EBB9DCBC176B229B0D
                                                SHA1:D9BFFC8766CBE6FAA64E7951DC4EB4052610225A
                                                SHA-256:ACA2E1C133B9DFA829CE1705FDE04035D3775FD07F31D35EA5169D3D20C70721
                                                SHA-512:AAB48DCEA508BC7433EDB7F00887F75664FA31B0C57332ECBB1007EE5D940150A4E20C6B96B655871F72180CD03D5470A2B2232042788F5AC0645C6DC62F9338
                                                Malicious:true
                                                Preview:.p......C7...._9....8..5M...h..T..F..(..cd.:.#K85)]$."...r....4.j...<9...~..)qi.>...e..............O...D.H..?.....DS.&..l.H.....J.N.."...&l&.H.X.D.\....NJ...LS..^.M.1...%".~.|.Z.)T.t~...C.t.....H.....P...Rt..%.#..h....`B...................s..z.+...'..*.D.....m.............[..::...._....&..t....6..HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....R....C.<.'.F...h.............T......{T......{kC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E...`.[..r..}.!..,P..Myn.2..t.W.....L..f.P...T......{T......{m.....:c..8.5...x..2).U.j....2>.$#.~....E.....$h...}......H..l.{F...3G......`*w.r.3.*mq...K.R.......m%_^W...H.... .(.....6.F.|m#n...N:Ta.....<..)....... .^e.z...X b.^.....3g..+...4A...?.O.Q
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):56320
                                                Entropy (8bit):6.08004899796524
                                                Encrypted:false
                                                SSDEEP:1536:ax10IKQ8SoXTqgWVrZ+Int3SdFc9vtmgMbFuy+:211XwT5MAg0Fuy+
                                                MD5:228F8CE4E1CA3BAA49EB7560F7A5ADCE
                                                SHA1:F258D0EC853E88B6D1E1DD8C71A0D05E79108B6B
                                                SHA-256:76F5FC75B2933F461B0C51738DE828ED895114EE84F5B5C68857666D5CA38292
                                                SHA-512:0955A2D9FC5CBBCB180E1148F468D1674F72B0FA31A24D40E393F47C2DB11099799B104C3135FAC2A4191E5BEF844BA0543C57BE41FFE6AD0199E391D9417BA4
                                                Malicious:false
                                                Preview:....I....x..u..p.....I..E..8hL.P.....3.@..3.^..]...U..E....wf.$...H.h.....]h.....Vh.....Oh.....Hh.....Ah.....:h.....3h.....,h.....%h......h......h......h......j...h....j...,.I.P..P.I.]....I...H...H.h.H...H...H.%.H.h.H.,.H.h.H.3.H.:.H.A.H.H.H.O.H.V.H.].H.d.H.U......4.=.bL..SVWt..u..u............u..F...^.....L$.........D$..(.I..L$$..t.j...PS.. .I..}....}...L.u.j...P...wLS.. .I...H..D$ u.j...0.I.j..D$...(.I....wH..H.I..D$..GHPS..@.I..t$..D$0S....I..|$...|$0.D$(.F....D$.....t6j.j..D$8P..,.I.j...(.I.P..H.I....D$0VPS..8.I.V....I..&.|$..t.j.j..D$8P..,.I.j.j..D$8PS..<.I..t$..|$0.D$0.....t$...t.j.j.P..,.I.. .|$..t.j.j...j.j.P..,.I..L$0.L$4.t$..D$4PS..@.I.j.X..u.9t$$t..D$0.D$4.u......j..|$..6..\.I... ..u... .|$......u.....|$.j.j.j..6....I.3.j.Z.p............Q.Rc..YVP.D$$.E..0..l.I.W.D$4Pj..t$(S..4.I..|$$.t:.t$..|$0j......D$4.D$8..(.I.PS.. .I..t$..D$4Pj..t$(S..4.I..|$..tE.t$..|$0j.......H.I....D$0VPS..8.I.V....I.j.j..D$8P..,.I..D$0PS..0.I..t$...c..Y.t$(S....I..t$.....I..t$ S.. .I..t$,S..@.I.3
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):15360
                                                Entropy (8bit):7.964090703920312
                                                Encrypted:false
                                                SSDEEP:192:PcoYHWsVLQG7U4/UnUhJgrQ9LVSfqqz1bzynlqjlcUEKGGlxiOGKodXxoziwyj:kp8G7UGUUhJtk1UlaOhKGGLiO2myj
                                                MD5:BB2CCCF73F02DB4F7A646E95DD858E93
                                                SHA1:66928DAF33419D80C7F29458233081405D095BDF
                                                SHA-256:0C4926AF83E5AB5B09A1FC44D40FF31C5DC3D25F0B94787304EEBAF878E5A923
                                                SHA-512:C5885043045699CDAADBE271D8C96EAD31609D03102EA6FF312BFFF74980B5DF93ADE67BDE37BE648FE2FCBC50CC2788FC88616882B8AE6D763E1C41E486AF31
                                                Malicious:false
                                                Preview:..02....Q~G.O..._!....6..)..........(R...5k>.....P#.j...A),.._.*?V....7....T...-..jYQc*...LAw.Z.1......E......@..9.Hz.|......KTQ.J...........%...s..J..5`.....R;.A..zg.......e2Q..4...R.....&.a.0M..&....8...@)..@.....y....@..v..e..n..........n: .T*..........*......;...~...../.t:M.......7..w.}..r..!....|..P..V...Q..~]./X..{....q..!...x..`.f .bX.a....jP.6!.L:...%..#.3..@...X..#.u..C.h.+..E.e2...D.MJ .].(..^{@..?^..$..0..1..............|.i..{JA&.yr..@....{..'NR....i ......A.X..&O...L.6....4...j...w#.;.....86o.%K...C.u+FFFZ2....r 6c.zBZ.T......">...#..{..~.._...........w.n....O|b.e..v.i.#Oi.4....R+...m..b........h."....&..d.<.b)X..L+...-(5x7...a.tRED..cD.?/...F.f+...:.4.!.I..<].~.R.*....=<.:..x.....K.p.A....M.U......9HU.@.....E./ D.|W..V.L.............,J..1eVIN ."..D0.*3.E.. ..o.5`.LX...@..L..P.3.`<.D.|.S.a.R.u;./^...Al...1.s...h~?...N..L&q.W.{.7~.S.j.2I.5.@K.hA.u..s.ZO<..l..u..!.N.P(...v.............x..4.O".=...E.0.aP+.*........
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:hp200 (68010) BSD
                                                Category:dropped
                                                Size (bytes):188416
                                                Entropy (8bit):7.999219839853688
                                                Encrypted:true
                                                SSDEEP:3072:g028DNSTkTBZVGRugMV1rcwg7wox7jLC77bM5pI5Xzctz2u4p82qSiyoWwa:bRDNmk8Ru/tcZFLC454Xo2FpnuWb
                                                MD5:275F1D93F40D7E0818D72D7049F32391
                                                SHA1:2A64B4E637587453B3871A566BFBAE228DCE3655
                                                SHA-256:D6754CE1CE925A6401BDA0901DDF7C13557771572C9388B41ED550AE9DD71970
                                                SHA-512:3EF0F7568F5D17E072C3E53D1EC3DD18F9E833BF861B9B34884A94CD51F50A4C72BCE7B7742EF0415A351BDE0DEF87CBDB5E2C0B036AF48B77F7E0318F18FF7B
                                                Malicious:true
                                                Preview:..EN.0g.P,..^.#7..m..+..x~....g"5...4...V.....9.e.t$.$.T......m..J.....7..aKw...`.tW*0.U.~....a.......a.m...rs.x...{...~..GX..9..E/\d..Jw*(hW....>%Q.p..Q-=.1|....%F... .i/BeK.l[#.....G......u%.k..x.C.q+ZP.....@x.f.J. &...zU.....I%.M...3..#...i.....;.,...4...%..:8....[*.-V]}_.BO..,Z..7..<c#x@.Y.....&h.....E...&.....uq.o....D.Zr..I?5..l..r.RV.....`....m..md.@d.....(v.h.DiN.FR.K.>.Yq......Q.[.I.....{....s@..D....W.....XJ.U......Lj2'#....;.(.(i.bQ[......u..~f..U).*.....E5.k..lh;...z....../<").BH.....@..-...f....M..b...\\..>.A_...>......R.=..j..Q!..U.e......P...'.H..OQfi...........X.m*...|P..C..Vx..F..+.._.h.Ix...dXy...l~.U.A....X2..v....P.W.^=u=.z.....d.J.l+..i.^......._/...5...0.......0|...N1j/..nV.fN.Q(..r0.2..q...o.....n-.\r.%...3{.....Y....y.W..X....na....*$...q/b...*C..Tv.0..`.MI.M...}.......{...}........@.....~Z..&.._.;...t....y.../....zo..#RnI...L..>.gK..QiN...-xm...M(..Z.@e.rb..U6.^B..._.L.c..-(.../..3.,...#.y%W.w..?.`...
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):228
                                                Entropy (8bit):4.912778886893481
                                                Encrypted:false
                                                SSDEEP:3:ZWdYZKeB5GMK3WUqt/vllpfrYZcFTS9gXeF+X32ZpAo3P8GmbgElKmE/p3PeUwyd:PZKNtqjvVg3F+X32l/8xb99E/p/LrJv
                                                MD5:31050816B2F450A717786D075367899E
                                                SHA1:A7ADE2BF93708934B9E276FCE3AA2323A25E007D
                                                SHA-256:4A6FCC7E68D22A69DB4735D3900F3EA63F767D67218610AFD43EA8F1AF9B4FB5
                                                SHA-512:D588927F8FDCC0E7468A5A2839537CB3A4F2FF7D942C63EB8B20E53CCDF9DBA63A394BC75E67F0395B5525382CB33EB81BCB55995B29B9D7E357361900C332B6
                                                Malicious:false
                                                Preview:MaskBathroomsCompoundInjection..MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):8192
                                                Entropy (8bit):7.92684458026462
                                                Encrypted:false
                                                SSDEEP:192:FZPay3BVTVNcawaUaAl5+EDaPc+sJPgJSZsQ8+mmPBjDgYlRLe0m:PyyxVxCawaUai0EDaPcpVOSZsQ8yhFnM
                                                MD5:A88120E86BA6642F82BA2854752F752B
                                                SHA1:3344518B5CD114855C28807EDA8DF0BD7BCB3293
                                                SHA-256:403446E9ADF7A1B92B7B067933DA55A2E16A866BB317C5CF1884A7F2B3D3FEF1
                                                SHA-512:7CFBDF196A6633214AD352135EAEBC9146B92A75D73EBA9C7D5C8DDB88EF468BDEB898B2FB47C34BE3FA771C0DA7CDB4CFBCD97CEF5B16BE1975319C09B54EDE
                                                Malicious:false
                                                Preview:..5..O$T..Th..1..#..#....#x.099.?..o|.S.._..../.;..i:..B{R.%.X..r.m..-....C$.i..[<.I9f&.LB.z/C..1.U....P.3Q....)Mq._.;/.0f...1.Z....@...@..x..D...o..ox.........?..a..A....5..N.`....[b6.....~.g....W....KQ.T...P,.O...j.~...)..RI.,..E..y.r9d2.d.Y..y..E..O........w...G".D.Q$.I$..$.I.%..0..(B....@C...N...r.Y..}j...@@.e..D.L&..F.e..<..C.....u.].....V&._.....~g..F.[.........;.|w.PX..~t......T&.l....I.o'..d..'..P( ..".Nc||.###......(..Q^.T*.4..c..`P.K....:...Z..j..P........5...E..?..........R).b1.\W...I...k......@tb.....|.L..>. .............V&.......~'.0..o...X..z.Ms...........f......Zqt........%......0..Aww7........p..=r.(j..J...fM.@...a.......&....`P..4....?.....K...r..B........m.H&..?.>......tww#.J...,..8.....A.L...d&a<.G2..a........7>z.=...\.h..|]..k..-../..i\_..v.M..z..?....R.`rrrF._<...t...V..P(.a.p..a.8p..........Eww7..(......&s9...=A.]n...A.>P....4@...AA..SJA...p.p..c.`....8p..m8N.v...v`.5....z..z.v..0.....!..1.5..15.......<"...-Z....b.9...A2.T..v...
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):22528
                                                Entropy (8bit):6.598039640950927
                                                Encrypted:false
                                                SSDEEP:384:kZM0/1zbE1PJcF8ufnpZ9aBXYrxzDZJgs/ZN/EyFpdflwxFwfydtR:IR7F8ufnz4kVDZxj/JiFwfGb
                                                MD5:A8E1EEDC8535B6279C38AFCACF58FD7E
                                                SHA1:05FB410C23AD68942B2F4FB8E667E8DA076FAB5D
                                                SHA-256:DDF7E69C7CEC0A248D18BE08965A74F2F05755541258AEFA3DCA0CEA68186794
                                                SHA-512:5C3BBF661A14C9B40D5A292CC8CD09F1AE860272BA33C26241043BE0C52E27D7F86A5DAD097FDC7DD15FC1A71C394B392293F7BB53F8724223F0182C45F12D66
                                                Malicious:false
                                                Preview:P.q..............YYj.X.......E..~......K.t.....t..8.u.P....3...YY.E.....t..G...t..8.u.P...Y.E.......H.E.u.V.{...Y_^[].U..U.........SV...W.......Jx..t...............t........J|..t...............t.......j..J.[.y...K.t..9..t........y..t..y...t..........Ku...............1N_^[..].j.h.K..t....e.............K..Npt".~l.t.......pl..u.j .....Y.......j..@...Y.e...54.K..FlP.!...YY...u..E...........u.j..w...Y.U..W.}...t;.E...t4V.0;.t(W.8.....Y..t.V.....>.Yu...8.K.t.V.F...Y..^..3._].=TbL..u.j..M...Y..TbL.....3..U..E.-....t&...t....t.Ht.3.].0?I.].,?I.].(?I.].$?I.].U.....M.j......%$BL...E....u...$BL.........I..,...u...$BL.........I......u..E...$BL......@..}..t..M..ap...].U..S.].VWh....3..s.WV....{.3..{................{.......K.+...7..FIu..............9..AJu._^[].U... ....P.K.3.E.SV.u.......WP.v.....I.3.....................@;.r................ ....Q......;.s....... @;.v.......u.S.v.......PW......Pj.S.J...S.v.......WPW......PW......S.8^....@......S.v.WPW......Ph..........
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):48128
                                                Entropy (8bit):6.480046224305634
                                                Encrypted:false
                                                SSDEEP:768:jDuaIYXBQsBoDCHT5xv8xV9J7J6Ax6zNGB0toYyncyH9JRpHbDYA22HbbjNbkBYG:jDuaiC7v8xV96AE11yHxpfYAz7FbkdHd
                                                MD5:9EEDB42201838CBA7570A89AD64AD7F2
                                                SHA1:EA79B5DFA8BDCC2AC78BB21AC2755C21106F7299
                                                SHA-256:1D0B6945F207DBF0A5F014AB15A124061F4BACF2C7198A52BE22549B24DF7A7E
                                                SHA-512:AF2EF67C4EA4425F5BC1947BF26042E5F62AE05A5478BAFDC2C641F909D8D686D86D646F9FD46053DE555F346A6EA83F94FF26D2D662CBC30093D1A44651DA8B
                                                Malicious:false
                                                Preview:..`..3.@j..F.P.&....H....7........L$...{..r7.q...j).Qd....u'...#c....N.t$.y..u....`..j..F.....j..C..L$..d$...p..$a...|$..t!.L$...b...L$..p..h`...D$......t$..C..P....x..u.....3..t$..D$.j..u.RP..x..j.P...H....}....L$...`.._^3.[..]...U..E..@....x..u....x..t.V.u....._...&..F.....^3.]...U........E.SVW.@...3.\$..0...0_...N..D$.P.T$..Q..Y..u'.u...._...F.........Sj..H........+...8\$........t$.Sj.....I..].............<.I....ujh..K..L$..J..Q.L$.......t..t$.j.j.....I....1..j.j..H....(.....j.j..H....W.......^...#..C......L$......0j.P...H..........j.j..H...........^...#..C.......t^j.V....I...u5P..<.I.P...H.........j.j..H...........w^...#..C.....V..X.I....u....Z^...F......._^3.[..]...U..Q.E.SVW.@...3.]..0...]...N..E.P.U...P...u.Y...u...^..3...@S.F.P...H....M.......]..8].t..E..F......E...y...H.K......F......._^3.[..]...U......<S.].V.u.W....F..D$..]...#.3.D$.A.K.3.;.v..F..H..._....D$...tY.N....._.....tJ.F..0....\...F..x..t5.E..@..0...\...N..D$.P.T$..!O...|$..Yu.j.......D$......
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):187392
                                                Entropy (8bit):7.999025054333345
                                                Encrypted:true
                                                SSDEEP:3072:h92h2zNappqK8+FIDVYpHHq9nXDy+VOSnogS8zJVUXSWerWyJyorLRh6Q:h942spq+cYazy+tnogjzJgS3rWyJLvj
                                                MD5:1D5D54B6E631BFE5326A58FD4F4E51A5
                                                SHA1:7290D85223FE25CF1E97CD476C6DC912DC85A31D
                                                SHA-256:1539BC762107D3365CC8B89200F744FE6128180DF90624697C5A01351C66EEDE
                                                SHA-512:3B92863996C50F2734CB87799A0CAD333DBD42D847DE744C1A743BCA7300CCF71958558BD437B4C43599965D76E0DA38298339E7D4A4C1F9B80B64ACDE206F19
                                                Malicious:true
                                                Preview:..b.x.1.yD.;.u@.?...#....%..f.ru.3..c3#>..oY.J+..`6...;...L.Q.. ..>.n.x..r..?T*...D.j.~..vpN..nN...w%....9u...h."........|nz.....V.l..[.G@.D...$.=.<~..t...e.f.h.D.w.....81.....R.sJ{)..c.N.C..1h....`.f,.12.w..$=.z_..M..u...N..{...7.~Y.0.....".l(....K..|=..Q.G.b.:.......F..+.p......s.:.."P....`).P.g.c...P.7.....%.^$\.otlH..>....G/.N..||....l.G,......b...,s...].P....D.....^...dJhz..{.;!u.v..b.D......!.......w]..@......|.D....]".A#..@.U......9{...:x..7KgF..k...........y.=...[R.%DG.1~Y.".....j..f.d.........|]H..0.j.?e....EQ.......\.o[.[.R...._.R)d.7..N...G....k.'.(Sf.!.9.C.K}.b../....Nx.Q/..p2...{.&..n....5.-g......>s.-.A.!g.....c...(..<....A.L{..c.n...[.....v...R.<..."..iC4=F.0`E9.b......0..~..........u.._..dhS...O.....k.\...pGw..J.........t.(.(.*#.Z_..".R(>..|....y.+..L...A<....L..)A0....c.....T....n.........Q.vI.....DA.B.8vi.E.._..M.I.|......\V<5.5...J..n.....U2.9....=..o'..W$.v.M......}.F|.b...Jg.....4'..}.E;..H.[."^a...o.&R4G.D.
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):21504
                                                Entropy (8bit):4.693802997481543
                                                Encrypted:false
                                                SSDEEP:384:ir9LE/MpfhwHLWAkqLyH3Per2Wfn2HuboETcKiKjxqb:QbAGWrT+UTcL4qb
                                                MD5:7E90051279FD9FEFB47BD91AD73B84A2
                                                SHA1:708B9CBFF00F11E44EA48F1DDEAC3903B767F135
                                                SHA-256:345CFF1F961BC66E4A5B41224D87DA5D0473DAAE9BDF2C39152D31642D324E59
                                                SHA-512:8AF18A8F270CD2A144539F289E5FE856838D1E2909B589210132A7CD7D99BE8A9CC3313FF62A832E12AFD8B633D572B5AB79C4D867B88E53E95762CA2BFA5412
                                                Malicious:false
                                                Preview:OOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):48128
                                                Entropy (8bit):6.485680327229379
                                                Encrypted:false
                                                SSDEEP:768:J3jsJhQlEF2VVay1N5J3SoO6Qku2ox3hOk3Hsu1izubGntN6IZOjAV0SMgO:JgjQWq8GV3jOTJh1Xl2ub2tBOjAeKO
                                                MD5:007AD2509FC5EB8C45ABB18FD9453D9A
                                                SHA1:134A3E886D13919AA4F1640B64E8F4ABBC7517C4
                                                SHA-256:C04D04B33A1D01623232179BF43B500248EC82037896D7D5F59BC12343F36C53
                                                SHA-512:13E41B42AD71372BE7EBF6E8E038873D8373F3CF88EB9DE2CA2A060DA4660A947A36AAC52FA191166645DF915AC3724D5FD77F1BA9C637C811896A440922E0EA
                                                Malicious:false
                                                Preview:w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...y..U..........".................*.............@.................................w.....@...@.......@.....................L...|....................8..0....0...q...;..............................@X..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...............................@..@.reloc...q...0...r..................@..B.........................................................................................................................................................................................................................................................................................................DQL......h..C.....Y...L..h.C..{...Y..N..h.C..j...Y.h.C..^...Y..<C..h.C..M...Y.....h.C..<...Y.Q.>...h.C..*...Y..cL.Q.@...cL.P.9...h.C......Y..G..h..C......Y...(
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):22528
                                                Entropy (8bit):6.260801045174954
                                                Encrypted:false
                                                SSDEEP:384:IjnsRfctrJsnb2Kev0hLk1G+CAiwo8Z8T5RZWfkBTjeVmr5D5naEM66z/rIYlUwF:IjnsRf4rJsb25v0hL4G+CAiwo8Z8T5RC
                                                MD5:0913A5290E2124D926F0BB85963A39A1
                                                SHA1:7A21A7E07C48BC1540B477C93C295576BD1D06E5
                                                SHA-256:CAF36EB19FE881753A0487540673B4B2DF3E528893CC5B3CE5843856B4A8BD8D
                                                SHA-512:95407ECAFB3E5462CC14F4AB5CC4F9A233116A7B3A9BB31AB06BF882D3B22666EDBFD47333AA747A71FD96DF771BD7F9BE5A6AF069AF508BF2079DF7F3CED79B
                                                Malicious:false
                                                Preview:M.u.}.....cJ.....cJ....u.u..}.u[.U..E......O..s.3...i.u....3..m.E...{.....}....M.u.u..E.........]....E......M..E......}..E........|r.E.;F|...B.........U.E...t...%....=....u .E.............%............E..R.U..kf..........|...E.@.E.;.~..U..E..M.;}....u.......D...E..E.;}.|........E..E.....;F|sf.U.....}...t/..%....=....u!..G.......%..........E...........R.U...e.......tB.E..M.}.G.}...H.E.;}.|..%.......t.;.....v..Fh..................}..M....sw...E...@..P.u.V.u..u..}t..........u......;E....{...}..t.f.......f#......f;.u.....E...@..P.u.V.u..u...t.......t..u...F|.M.+..........B..f......M.f9C....z.......v....C.......%......................w......M.E...%....=....u#.E.............%............E...M..S.U..].;....s...............00K......%....y.H..@.....M0eJ....$?J...9E....y....v....K......f;.w..F<.....E.............f;.w..F<.....E.;....y.........E...u....C.....U...E.M......E.....3..E...C..E..(t...5t.3.........U.....c......E.......3..E......U.....E......M..=...............+....
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):108544
                                                Entropy (8bit):7.99824795156944
                                                Encrypted:true
                                                SSDEEP:3072:gN/TuiNFWyzCqyo6dskgKiHp229uwVpTY+x:aLulsqs3b2y
                                                MD5:496BC58AB55492C6FF50B4B5FB12226D
                                                SHA1:C122773FD32BA5000B4637D21C92AEACA4DD982B
                                                SHA-256:3795AE53D60FD640A16642A2585F12783D84E963DE9C1A605286977511381A5A
                                                SHA-512:6B805EB934B84B43833B94075D350C9214333FA11A7E16A5196AC19BB9E85A445DCBB4E8FC5FA7A3500C53048F3CBB1BC80AA43295FB678952FDFC439C3F290D
                                                Malicious:true
                                                Preview:v..<6!yr..k.t.,^\&h..'..@.....6{p.n..%....*9T.5..-........~.R.,9..$...V.pw....^J/(60..N#...aKiT.|.g..M..+.}1..z.......i....C..y...M.y..U.kS..("_..gO.8."...d.....>M..~..,2.......,...P.......2...T..,b.P.._.~=f._`....S...p.z....?KN.`v.A...7...W/..D.....l}R.`..C@....b..)N.,3....eET..I..).Uj..?....P..>;U.V.....ir.-.]K..^..Y....(#.s.*..V...(.....~..8.?.e.X~...p..+.......z=.lM......)...+.;y...Z.1.2y..0.xi...|~2g$"B...0<QN..69.^.....3.._q.y.3..eN...0y.....#Z...Y#C...&...K.1.\..J.^.I.40c.......$x..:ka..%........j.27Xf:.r./.........hdl/....z=...)"....1..p3.!.....z.........ez....6.Y>...d...n+...r.u..Gx.{..!p2.pX.[.z.....rcA."2C....B.."..!..Z.y.........e4..7)z.Y...u.kG..t..#f....2..........E.]S.....@....E....9M....T.q..=...v4.<.....R...b..\.M[...........T..X.Jvk.....D......?.|.BT7.......\V...(...Z.~;.....$......~.|.A....?&Y/GM).3...R.a....Z.W..9j4X+f.).g{..D.Et*r!.yGT...-.x^.....a...S.C....K6?.D.}8.>i..$.....H.l.a...).rl.j.A.@..H.d.:..3.M.M9..=
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):144384
                                                Entropy (8bit):7.998488536802585
                                                Encrypted:true
                                                SSDEEP:3072:Dgr6MsiRjR0gvthbbwTy3PTdwYH8RulVxhDCWlXr:DgrBjSerb0OrdwPS4Wp
                                                MD5:F2672513A6295F6009C6A701631E5248
                                                SHA1:9D1FFAB9FFD4C4B112DA0AB9A9FF9B9AF195F6BF
                                                SHA-256:289DEC0B62B622A5478869DFA7743313B5F954C529A5279D73786E3BC9EFEFD8
                                                SHA-512:5086E6CD3E52C1F478083B405616316529280AD683EEBBFE4DCC461F6C990A6E33A2F409F036224906A628BD24B05FE25FD52A574D86C1BC116780494C3EAF60
                                                Malicious:true
                                                Preview:...&...,@gD|.......#v.....T*.}.W"......k1......1.x^ .........C7?..R.k..O.^S.Xe.d....:2..!..H...p....=u..C.q..*[..wO46.OqXR...}...x.T.t[.0..O..]!H...........8.<.W<..i....$..(.i..Ce..GT...$..K.bc..mF._....j......g..$.z.........[M...a.o..............L.+.1...-Q9.td.]._.............0...._.....9...'.../}...4.%.!..w.mxdyO.x^\...O.?l.L....z{.=t.%.[..%..Q....XR.7@.+...u.U....f:T..lX...d....O.O.K1....<.4.T.@(7.RDf..V.)B..c..p..O.L...7..(..S..M9..f/..w ....+.s......P..>...C{4..........Mk.....8G.......9j.f.Z..Om$j.j'(.UB.(..-\....,R7...kxc6]E.9....O:!..{..~C,w.@...D.\|2.=...N......kk.R.q.....?~=.<...6...........]...?$.^.P...,...R.D.i..x?......gI..i.,..e.m.dl...............+..he:..I._0..H<Zr./q..ur..].p....i..l...%...7...(]..\>..=Z..rw..<.U..R.^.nv.Z.......Oq.#F...-./..;T.^........c.. .Wn6....D...U. .'z9.q,.., ..F.'7... .p..o#2...d$_...p..%.W]. 6]...).$7.*c..g[...4PP...._.D.....4Q...FF...|.3...%.....>..:.....0E.e...+..=...;..7g...mT.*.f.....S.L....}.._.X
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):25600
                                                Entropy (8bit):4.255745457841842
                                                Encrypted:false
                                                SSDEEP:48:D1YIEqAniRRGVpIsssssCssssssssnsssssssssssssssssssssssssssssssss7:p1/AniRRUp1HwJNGMh5iCfXfJ4LLF
                                                MD5:565C34A01AB8904E85EF374CC03651A4
                                                SHA1:0DD3C73AABE9B950C356921221DCA747EB8B9011
                                                SHA-256:936926C20932948640765731B8D130F0230249CD30FB30447734D61F621A2704
                                                SHA-512:491B3C3B12C1B01764EB3C97CAC23A1E2FE8FBFA3F46E32606D102530E6BBCCDDB49F66CCE1C359B4C69EA256722C4EB8FF9B77513CADFCFEA23319C580783D3
                                                Malicious:false
                                                Preview:....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................m.m.m.m.m.m.m.m.m.m.m.m.2.2.2.2.2.2.2.2.2.2.2.2.2.2.
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):101376
                                                Entropy (8bit):7.998207860514862
                                                Encrypted:true
                                                SSDEEP:3072:y9AKfAie9jD0Y0TQlRP+hbTJGc56J63fbqC:GAK4ied0TOVabTJXVL
                                                MD5:6675D3E1DA6AA19BB5135860F0EA0D37
                                                SHA1:D3C81ABFC7C14E7A73F31DAA3078FD31394E2859
                                                SHA-256:A9A5D51B384D8C3F746A8881A46C285D2EFD7291386C794AE9B7640D4BCFD500
                                                SHA-512:C6DB87D1D635FCB6FBC76AF431121A7958CBF0CECFC4EFA3C3D6BB4DF41F3D2BCF36D378929162D3EF6900BC68AD578511D615A07C6BF3B86E1A7B3AC55E953E
                                                Malicious:true
                                                Preview:...;.........$..=..4.nf.8...Zs.o.o...`Jw|Qj..-..~...)-...Q@g.j.;:.,[.D.{.j~...\.U.".;..* ...X.w....2.._..!{$.l(m.#{@.{.,,a-...k.".L......P........RiMr;K.'.....A.v...9..}....g0A..j....<e.jQ..cP....H+.O..c.M8...,.^Nf....KW..'..^?)oN4.Ef.D.!r](...W<.'.0...$.>_...g.yM....J.|.....u.h!.m./..S..0,D..P..l`..nt...U....1....'1.~....m....\.m.}.>...@_W9.6.3.f..P.....[.I...A....e^......4......;....zH&...z{e.a.9.e..n.s....-. .Q......[....hb.........n..1L....c.l..%'..N...0.(.T....J..G..v.uQ.L.lhU......Y<..9.`.....G..3.E...Dp...r........Pvgcc....e..TooU.S...|...F.G.]...8......v.ho..N0:.'.bG.....G..i.t.3..k...Y.D..^....py8..Y,.4sL......w...&..T.>...o ..R.t...;..S...T}\c....m....<k.A..HD..y7.D....o.6^Q<.......l...V%^.oM...4X....yj.#.. h....(..".....w&...V.}...*z.......S..NS..>..AK...G....4.d..1.'.|i..+..'...>....d%6"...#2`R..>..\....hI~...%.^X.. 0g...._Mx.....6n....Dr....W.._Yc...b.%D."..-..0#..f.I...W.2....}.g.".V.q.S.m.C......s.I7&.......O....).(....^...
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):65536
                                                Entropy (8bit):4.264996685135176
                                                Encrypted:false
                                                SSDEEP:768:7q25NKEHq9BxyyM0Dj2Bmgari0UPD/3Efrafd0maNBZikj0kkuhsRqI5o+k:ZNHq9Bxhgari/D/3EfraF0Hikj06Lz
                                                MD5:75318145A2346FADDDE0AD48BFB0D31D
                                                SHA1:11139B56D08EBD2CA1C220D222B44FFA04C2B301
                                                SHA-256:C386693C1913B1EB863E09727B8E18CAE277849F6F16A4028EB68233AEE4396D
                                                SHA-512:1D565E1EABADD324CF4E9022372CAC77F09750D3074F97008F370FF91802ADCBBBE8468BC45F20D09FB9758589DEC924A7E302AE9247880BDC48D164C344A80E
                                                Malicious:false
                                                Preview:u.3.;.*...a.3.x...A.l.l. .f.i.l.e.s. .(.*...*.)...*...*.....a.u.3...#.i.n.c.l.u.d.e. .d.e.p.t.h. .e.x.c.e.e.d.e.d... . .M.a.k.e. .s.u.r.e. .t.h.e.r.e. .a.r.e. .n.o. .r.e.c.u.r.s.i.v.e. .i.n.c.l.u.d.e.s...E.r.r.o.r. .o.p.e.n.i.n.g. .t.h.e. .f.i.l.e.....>.>.>.A.U.T.O.I.T. .S.C.R.I.P.T.<.<.<...B.a.d. .d.i.r.e.c.t.i.v.e. .s.y.n.t.a.x. .e.r.r.o.r.....U.n.t.e.r.m.i.n.a.t.e.d. .s.t.r.i.n.g...C.a.n.n.o.t. .p.a.r.s.e. .#.i.n.c.l.u.d.e...U.n.t.e.r.m.i.n.a.t.e.d. .g.r.o.u.p. .o.f. .c.o.m.m.e.n.t.s.....O.N.....O.F.F...0.%.d...%.d.....S.h.e.l.l._.T.r.a.y.W.n.d...R.E.M.O.V.E.....K.E.Y.S.....E.X.I.S.T.S.....A.P.P.E.N.D.....b.l.a.n.k...i.n.f.o.....q.u.e.s.t.i.o.n.....s.t.o.p.....w.a.r.n.i.n.g.....L.i.n.e. .%.d.:. .....B.U.T.T.O.N.....#.3.2.7.7.0.....\.\.?.\.....\.\.?.\.U.N.C.\.....\.\...\.....S.t.r.i.n.g.F.i.l.e.I.n.f.o.\...\.V.a.r.F.i.l.e.I.n.f.o.\.T.r.a.n.s.l.a.t.i.o.n.....0.4.0.9.0.0.0.0.....D.e.f.a.u.l.t.L.a.n.g.C.o.d.e.p.a.g.e...%.u...%.u...%.u...%.u...\.*...*.....0...0...0...0...o.p.e.n. ... .a.
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):25600
                                                Entropy (8bit):4.5949349580540915
                                                Encrypted:false
                                                SSDEEP:384:MPsjnQV6QvXdooooooooooooooooooooooty:cUHiy
                                                MD5:93E1FB7C29E1C5D82D72013FD87585A2
                                                SHA1:F8A28C23DC625DF120E1C29E2A9E14BF6F9E07F3
                                                SHA-256:B910C0C4E8DFC593B3925AFC41F5BB1A5FA86A145E62577307AF2F7FF6427830
                                                SHA-512:4E663FBB6E10042168E35F3098B9FD37ADDC22FD84A5901E12C4EC7FB576FC7CE9CDE2BB0FB10A29B8C6E8B0FC102386B7B7AD511E1811FCB7E5F972B9E4AA93
                                                Malicious:false
                                                Preview:m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.......................................................m...................................................................................................................................................................h.h...........................................................................m...............m.......m.................m.m.....m.m.............................................m...............m...m.m.m.........m.m...................m.m.....m.m.........m.m.m.m.m.m.m.m...m.m.m.m.....m...........m.m.............................................m.m.m.m.m.......m.............m.m.m.m.....m.m.............................................m...............m.....m.....m.....m.m...m...........m.m.m.m.....m.m.......m.m.m...m.m.m.m.m.m.m.........m...m.m.m.m.m.m.m.................................m.m.m.m.m.m.m.m.m.m.m.......m...................m.......m.............................................m...............m.....m...........m.m.....
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:Matlab v4 mat-file (little endian) , numeric, rows 0, columns 0
                                                Category:dropped
                                                Size (bytes):11264
                                                Entropy (8bit):6.127678229864238
                                                Encrypted:false
                                                SSDEEP:192:00GMKTY89cKyjB+mOofFsBk2yR6DXAhADUh95ybOIOo94:0kcHyjJFsBNywAhADsUi
                                                MD5:C3DF7A4BAE78D93A1AA952A415619D40
                                                SHA1:93CC13AA30F070C943BAE96ECFCF4505CA13CF98
                                                SHA-256:47C455D9E9834DB22C39BC8B1D3D3B4DFC15207647CCBFEA35A16F7CAF11A442
                                                SHA-512:7EC31765F35B1B0E2CE3C091C10721589177D78C16B82A9E5E8B3292822AAADC0C91962F216208E521018B43AB341AE547FD667D945C1A3A480B08863435F50F
                                                Malicious:false
                                                Preview:........................```.....vvv.............................b\Y.aL:.|W3..e6..p<..yA...C..~C..w@..o<..b6.rR3.\J<.a\X.................................}}}.\\\.....................................................```.....xxx.........................]VR.\B/.{K'..X,..i3..t8..}?...B...D...D...B..~?..u9..g4..V,.qG(.UA2.[VS.................................ZZZ.............................................ZZZ.....zzz.........................UH?.g<..}F"..S&..^,..i1..t9...A...I...P...P...J...B..u9..j2.._,..U(.vE".\:!.RHA.................................TTT.....................................\\\0qqq...www.................a^\.S?1.j>..wC...K!..T'.._+..k4..w?...K...W...\...\...W...K..x?..l5..`,..U'..K".tB .a; .L>3.`]\.........................xxx.FFF8................................bbb.....ttt.................da_.Q=..i?..sD..zI!..M#..W*..g7..uF...T...`...h..n..n...i...a...U..wG..g7..X+..N#.{I!.sD .`;..J;0.a`^.........................^^^.............................ZZZN............................
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):28672
                                                Entropy (8bit):6.773492243030843
                                                Encrypted:false
                                                SSDEEP:768:4rUCVoyOQ5DuOKHnPiamE9w97OUg4eVD5:4rnVRCOa69E9wFOUg/R5
                                                MD5:ECD876C831C2B3E1708FE81C1053EEE4
                                                SHA1:627E0C5B56DA36FF30F5A9E8BE218525AE3A8059
                                                SHA-256:1618767B6776FE41E17E4841FD9DA532D0A59563342DC174D143FD42111B3DDB
                                                SHA-512:130D0100DB8DC13FA2820E98377A8B0B9AA820804B17C097ECFA6C1CC9D3AB0921AF7953A249635EC50097D0DFD4601FE985ABA207D658FF22B4E77A6AACDF72
                                                Malicious:false
                                                Preview:d`].....................WWW.....................ggg.................{{{.}}}.~vp.......................................rlf.}}}.....................```.............................jjj.................yyy.yyy.zzz.vqm.......................{.pkg.zzz.{{{.yyy.................bbb....................................+jjj.....................nnn.ppp.xxx.{{{.{{{.zzz.{{{.yyy.rrr.mmm.....................bbb.YYY'........................................ggg.............................ttt.ggg.hhh.vvv.............................bbb.}}}.................................................dddtnnn........................................................nnn.ZZZp................................................................fffummm........................................mmm.___r................................................................................qqqEddd.hhh.nnn.uuu.ttt.nnn.ggg.```.eeeB.......................................................?........................................................
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):7168
                                                Entropy (8bit):6.231901580470429
                                                Encrypted:false
                                                SSDEEP:96:8Whz/SRYOb1a9BlZzAC3druYds27BHD0PD1xvnprnZY2jPoY1xHlz1Patdd:8Sz/SRYOithuYS2ZAD/vprnBQOz1id
                                                MD5:BEDA7B30D256F7E4D8EE5876D0B262C5
                                                SHA1:7DBB99BBC4DD7D23FCF9834488AA59F6B50BBA51
                                                SHA-256:8414705DD0333529CD4077588EE720BCF32E5BC28CAF90F552F73341BB0AE54F
                                                SHA-512:2B06A95529B87846B62317A2141438558F9A91B0804F7C48A88FDB6CC7E093F209E9089E0262FEAD5F4B4F03711BCB4E2748081B7FAE8D377CFBD3CF980B1A80
                                                Malicious:false
                                                Preview:.....M.+Nx.F....L..9}....G..E.....]..................E.u.................3..E..S..M.@Pj.V.u..u.............tV......tN.E....... ...u%..C...C9...........f.;wt.f.8w..................C.f.<Cw..Ct..........E.f.;x.. ............C.f.<Cw..Ct.........].E..6................u..E.................E......E..S..M.@Pj.V.u..u.................. ....-u>..C...C9.....sJf.;wt.f.8wu>..C.f.<Cw..Ct..<.....t.H..f................U....................C.f.<Cw..Ct.}............]..c....}..t?..K...~Q.E.I....E.;Fx......f.......f#.....f;.E.u.....E.........C..M....A...M.;Fx......E.;.....s...........]......=$uL.........0.........C...4....F...8....Fx..<....F|+Fx....@....E.+Fx....D....E.+Fx....H.....C...X.....C...\....E..+.....L............P.....u..P...............T...........`.....0...P..$uL..................U.....].....Nt..C..<A.}.;.u.3.....W.........t..E.;Q.u.;A.u.......m.......u.U...........E..E..E........E..E........N..].M.............E..........P..<dJ.....E......Y...M....Q.v.P.............f9..
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):44032
                                                Entropy (8bit):7.995561012121999
                                                Encrypted:true
                                                SSDEEP:768:ULqY7TzZg952TwIUPX/eBOPp5PiIcpgmwmFbWzUrD2Tlha13M/PX/pEE:Uj7TotIUnA49cqmwe32Bha13M/pEE
                                                MD5:3032F7CAD7D5FDC76480D35C1B96F1D7
                                                SHA1:17118E193C859BA96F330F2DFA8CF3994AB6AE6B
                                                SHA-256:8787ADE46BC3D7F369535A52AD0DDEEFB014652D8E2B83A531A7498E2770C2E3
                                                SHA-512:565F31ABEECBD55BB6CC920F9888074C779AE12547DDF941EA63F1BF0632B6FC8894E40B54FA8FEA23041ED8C96AD2893F5C5D4BAC31DA542B1D62CE5C163B27
                                                Malicious:true
                                                Preview:..P/.....}..B.g.^..p...+.:k9..8....43.ke7...JQ!..(R....^LBB.zCz(L.R.xk..RQ>DbJ....f.........,~.f.8~....!t..hh]..7!Z.I.....U...W0....x1G.....v.a.F...N.....k.n..o.wX........N=>..f.F...Ro1X..q}...8.\....<:M@.C.<..l.....6.{i...u-..5.X..v`.9.e.....E!..IMc....H...B.....FU.F2G5.r..n...^....Fw....[(.+'o.,K.n...v..z.5...;k@|.+..<.*.^.....>g.%O..........6_..k....p.q..G.26.-k.....j..h.Z0\J#~E..k1....v....G..V.j!I.':..Z,.?..t.o....:...]].`......P .r....G......:}.........yoc(..Z.#..=l{b2.)!..2....>...c....[...w.>.A. @+......u..fp...}%.z.a....o_1.>."~.z.`.].3}........v@.5Zw....\...A.@......w..OB.o..c.-...(r..2.eM.69...^..A.$_e..P.q..J.._...9'.r..;.D..C..Z...@...r.0.fu..4...8...y. S..3....VV..-..!.B...4........ .J@.v.?V.6...B..P,.....2.i...s.`.R.Z.V.6.3....O.y\.....a...1'.7.6.)E+.F%...6@....(.'.n..E..TY ..,..R..k"...,q...{. Tf.4...-..M .3&....7....^.y9....m..@..q .....*.%.ZR.9..]r.Bg..j.wH..2..a..0.... a...|....{#..H.1.O...&mT+...7..D.{.....it..N{.P...
                                                Process:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):55296
                                                Entropy (8bit):6.184577192657991
                                                Encrypted:false
                                                SSDEEP:768:eTlKWzhQVNsbSSkLQ7PqYIueIVvaOsibzc+ylIt0su0B4y+aZmzdz:D7gqYrui3vylIusu0B4MmZ
                                                MD5:A8592B01E55B70C3C7D82383CBEA914B
                                                SHA1:3F5BC91EF9658DA1B8B3BD21F4C477EFEEFA9779
                                                SHA-256:BA7160B3E08911B714F3AC8A40F2222745E31A187811BB69CEDCDF27AD83007C
                                                SHA-512:E29733F533C4C6140FE63D20889DB1CD3C04102E08965EB7C115883F95ED23CFBE891F9A32962495D16BE095C4BD3D806378808B65A32054FBBE0E235B69CCCB
                                                Malicious:false
                                                Preview:.........L.........L......L.X.I.....L..F.....L.........L.........L.........L.........L......L...I.....L...F.....L.........L.........L.........L.........L......L...I.....L.0.F.....L.........L.........L.........L.........L......L...I.....L.l.F... .L.......$.L.......(.L.......,.L.......0.L....4.L...I...@.L...F...D.L.......H.L.......L.L.......P.L.......T.L....X.L...I...d.L...F...h.L.......l.L.......p.L.......t.L.......x.L....|.L...I.....L...F.....L.........L.........L.........L.........L......L.(.I.....L...F.....L.........L.........L.........L.........L......L.H.I.....L...F.....L.........L.........L.........L.........L......L.h.I.....L.+.F.....L.........L.........L.........L.........L......L...I.....L.G.F.....L....... .L.......$.L.......(.L.......,.L....0.L...I...<.L...F...@.L.......D.L.......H.L.......L.L.......P.L....T.L...I...`.L...F...d.L.......h.L.......l.L.......p.L.......t.L....x.L...I.....L...F.....L.........L.........L.........L.........L......L...I.....L...F.....L.........L.....
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Entropy (8bit):1.73548077648206
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:QqHWdVqNBs.exe
                                                File size:17'074'946 bytes
                                                MD5:45658cfd5c86375a3f47d821c8c8bfc7
                                                SHA1:01dfdac7115839b4dabc96dfe381d7231010838c
                                                SHA256:eca8448d70d825863070e154190f163d6917ba1f696402d8ed20ffe0e59f1bf5
                                                SHA512:db04b682f245e749f7212a2ea0a4f8adcc202f8a6867fc5547f8ce53b8eb62a2c3a3cae2d4230aba933e9fff284766f5a125fae260b35ac9cb883e33cce4036c
                                                SSDEEP:49152:Ix1BZ/3KMJESGkP9bKJPUyN1RL7HDUq1373ht:+bZ/6JSGkPRwPU2R3Q63h
                                                TLSH:AC073326E2B561D3E97E0A3171F1AB301BD2D432567098892A403DFD7C72BD3790A97E
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................n.......B...8.....
                                                Icon Hash:cbc4e464a46466b0
                                                Entrypoint:0x403883
                                                Entrypoint Section:.text
                                                Digitally signed:true
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x4F47E2DA [Fri Feb 24 19:19:54 2012 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:5
                                                OS Version Minor:0
                                                File Version Major:5
                                                File Version Minor:0
                                                Subsystem Version Major:5
                                                Subsystem Version Minor:0
                                                Import Hash:be41bf7b8cc010b614bd36bbca606973
                                                Signature Valid:
                                                Signature Issuer:
                                                Signature Validation Error:
                                                Error Number:
                                                Not Before, Not After
                                                  Subject Chain
                                                    Version:
                                                    Thumbprint MD5:
                                                    Thumbprint SHA-1:
                                                    Thumbprint SHA-256:
                                                    Serial:
                                                    Instruction
                                                    sub esp, 000002D4h
                                                    push ebx
                                                    push ebp
                                                    push esi
                                                    push edi
                                                    push 00000020h
                                                    xor ebp, ebp
                                                    pop esi
                                                    mov dword ptr [esp+18h], ebp
                                                    mov dword ptr [esp+10h], 00409268h
                                                    mov dword ptr [esp+14h], ebp
                                                    call dword ptr [00408030h]
                                                    push 00008001h
                                                    call dword ptr [004080B4h]
                                                    push ebp
                                                    call dword ptr [004082C0h]
                                                    push 00000008h
                                                    mov dword ptr [00472EB8h], eax
                                                    call 00007FF4A11E2DBBh
                                                    push ebp
                                                    push 000002B4h
                                                    mov dword ptr [00472DD0h], eax
                                                    lea eax, dword ptr [esp+38h]
                                                    push eax
                                                    push ebp
                                                    push 00409264h
                                                    call dword ptr [00408184h]
                                                    push 0040924Ch
                                                    push 0046ADC0h
                                                    call 00007FF4A11E2A9Dh
                                                    call dword ptr [004080B0h]
                                                    push eax
                                                    mov edi, 004C30A0h
                                                    push edi
                                                    call 00007FF4A11E2A8Bh
                                                    push ebp
                                                    call dword ptr [00408134h]
                                                    cmp word ptr [004C30A0h], 0022h
                                                    mov dword ptr [00472DD8h], eax
                                                    mov eax, edi
                                                    jne 00007FF4A11E038Ah
                                                    push 00000022h
                                                    pop esi
                                                    mov eax, 004C30A2h
                                                    push esi
                                                    push eax
                                                    call 00007FF4A11E2761h
                                                    push eax
                                                    call dword ptr [00408260h]
                                                    mov esi, eax
                                                    mov dword ptr [esp+1Ch], esi
                                                    jmp 00007FF4A11E0413h
                                                    push 00000020h
                                                    pop ebx
                                                    cmp ax, bx
                                                    jne 00007FF4A11E038Ah
                                                    add esi, 02h
                                                    cmp word ptr [esi], bx
                                                    Programming Language:
                                                    • [ C ] VS2008 SP1 build 30729
                                                    • [IMP] VS2008 SP1 build 30729
                                                    • [ C ] VS2010 SP1 build 40219
                                                    • [RES] VS2010 SP1 build 40219
                                                    • [LNK] VS2010 SP1 build 40219
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x9b340xb4.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xf40000x6d00.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x1902d680x2d68
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x7a0000x964.ndata
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x80000x2d0.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x6dae0x6e0000499a6f70259150109c809d6aa0e6edFalse0.6611150568181818data6.508529563136936IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x80000x2a620x2c0007990aaa54c3bc638bb87a87f3fb13e3False0.3526278409090909data4.390535020989255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0xb0000x67ebc0x200014871d9a00f0e0c8c2a7cd25606c453False0.203125data1.4308602597540492IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .ndata0x730000x810000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0xf40000x6d000x6e0001b11916ca291372ff46521d718ca81dFalse0.7620028409090909data6.695161435450058IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .reloc0xfb0000xf320x100001effa914a90b27acd314f2e4522e5abFalse1.002685546875data7.941666429088442IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_ICON0xf42200x294fPNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0010401891252956
                                                    RT_ICON0xf6b700x2668Device independent bitmap graphic, 48 x 96 x 32, image size 9792EnglishUnited States0.6057770545158666
                                                    RT_ICON0xf91d80x1128Device independent bitmap graphic, 32 x 64 x 32, image size 4352EnglishUnited States0.644808743169399
                                                    RT_ICON0xfa3000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.74822695035461
                                                    RT_DIALOG0xfa7680x100dataEnglishUnited States0.5234375
                                                    RT_DIALOG0xfa8680x11cdataEnglishUnited States0.6056338028169014
                                                    RT_DIALOG0xfa9880x60dataEnglishUnited States0.7291666666666666
                                                    RT_GROUP_ICON0xfa9e80x3edataEnglishUnited States0.8225806451612904
                                                    RT_MANIFEST0xfaa280x2d6XML 1.0 document, ASCII text, with very long lines (726), with no line terminatorsEnglishUnited States0.5647382920110193
                                                    DLLImport
                                                    KERNEL32.dllSetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW
                                                    USER32.dllGetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW
                                                    GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject
                                                    SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation
                                                    ADVAPI32.dllRegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW
                                                    COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                    ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                    VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishUnited States
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Sep 27, 2024 11:13:48.931875944 CEST5882253192.168.2.71.1.1.1
                                                    Sep 27, 2024 11:13:48.941293955 CEST53588221.1.1.1192.168.2.7
                                                    Sep 27, 2024 11:14:00.997454882 CEST5190353192.168.2.71.1.1.1
                                                    Sep 27, 2024 11:14:01.018791914 CEST53519031.1.1.1192.168.2.7
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Sep 27, 2024 11:13:48.931875944 CEST192.168.2.71.1.1.10x2bedStandard query (0)jZFqZYoOtpryMyRHD.jZFqZYoOtpryMyRHDA (IP address)IN (0x0001)false
                                                    Sep 27, 2024 11:14:00.997454882 CEST192.168.2.71.1.1.10x99c2Standard query (0)jZFqZYoOtpryMyRHD.jZFqZYoOtpryMyRHDA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Sep 27, 2024 11:13:48.941293955 CEST1.1.1.1192.168.2.70x2bedName error (3)jZFqZYoOtpryMyRHD.jZFqZYoOtpryMyRHDnonenoneA (IP address)IN (0x0001)false
                                                    Sep 27, 2024 11:14:01.018791914 CEST1.1.1.1192.168.2.70x99c2Name error (3)jZFqZYoOtpryMyRHD.jZFqZYoOtpryMyRHDnonenoneA (IP address)IN (0x0001)false

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:05:13:33
                                                    Start date:27/09/2024
                                                    Path:C:\Users\user\Desktop\QqHWdVqNBs.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\QqHWdVqNBs.exe"
                                                    Imagebase:0x400000
                                                    File size:17'074'946 bytes
                                                    MD5 hash:45658CFD5C86375A3F47D821C8C8BFC7
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:2
                                                    Start time:05:13:38
                                                    Start date:27/09/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exit
                                                    Imagebase:0x410000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:3
                                                    Start time:05:13:38
                                                    Start date:27/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff75da10000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:4
                                                    Start time:05:13:40
                                                    Start date:27/09/2024
                                                    Path:C:\Windows\SysWOW64\tasklist.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:tasklist
                                                    Imagebase:0xa40000
                                                    File size:79'360 bytes
                                                    MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:5
                                                    Start time:05:13:40
                                                    Start date:27/09/2024
                                                    Path:C:\Windows\SysWOW64\findstr.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:findstr /I "wrsa.exe opssvc.exe"
                                                    Imagebase:0xcd0000
                                                    File size:29'696 bytes
                                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:6
                                                    Start time:05:13:41
                                                    Start date:27/09/2024
                                                    Path:C:\Windows\SysWOW64\tasklist.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:tasklist
                                                    Imagebase:0xa40000
                                                    File size:79'360 bytes
                                                    MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:7
                                                    Start time:05:13:41
                                                    Start date:27/09/2024
                                                    Path:C:\Windows\SysWOW64\findstr.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"
                                                    Imagebase:0xcd0000
                                                    File size:29'696 bytes
                                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:8
                                                    Start time:05:13:41
                                                    Start date:27/09/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:cmd /c md 369580
                                                    Imagebase:0x410000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:9
                                                    Start time:05:13:41
                                                    Start date:27/09/2024
                                                    Path:C:\Windows\SysWOW64\findstr.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:findstr /V "MaskBathroomsCompoundInjection" Participants
                                                    Imagebase:0xcd0000
                                                    File size:29'696 bytes
                                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:11
                                                    Start time:05:13:42
                                                    Start date:27/09/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:cmd /c copy /b Massachusetts + Radius + Dental + Vendor + Fighting + June + Stockings + Convenience + Falls + Joke + Mask + Severe + Outreach + Sig + Bdsm 369580\Z
                                                    Imagebase:0x410000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:12
                                                    Start time:05:13:42
                                                    Start date:27/09/2024
                                                    Path:C:\Users\user\AppData\Local\Temp\369580\Origin.pif
                                                    Wow64 process (32bit):true
                                                    Commandline:369580\Origin.pif 369580\Z
                                                    Imagebase:0xbd0000
                                                    File size:937'776 bytes
                                                    MD5 hash:B06E67F9767E5023892D9698703AD098
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Antivirus matches:
                                                    • Detection: 0%, ReversingLabs
                                                    Reputation:moderate
                                                    Has exited:false

                                                    Target ID:13
                                                    Start time:05:13:44
                                                    Start date:27/09/2024
                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:timeout 15
                                                    Imagebase:0xdb0000
                                                    File size:25'088 bytes
                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:14
                                                    Start time:05:13:44
                                                    Start date:27/09/2024
                                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:schtasks.exe /create /tn "SecureHawk" /tr "wscript //B 'C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js'" /sc onlogon /F /RL HIGHEST
                                                    Imagebase:0x5f0000
                                                    File size:187'904 bytes
                                                    MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:15
                                                    Start time:05:13:44
                                                    Start date:27/09/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff75da10000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:16
                                                    Start time:05:13:46
                                                    Start date:27/09/2024
                                                    Path:C:\Windows\System32\wscript.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.js"
                                                    Imagebase:0x7ff74d9d0000
                                                    File size:170'496 bytes
                                                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:17
                                                    Start time:05:13:49
                                                    Start date:27/09/2024
                                                    Path:C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Local\LinkGuard Dynamics\SecureHawk.pif" "C:\Users\user\AppData\Local\LinkGuard Dynamics\r"
                                                    Imagebase:0x490000
                                                    File size:937'776 bytes
                                                    MD5 hash:B06E67F9767E5023892D9698703AD098
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Antivirus matches:
                                                    • Detection: 0%, ReversingLabs
                                                    Has exited:false

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:12.9%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:20.6%
                                                      Total number of Nodes:1523
                                                      Total number of Limit Nodes:37
                                                      execution_graph 4170 402fc0 4171 401446 18 API calls 4170->4171 4172 402fc7 4171->4172 4173 403017 4172->4173 4174 40300a 4172->4174 4177 401a13 4172->4177 4175 406805 18 API calls 4173->4175 4176 401446 18 API calls 4174->4176 4175->4177 4176->4177 4178 4023c1 4179 40145c 18 API calls 4178->4179 4180 4023c8 4179->4180 4183 40726a 4180->4183 4186 406ed2 CreateFileW 4183->4186 4187 406f04 4186->4187 4188 406f1e ReadFile 4186->4188 4189 4062a3 11 API calls 4187->4189 4190 4023d6 4188->4190 4193 406f84 4188->4193 4189->4190 4191 4071e3 CloseHandle 4191->4190 4192 406f9b ReadFile lstrcpynA lstrcmpA 4192->4193 4194 406fe2 SetFilePointer ReadFile 4192->4194 4193->4190 4193->4191 4193->4192 4197 406fdd 4193->4197 4194->4191 4195 4070a8 ReadFile 4194->4195 4196 407138 4195->4196 4196->4195 4196->4197 4198 40715f SetFilePointer GlobalAlloc ReadFile 4196->4198 4197->4191 4199 4071a3 4198->4199 4200 4071bf lstrcpynW GlobalFree 4198->4200 4199->4199 4199->4200 4200->4191 4201 401cc3 4202 40145c 18 API calls 4201->4202 4203 401cca lstrlenW 4202->4203 4204 4030dc 4203->4204 4205 4030e3 4204->4205 4207 405f51 wsprintfW 4204->4207 4207->4205 4222 401c46 4223 40145c 18 API calls 4222->4223 4224 401c4c 4223->4224 4225 4062a3 11 API calls 4224->4225 4226 401c59 4225->4226 4227 406c9b 81 API calls 4226->4227 4228 401c64 4227->4228 4229 403049 4230 401446 18 API calls 4229->4230 4233 403050 4230->4233 4231 406805 18 API calls 4232 401a13 4231->4232 4233->4231 4233->4232 4234 40204a 4235 401446 18 API calls 4234->4235 4236 402051 IsWindow 4235->4236 4237 4018d3 4236->4237 4238 40324c 4239 403277 4238->4239 4240 40325e SetTimer 4238->4240 4241 4032cc 4239->4241 4242 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4239->4242 4240->4239 4242->4241 4243 4048cc 4244 4048f1 4243->4244 4245 4048da 4243->4245 4247 4048ff IsWindowVisible 4244->4247 4251 404916 4244->4251 4246 4048e0 4245->4246 4261 40495a 4245->4261 4248 403daf SendMessageW 4246->4248 4250 40490c 4247->4250 4247->4261 4252 4048ea 4248->4252 4249 404960 CallWindowProcW 4249->4252 4262 40484e SendMessageW 4250->4262 4251->4249 4267 406009 lstrcpynW 4251->4267 4255 404945 4268 405f51 wsprintfW 4255->4268 4257 40494c 4258 40141d 80 API calls 4257->4258 4259 404953 4258->4259 4269 406009 lstrcpynW 4259->4269 4261->4249 4263 404871 GetMessagePos ScreenToClient SendMessageW 4262->4263 4264 4048ab SendMessageW 4262->4264 4265 4048a3 4263->4265 4266 4048a8 4263->4266 4264->4265 4265->4251 4266->4264 4267->4255 4268->4257 4269->4261 4270 4022cc 4271 40145c 18 API calls 4270->4271 4272 4022d3 4271->4272 4273 4062d5 2 API calls 4272->4273 4274 4022d9 4273->4274 4275 4022e8 4274->4275 4279 405f51 wsprintfW 4274->4279 4278 4030e3 4275->4278 4280 405f51 wsprintfW 4275->4280 4279->4275 4280->4278 4281 4050cd 4282 405295 4281->4282 4283 4050ee GetDlgItem GetDlgItem GetDlgItem 4281->4283 4284 4052c6 4282->4284 4285 40529e GetDlgItem CreateThread CloseHandle 4282->4285 4330 403d98 SendMessageW 4283->4330 4287 4052f4 4284->4287 4289 4052e0 ShowWindow ShowWindow 4284->4289 4290 405316 4284->4290 4285->4284 4291 405352 4287->4291 4293 405305 4287->4293 4294 40532b ShowWindow 4287->4294 4288 405162 4301 406805 18 API calls 4288->4301 4335 403d98 SendMessageW 4289->4335 4339 403dca 4290->4339 4291->4290 4296 40535d SendMessageW 4291->4296 4336 403d18 4293->4336 4299 40534b 4294->4299 4300 40533d 4294->4300 4298 40528e 4296->4298 4303 405376 CreatePopupMenu 4296->4303 4302 403d18 SendMessageW 4299->4302 4304 404f72 25 API calls 4300->4304 4305 405181 4301->4305 4302->4291 4306 406805 18 API calls 4303->4306 4304->4299 4307 4062a3 11 API calls 4305->4307 4309 405386 AppendMenuW 4306->4309 4308 40518c GetClientRect GetSystemMetrics SendMessageW SendMessageW 4307->4308 4310 4051f3 4308->4310 4311 4051d7 SendMessageW SendMessageW 4308->4311 4312 405399 GetWindowRect 4309->4312 4313 4053ac 4309->4313 4314 405206 4310->4314 4315 4051f8 SendMessageW 4310->4315 4311->4310 4316 4053b3 TrackPopupMenu 4312->4316 4313->4316 4331 403d3f 4314->4331 4315->4314 4316->4298 4318 4053d1 4316->4318 4320 4053ed SendMessageW 4318->4320 4319 405216 4321 405253 GetDlgItem SendMessageW 4319->4321 4322 40521f ShowWindow 4319->4322 4320->4320 4323 40540a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4320->4323 4321->4298 4326 405276 SendMessageW SendMessageW 4321->4326 4324 405242 4322->4324 4325 405235 ShowWindow 4322->4325 4327 40542f SendMessageW 4323->4327 4334 403d98 SendMessageW 4324->4334 4325->4324 4326->4298 4327->4327 4328 40545a GlobalUnlock SetClipboardData CloseClipboard 4327->4328 4328->4298 4330->4288 4332 406805 18 API calls 4331->4332 4333 403d4a SetDlgItemTextW 4332->4333 4333->4319 4334->4321 4335->4287 4337 403d25 SendMessageW 4336->4337 4338 403d1f 4336->4338 4337->4290 4338->4337 4340 403ddf GetWindowLongW 4339->4340 4350 403e68 4339->4350 4341 403df0 4340->4341 4340->4350 4342 403e02 4341->4342 4343 403dff GetSysColor 4341->4343 4344 403e12 SetBkMode 4342->4344 4345 403e08 SetTextColor 4342->4345 4343->4342 4346 403e30 4344->4346 4347 403e2a GetSysColor 4344->4347 4345->4344 4348 403e41 4346->4348 4349 403e37 SetBkColor 4346->4349 4347->4346 4348->4350 4351 403e54 DeleteObject 4348->4351 4352 403e5b CreateBrushIndirect 4348->4352 4349->4348 4350->4298 4351->4352 4352->4350 4353 4030cf 4354 40145c 18 API calls 4353->4354 4355 4030d6 4354->4355 4357 4030dc 4355->4357 4360 4063ac GlobalAlloc lstrlenW 4355->4360 4358 4030e3 4357->4358 4387 405f51 wsprintfW 4357->4387 4361 4063e2 4360->4361 4362 406434 4360->4362 4363 40640f GetVersionExW 4361->4363 4388 40602b CharUpperW 4361->4388 4362->4357 4363->4362 4364 40643e 4363->4364 4365 406464 LoadLibraryA 4364->4365 4366 40644d 4364->4366 4365->4362 4369 406482 GetProcAddress GetProcAddress GetProcAddress 4365->4369 4366->4362 4368 406585 GlobalFree 4366->4368 4370 40659b LoadLibraryA 4368->4370 4371 4066dd FreeLibrary 4368->4371 4374 4064aa 4369->4374 4377 4065f5 4369->4377 4370->4362 4373 4065b5 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4370->4373 4371->4362 4372 406651 FreeLibrary 4381 40662a 4372->4381 4373->4377 4375 4064ce FreeLibrary GlobalFree 4374->4375 4374->4377 4383 4064ea 4374->4383 4375->4362 4376 4066ea 4379 4066ef CloseHandle FreeLibrary 4376->4379 4377->4372 4377->4381 4378 4064fc lstrcpyW OpenProcess 4380 40654f CloseHandle CharUpperW lstrcmpW 4378->4380 4378->4383 4382 406704 CloseHandle 4379->4382 4380->4377 4380->4383 4381->4376 4384 406685 lstrcmpW 4381->4384 4385 4066b6 CloseHandle 4381->4385 4386 4066d4 CloseHandle 4381->4386 4382->4379 4383->4368 4383->4378 4383->4380 4384->4381 4384->4382 4385->4381 4386->4371 4387->4358 4388->4361 4389 407752 4393 407344 4389->4393 4390 407c6d 4391 4073c2 GlobalFree 4392 4073cb GlobalAlloc 4391->4392 4392->4390 4392->4393 4393->4390 4393->4391 4393->4392 4393->4393 4394 407443 GlobalAlloc 4393->4394 4395 40743a GlobalFree 4393->4395 4394->4390 4394->4393 4395->4394 4396 401dd3 4397 401446 18 API calls 4396->4397 4398 401dda 4397->4398 4399 401446 18 API calls 4398->4399 4400 4018d3 4399->4400 4408 402e55 4409 40145c 18 API calls 4408->4409 4410 402e63 4409->4410 4411 402e79 4410->4411 4412 40145c 18 API calls 4410->4412 4413 405e30 2 API calls 4411->4413 4412->4411 4414 402e7f 4413->4414 4438 405e50 GetFileAttributesW CreateFileW 4414->4438 4416 402e8c 4417 402f35 4416->4417 4418 402e98 GlobalAlloc 4416->4418 4421 4062a3 11 API calls 4417->4421 4419 402eb1 4418->4419 4420 402f2c CloseHandle 4418->4420 4439 403368 SetFilePointer 4419->4439 4420->4417 4423 402f45 4421->4423 4425 402f50 DeleteFileW 4423->4425 4426 402f63 4423->4426 4424 402eb7 4428 403336 ReadFile 4424->4428 4425->4426 4440 401435 4426->4440 4429 402ec0 GlobalAlloc 4428->4429 4430 402ed0 4429->4430 4431 402f04 WriteFile GlobalFree 4429->4431 4432 40337f 37 API calls 4430->4432 4433 40337f 37 API calls 4431->4433 4437 402edd 4432->4437 4434 402f29 4433->4434 4434->4420 4436 402efb GlobalFree 4436->4431 4437->4436 4438->4416 4439->4424 4441 404f72 25 API calls 4440->4441 4442 401443 4441->4442 4443 401cd5 4444 401446 18 API calls 4443->4444 4445 401cdd 4444->4445 4446 401446 18 API calls 4445->4446 4447 401ce8 4446->4447 4448 40145c 18 API calls 4447->4448 4449 401cf1 4448->4449 4450 401d07 lstrlenW 4449->4450 4451 401d43 4449->4451 4452 401d11 4450->4452 4452->4451 4456 406009 lstrcpynW 4452->4456 4454 401d2c 4454->4451 4455 401d39 lstrlenW 4454->4455 4455->4451 4456->4454 4457 403cd6 4458 403ce1 4457->4458 4459 403ce5 4458->4459 4460 403ce8 GlobalAlloc 4458->4460 4460->4459 4461 402cd7 4462 401446 18 API calls 4461->4462 4465 402c64 4462->4465 4463 402d99 4464 402d17 ReadFile 4464->4465 4465->4461 4465->4463 4465->4464 4466 402dd8 4467 402ddf 4466->4467 4468 4030e3 4466->4468 4469 402de5 FindClose 4467->4469 4469->4468 4470 401d5c 4471 40145c 18 API calls 4470->4471 4472 401d63 4471->4472 4473 40145c 18 API calls 4472->4473 4474 401d6c 4473->4474 4475 401d73 lstrcmpiW 4474->4475 4476 401d86 lstrcmpW 4474->4476 4477 401d79 4475->4477 4476->4477 4478 401c99 4476->4478 4477->4476 4477->4478 4108 407c5f 4109 407344 4108->4109 4110 4073c2 GlobalFree 4109->4110 4111 4073cb GlobalAlloc 4109->4111 4112 407c6d 4109->4112 4113 407443 GlobalAlloc 4109->4113 4114 40743a GlobalFree 4109->4114 4110->4111 4111->4109 4111->4112 4113->4109 4113->4112 4114->4113 4479 404363 4480 404373 4479->4480 4481 40439c 4479->4481 4483 403d3f 19 API calls 4480->4483 4482 403dca 8 API calls 4481->4482 4484 4043a8 4482->4484 4485 404380 SetDlgItemTextW 4483->4485 4485->4481 4486 4027e3 4487 4027e9 4486->4487 4488 4027f2 4487->4488 4489 402836 4487->4489 4502 401553 4488->4502 4490 40145c 18 API calls 4489->4490 4492 40283d 4490->4492 4494 4062a3 11 API calls 4492->4494 4493 4027f9 4495 40145c 18 API calls 4493->4495 4500 401a13 4493->4500 4496 40284d 4494->4496 4497 40280a RegDeleteValueW 4495->4497 4506 40149d RegOpenKeyExW 4496->4506 4498 4062a3 11 API calls 4497->4498 4501 40282a RegCloseKey 4498->4501 4501->4500 4503 401563 4502->4503 4504 40145c 18 API calls 4503->4504 4505 401589 RegOpenKeyExW 4504->4505 4505->4493 4512 401515 4506->4512 4514 4014c9 4506->4514 4507 4014ef RegEnumKeyW 4508 401501 RegCloseKey 4507->4508 4507->4514 4509 4062fc 3 API calls 4508->4509 4511 401511 4509->4511 4510 401526 RegCloseKey 4510->4512 4511->4512 4515 401541 RegDeleteKeyW 4511->4515 4512->4500 4513 40149d 3 API calls 4513->4514 4514->4507 4514->4508 4514->4510 4514->4513 4515->4512 4516 403f64 4517 403f90 4516->4517 4518 403f74 4516->4518 4520 403fc3 4517->4520 4521 403f96 SHGetPathFromIDListW 4517->4521 4527 405c84 GetDlgItemTextW 4518->4527 4523 403fad SendMessageW 4521->4523 4524 403fa6 4521->4524 4522 403f81 SendMessageW 4522->4517 4523->4520 4525 40141d 80 API calls 4524->4525 4525->4523 4527->4522 4528 402ae4 4529 402aeb 4528->4529 4530 4030e3 4528->4530 4531 402af2 CloseHandle 4529->4531 4531->4530 4532 402065 4533 401446 18 API calls 4532->4533 4534 40206d 4533->4534 4535 401446 18 API calls 4534->4535 4536 402076 GetDlgItem 4535->4536 4537 4030dc 4536->4537 4538 4030e3 4537->4538 4540 405f51 wsprintfW 4537->4540 4540->4538 4541 402665 4542 40145c 18 API calls 4541->4542 4543 40266b 4542->4543 4544 40145c 18 API calls 4543->4544 4545 402674 4544->4545 4546 40145c 18 API calls 4545->4546 4547 40267d 4546->4547 4548 4062a3 11 API calls 4547->4548 4549 40268c 4548->4549 4550 4062d5 2 API calls 4549->4550 4551 402695 4550->4551 4552 4026a6 lstrlenW lstrlenW 4551->4552 4553 404f72 25 API calls 4551->4553 4556 4030e3 4551->4556 4554 404f72 25 API calls 4552->4554 4553->4551 4555 4026e8 SHFileOperationW 4554->4555 4555->4551 4555->4556 4564 401c69 4565 40145c 18 API calls 4564->4565 4566 401c70 4565->4566 4567 4062a3 11 API calls 4566->4567 4568 401c80 4567->4568 4569 405ca0 MessageBoxIndirectW 4568->4569 4570 401a13 4569->4570 4578 402f6e 4579 402f72 4578->4579 4580 402fae 4578->4580 4581 4062a3 11 API calls 4579->4581 4582 40145c 18 API calls 4580->4582 4583 402f7d 4581->4583 4588 402f9d 4582->4588 4584 4062a3 11 API calls 4583->4584 4585 402f90 4584->4585 4586 402fa2 4585->4586 4587 402f98 4585->4587 4590 4060e7 9 API calls 4586->4590 4589 403e74 5 API calls 4587->4589 4589->4588 4590->4588 4591 4023f0 4592 402403 4591->4592 4593 4024da 4591->4593 4594 40145c 18 API calls 4592->4594 4595 404f72 25 API calls 4593->4595 4596 40240a 4594->4596 4601 4024f1 4595->4601 4597 40145c 18 API calls 4596->4597 4598 402413 4597->4598 4599 402429 LoadLibraryExW 4598->4599 4600 40241b GetModuleHandleW 4598->4600 4602 40243e 4599->4602 4603 4024ce 4599->4603 4600->4599 4600->4602 4615 406365 GlobalAlloc WideCharToMultiByte 4602->4615 4604 404f72 25 API calls 4603->4604 4604->4593 4606 402449 4607 40248c 4606->4607 4608 40244f 4606->4608 4609 404f72 25 API calls 4607->4609 4611 401435 25 API calls 4608->4611 4613 40245f 4608->4613 4610 402496 4609->4610 4612 4062a3 11 API calls 4610->4612 4611->4613 4612->4613 4613->4601 4614 4024c0 FreeLibrary 4613->4614 4614->4601 4616 406390 GetProcAddress 4615->4616 4617 40639d GlobalFree 4615->4617 4616->4617 4617->4606 4618 402df3 4619 402dfa 4618->4619 4621 4019ec 4618->4621 4620 402e07 FindNextFileW 4619->4620 4620->4621 4622 402e16 4620->4622 4624 406009 lstrcpynW 4622->4624 4624->4621 4625 402175 4626 401446 18 API calls 4625->4626 4627 40217c 4626->4627 4628 401446 18 API calls 4627->4628 4629 402186 4628->4629 4630 4062a3 11 API calls 4629->4630 4634 402197 4629->4634 4630->4634 4631 4021aa EnableWindow 4633 4030e3 4631->4633 4632 40219f ShowWindow 4632->4633 4634->4631 4634->4632 4642 404077 4643 404081 4642->4643 4644 404084 lstrcpynW lstrlenW 4642->4644 4643->4644 4645 405479 4646 405491 4645->4646 4647 4055cd 4645->4647 4646->4647 4648 40549d 4646->4648 4649 40561e 4647->4649 4650 4055de GetDlgItem GetDlgItem 4647->4650 4651 4054a8 SetWindowPos 4648->4651 4652 4054bb 4648->4652 4654 405678 4649->4654 4662 40139d 80 API calls 4649->4662 4653 403d3f 19 API calls 4650->4653 4651->4652 4656 4054c0 ShowWindow 4652->4656 4657 4054d8 4652->4657 4658 405608 SetClassLongW 4653->4658 4655 403daf SendMessageW 4654->4655 4675 4055c8 4654->4675 4684 40568a 4655->4684 4656->4657 4659 4054e0 DestroyWindow 4657->4659 4660 4054fa 4657->4660 4661 40141d 80 API calls 4658->4661 4712 4058dc 4659->4712 4663 405510 4660->4663 4664 4054ff SetWindowLongW 4660->4664 4661->4649 4665 405650 4662->4665 4668 405587 4663->4668 4669 40551c GetDlgItem 4663->4669 4664->4675 4665->4654 4670 405654 SendMessageW 4665->4670 4666 40141d 80 API calls 4666->4684 4667 4058de DestroyWindow EndDialog 4667->4712 4671 403dca 8 API calls 4668->4671 4673 40554c 4669->4673 4674 40552f SendMessageW IsWindowEnabled 4669->4674 4670->4675 4671->4675 4672 40590d ShowWindow 4672->4675 4677 405559 4673->4677 4678 4055a0 SendMessageW 4673->4678 4679 40556c 4673->4679 4687 405551 4673->4687 4674->4673 4674->4675 4676 406805 18 API calls 4676->4684 4677->4678 4677->4687 4678->4668 4682 405574 4679->4682 4683 405589 4679->4683 4680 403d18 SendMessageW 4680->4668 4681 403d3f 19 API calls 4681->4684 4685 40141d 80 API calls 4682->4685 4686 40141d 80 API calls 4683->4686 4684->4666 4684->4667 4684->4675 4684->4676 4684->4681 4688 403d3f 19 API calls 4684->4688 4703 40581e DestroyWindow 4684->4703 4685->4687 4686->4687 4687->4668 4687->4680 4689 405705 GetDlgItem 4688->4689 4690 405723 ShowWindow EnableWindow 4689->4690 4691 40571a 4689->4691 4713 403d85 EnableWindow 4690->4713 4691->4690 4693 40574d EnableWindow 4696 405761 4693->4696 4694 405766 GetSystemMenu EnableMenuItem SendMessageW 4695 405796 SendMessageW 4694->4695 4694->4696 4695->4696 4696->4694 4714 403d98 SendMessageW 4696->4714 4715 406009 lstrcpynW 4696->4715 4699 4057c4 lstrlenW 4700 406805 18 API calls 4699->4700 4701 4057da SetWindowTextW 4700->4701 4702 40139d 80 API calls 4701->4702 4702->4684 4704 405838 CreateDialogParamW 4703->4704 4703->4712 4705 40586b 4704->4705 4704->4712 4706 403d3f 19 API calls 4705->4706 4707 405876 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4706->4707 4708 40139d 80 API calls 4707->4708 4709 4058bc 4708->4709 4709->4675 4710 4058c4 ShowWindow 4709->4710 4711 403daf SendMessageW 4710->4711 4711->4712 4712->4672 4712->4675 4713->4693 4714->4696 4715->4699 4716 4020f9 GetDC GetDeviceCaps 4717 401446 18 API calls 4716->4717 4718 402116 MulDiv 4717->4718 4719 401446 18 API calls 4718->4719 4720 40212c 4719->4720 4721 406805 18 API calls 4720->4721 4722 402165 CreateFontIndirectW 4721->4722 4723 4030dc 4722->4723 4724 4030e3 4723->4724 4726 405f51 wsprintfW 4723->4726 4726->4724 4727 4024fb 4728 40145c 18 API calls 4727->4728 4729 402502 4728->4729 4730 40145c 18 API calls 4729->4730 4731 40250c 4730->4731 4732 40145c 18 API calls 4731->4732 4733 402515 4732->4733 4734 40145c 18 API calls 4733->4734 4735 40251f 4734->4735 4736 40145c 18 API calls 4735->4736 4737 402529 4736->4737 4738 40253d 4737->4738 4739 40145c 18 API calls 4737->4739 4740 4062a3 11 API calls 4738->4740 4739->4738 4741 40256a CoCreateInstance 4740->4741 4742 40258c 4741->4742 4743 40497c GetDlgItem GetDlgItem 4744 4049d2 7 API calls 4743->4744 4749 404bea 4743->4749 4745 404a76 DeleteObject 4744->4745 4746 404a6a SendMessageW 4744->4746 4747 404a81 4745->4747 4746->4745 4750 404ab8 4747->4750 4752 406805 18 API calls 4747->4752 4748 404ccf 4751 404d74 4748->4751 4756 404bdd 4748->4756 4761 404d1e SendMessageW 4748->4761 4749->4748 4759 40484e 5 API calls 4749->4759 4772 404c5a 4749->4772 4755 403d3f 19 API calls 4750->4755 4753 404d89 4751->4753 4754 404d7d SendMessageW 4751->4754 4758 404a9a SendMessageW SendMessageW 4752->4758 4763 404da2 4753->4763 4764 404d9b ImageList_Destroy 4753->4764 4774 404db2 4753->4774 4754->4753 4760 404acc 4755->4760 4762 403dca 8 API calls 4756->4762 4757 404cc1 SendMessageW 4757->4748 4758->4747 4759->4772 4765 403d3f 19 API calls 4760->4765 4761->4756 4767 404d33 SendMessageW 4761->4767 4768 404f6b 4762->4768 4769 404dab GlobalFree 4763->4769 4763->4774 4764->4763 4770 404add 4765->4770 4766 404f1c 4766->4756 4775 404f31 ShowWindow GetDlgItem ShowWindow 4766->4775 4771 404d46 4767->4771 4769->4774 4773 404baa GetWindowLongW SetWindowLongW 4770->4773 4782 404ba4 4770->4782 4785 404b39 SendMessageW 4770->4785 4786 404b67 SendMessageW 4770->4786 4787 404b7b SendMessageW 4770->4787 4781 404d57 SendMessageW 4771->4781 4772->4748 4772->4757 4776 404bc4 4773->4776 4774->4766 4777 404de4 4774->4777 4780 40141d 80 API calls 4774->4780 4775->4756 4778 404be2 4776->4778 4779 404bca ShowWindow 4776->4779 4790 404e12 SendMessageW 4777->4790 4793 404e28 4777->4793 4795 403d98 SendMessageW 4778->4795 4794 403d98 SendMessageW 4779->4794 4780->4777 4781->4751 4782->4773 4782->4776 4785->4770 4786->4770 4787->4770 4788 404ef3 InvalidateRect 4788->4766 4789 404f09 4788->4789 4796 4043ad 4789->4796 4790->4793 4792 404ea1 SendMessageW SendMessageW 4792->4793 4793->4788 4793->4792 4794->4756 4795->4749 4797 4043cd 4796->4797 4798 406805 18 API calls 4797->4798 4799 40440d 4798->4799 4800 406805 18 API calls 4799->4800 4801 404418 4800->4801 4802 406805 18 API calls 4801->4802 4803 404428 lstrlenW wsprintfW SetDlgItemTextW 4802->4803 4803->4766 4804 4026fc 4805 401ee4 4804->4805 4807 402708 4804->4807 4805->4804 4806 406805 18 API calls 4805->4806 4806->4805 4103 4019fd 4104 40145c 18 API calls 4103->4104 4105 401a04 4104->4105 4106 405e7f 2 API calls 4105->4106 4107 401a0b 4106->4107 4808 4022fd 4809 40145c 18 API calls 4808->4809 4810 402304 GetFileVersionInfoSizeW 4809->4810 4811 40232b GlobalAlloc 4810->4811 4815 4030e3 4810->4815 4812 40233f GetFileVersionInfoW 4811->4812 4811->4815 4813 402350 VerQueryValueW 4812->4813 4814 402381 GlobalFree 4812->4814 4813->4814 4817 402369 4813->4817 4814->4815 4821 405f51 wsprintfW 4817->4821 4819 402375 4822 405f51 wsprintfW 4819->4822 4821->4819 4822->4814 4823 402afd 4824 40145c 18 API calls 4823->4824 4825 402b04 4824->4825 4830 405e50 GetFileAttributesW CreateFileW 4825->4830 4827 402b10 4828 4030e3 4827->4828 4831 405f51 wsprintfW 4827->4831 4830->4827 4831->4828 4832 4029ff 4833 401553 19 API calls 4832->4833 4834 402a09 4833->4834 4835 40145c 18 API calls 4834->4835 4836 402a12 4835->4836 4837 402a1f RegQueryValueExW 4836->4837 4839 401a13 4836->4839 4838 402a3f 4837->4838 4842 402a45 4837->4842 4838->4842 4843 405f51 wsprintfW 4838->4843 4841 4029e4 RegCloseKey 4841->4839 4842->4839 4842->4841 4843->4842 4844 401000 4845 401037 BeginPaint GetClientRect 4844->4845 4846 40100c DefWindowProcW 4844->4846 4848 4010fc 4845->4848 4849 401182 4846->4849 4850 401073 CreateBrushIndirect FillRect DeleteObject 4848->4850 4851 401105 4848->4851 4850->4848 4852 401170 EndPaint 4851->4852 4853 40110b CreateFontIndirectW 4851->4853 4852->4849 4853->4852 4854 40111b 6 API calls 4853->4854 4854->4852 4855 401f80 4856 401446 18 API calls 4855->4856 4857 401f88 4856->4857 4858 401446 18 API calls 4857->4858 4859 401f93 4858->4859 4860 401fa3 4859->4860 4861 40145c 18 API calls 4859->4861 4862 401fb3 4860->4862 4863 40145c 18 API calls 4860->4863 4861->4860 4864 402006 4862->4864 4865 401fbc 4862->4865 4863->4862 4867 40145c 18 API calls 4864->4867 4866 401446 18 API calls 4865->4866 4869 401fc4 4866->4869 4868 40200d 4867->4868 4870 40145c 18 API calls 4868->4870 4871 401446 18 API calls 4869->4871 4872 402016 FindWindowExW 4870->4872 4873 401fce 4871->4873 4877 402036 4872->4877 4874 401ff6 SendMessageW 4873->4874 4875 401fd8 SendMessageTimeoutW 4873->4875 4874->4877 4875->4877 4876 4030e3 4877->4876 4879 405f51 wsprintfW 4877->4879 4879->4876 4880 402880 4881 402884 4880->4881 4882 40145c 18 API calls 4881->4882 4883 4028a7 4882->4883 4884 40145c 18 API calls 4883->4884 4885 4028b1 4884->4885 4886 4028ba RegCreateKeyExW 4885->4886 4887 4028e8 4886->4887 4894 4029ef 4886->4894 4888 402934 4887->4888 4889 40145c 18 API calls 4887->4889 4890 402963 4888->4890 4893 401446 18 API calls 4888->4893 4892 4028fc lstrlenW 4889->4892 4891 4029ae RegSetValueExW 4890->4891 4895 40337f 37 API calls 4890->4895 4898 4029c6 RegCloseKey 4891->4898 4899 4029cb 4891->4899 4896 402918 4892->4896 4897 40292a 4892->4897 4900 402947 4893->4900 4901 40297b 4895->4901 4902 4062a3 11 API calls 4896->4902 4903 4062a3 11 API calls 4897->4903 4898->4894 4904 4062a3 11 API calls 4899->4904 4905 4062a3 11 API calls 4900->4905 4911 406224 4901->4911 4907 402922 4902->4907 4903->4888 4904->4898 4905->4890 4907->4891 4910 4062a3 11 API calls 4910->4907 4912 406247 4911->4912 4913 40628a 4912->4913 4914 40625c wsprintfW 4912->4914 4915 402991 4913->4915 4916 406293 lstrcatW 4913->4916 4914->4913 4914->4914 4915->4910 4916->4915 4917 402082 4918 401446 18 API calls 4917->4918 4919 402093 SetWindowLongW 4918->4919 4920 4030e3 4919->4920 3462 403883 #17 SetErrorMode OleInitialize 3536 4062fc GetModuleHandleA 3462->3536 3466 4038f1 GetCommandLineW 3541 406009 lstrcpynW 3466->3541 3468 403903 GetModuleHandleW 3469 40391b 3468->3469 3542 405d06 3469->3542 3472 4039d6 3473 4039f5 GetTempPathW 3472->3473 3546 4037cc 3473->3546 3475 403a0b 3476 403a33 DeleteFileW 3475->3476 3477 403a0f GetWindowsDirectoryW lstrcatW 3475->3477 3554 403587 GetTickCount GetModuleFileNameW 3476->3554 3479 4037cc 11 API calls 3477->3479 3478 405d06 CharNextW 3485 40393c 3478->3485 3481 403a2b 3479->3481 3481->3476 3483 403acc 3481->3483 3482 403a47 3482->3483 3486 403ab1 3482->3486 3487 405d06 CharNextW 3482->3487 3640 403859 3483->3640 3485->3472 3485->3478 3493 4039d8 3485->3493 3582 40592c 3486->3582 3499 403a5e 3487->3499 3491 403ae1 3647 405ca0 3491->3647 3492 403bce 3495 403c51 3492->3495 3497 4062fc 3 API calls 3492->3497 3651 406009 lstrcpynW 3493->3651 3501 403bdd 3497->3501 3502 403af7 lstrcatW lstrcmpiW 3499->3502 3503 403a89 3499->3503 3504 4062fc 3 API calls 3501->3504 3502->3483 3506 403b13 CreateDirectoryW SetCurrentDirectoryW 3502->3506 3652 40677e 3503->3652 3507 403be6 3504->3507 3509 403b36 3506->3509 3510 403b2b 3506->3510 3511 4062fc 3 API calls 3507->3511 3682 406009 lstrcpynW 3509->3682 3681 406009 lstrcpynW 3510->3681 3515 403bef 3511->3515 3514 403b44 3683 406009 lstrcpynW 3514->3683 3518 403c3d ExitWindowsEx 3515->3518 3523 403bfd GetCurrentProcess 3515->3523 3518->3495 3520 403c4a 3518->3520 3519 403aa6 3667 406009 lstrcpynW 3519->3667 3711 40141d 3520->3711 3526 403c0d 3523->3526 3526->3518 3527 403b79 CopyFileW 3529 403b53 3527->3529 3528 403bc2 3530 406c68 42 API calls 3528->3530 3529->3528 3533 406805 18 API calls 3529->3533 3535 403bad CloseHandle 3529->3535 3684 406805 3529->3684 3703 406c68 3529->3703 3708 405c3f CreateProcessW 3529->3708 3532 403bc9 3530->3532 3532->3483 3533->3529 3535->3529 3537 406314 LoadLibraryA 3536->3537 3538 40631f GetProcAddress 3536->3538 3537->3538 3539 4038c6 SHGetFileInfoW 3537->3539 3538->3539 3540 406009 lstrcpynW 3539->3540 3540->3466 3541->3468 3543 405d0c 3542->3543 3544 40392a CharNextW 3543->3544 3545 405d13 CharNextW 3543->3545 3544->3485 3545->3543 3714 406038 3546->3714 3548 4037e2 3548->3475 3549 4037d8 3549->3548 3723 406722 lstrlenW CharPrevW 3549->3723 3730 405e50 GetFileAttributesW CreateFileW 3554->3730 3556 4035c7 3577 4035d7 3556->3577 3731 406009 lstrcpynW 3556->3731 3558 4035ed 3732 406751 lstrlenW 3558->3732 3562 4035fe GetFileSize 3563 4036fa 3562->3563 3576 403615 3562->3576 3739 4032d2 3563->3739 3565 403703 3567 40373f GlobalAlloc 3565->3567 3565->3577 3773 403368 SetFilePointer 3565->3773 3750 403368 SetFilePointer 3567->3750 3569 4037bd 3573 4032d2 6 API calls 3569->3573 3571 40375a 3751 40337f 3571->3751 3572 403720 3575 403336 ReadFile 3572->3575 3573->3577 3578 40372b 3575->3578 3576->3563 3576->3569 3576->3577 3579 4032d2 6 API calls 3576->3579 3737 403336 ReadFile 3576->3737 3577->3482 3578->3567 3578->3577 3579->3576 3580 403766 3580->3577 3580->3580 3581 403794 SetFilePointer 3580->3581 3581->3577 3583 4062fc 3 API calls 3582->3583 3584 405940 3583->3584 3585 405946 3584->3585 3586 405958 3584->3586 3806 405f51 wsprintfW 3585->3806 3807 405ed3 RegOpenKeyExW 3586->3807 3590 4059a8 lstrcatW 3592 405956 3590->3592 3591 405ed3 3 API calls 3591->3590 3797 403e95 3592->3797 3595 40677e 18 API calls 3596 4059da 3595->3596 3597 405a70 3596->3597 3599 405ed3 3 API calls 3596->3599 3598 40677e 18 API calls 3597->3598 3600 405a76 3598->3600 3601 405a0c 3599->3601 3602 405a86 3600->3602 3603 406805 18 API calls 3600->3603 3601->3597 3607 405a2f lstrlenW 3601->3607 3613 405d06 CharNextW 3601->3613 3604 405aa6 LoadImageW 3602->3604 3813 403e74 3602->3813 3603->3602 3605 405ad1 RegisterClassW 3604->3605 3606 405b66 3604->3606 3611 405b19 SystemParametersInfoW CreateWindowExW 3605->3611 3614 403ac1 3605->3614 3612 40141d 80 API calls 3606->3612 3608 405a63 3607->3608 3609 405a3d lstrcmpiW 3607->3609 3617 406722 3 API calls 3608->3617 3609->3608 3615 405a4d GetFileAttributesW 3609->3615 3611->3606 3618 405b6c 3612->3618 3619 405a2a 3613->3619 3668 4060e7 3614->3668 3620 405a59 3615->3620 3616 405a9c 3616->3604 3621 405a69 3617->3621 3618->3614 3624 403e95 19 API calls 3618->3624 3619->3607 3620->3608 3622 406751 2 API calls 3620->3622 3812 406009 lstrcpynW 3621->3812 3622->3608 3625 405b7d 3624->3625 3626 405b89 ShowWindow LoadLibraryW 3625->3626 3627 405c0c 3625->3627 3629 405ba8 LoadLibraryW 3626->3629 3630 405baf GetClassInfoW 3626->3630 3818 405047 OleInitialize 3627->3818 3629->3630 3631 405bc3 GetClassInfoW RegisterClassW 3630->3631 3632 405bd9 DialogBoxParamW 3630->3632 3631->3632 3634 40141d 80 API calls 3632->3634 3633 405c12 3635 405c16 3633->3635 3636 405c2e 3633->3636 3637 405c01 3634->3637 3635->3614 3639 40141d 80 API calls 3635->3639 3638 40141d 80 API calls 3636->3638 3637->3614 3638->3614 3639->3614 3641 403871 3640->3641 3642 403863 CloseHandle 3640->3642 3966 403c83 3641->3966 3642->3641 3648 405cb5 3647->3648 3649 403aef ExitProcess 3648->3649 3650 405ccb MessageBoxIndirectW 3648->3650 3650->3649 3651->3473 4023 406009 lstrcpynW 3652->4023 3654 40678f 3655 405d59 4 API calls 3654->3655 3656 406795 3655->3656 3657 406038 5 API calls 3656->3657 3664 403a97 3656->3664 3663 4067a5 3657->3663 3658 4067dd lstrlenW 3659 4067e4 3658->3659 3658->3663 3660 406722 3 API calls 3659->3660 3662 4067ea GetFileAttributesW 3660->3662 3661 4062d5 2 API calls 3661->3663 3662->3664 3663->3658 3663->3661 3663->3664 3665 406751 2 API calls 3663->3665 3664->3483 3666 406009 lstrcpynW 3664->3666 3665->3658 3666->3519 3667->3486 3669 406110 3668->3669 3670 4060f3 3668->3670 3672 406187 3669->3672 3673 40612d 3669->3673 3676 406104 3669->3676 3671 4060fd CloseHandle 3670->3671 3670->3676 3671->3676 3674 406190 lstrcatW lstrlenW WriteFile 3672->3674 3672->3676 3673->3674 3675 406136 GetFileAttributesW 3673->3675 3674->3676 4024 405e50 GetFileAttributesW CreateFileW 3675->4024 3676->3483 3678 406152 3678->3676 3679 406162 WriteFile 3678->3679 3680 40617c SetFilePointer 3678->3680 3679->3680 3680->3672 3681->3509 3682->3514 3683->3529 3697 406812 3684->3697 3685 406a7f 3686 403b6c DeleteFileW 3685->3686 4027 406009 lstrcpynW 3685->4027 3686->3527 3686->3529 3688 4068d3 GetVersion 3700 4068e0 3688->3700 3689 406a46 lstrlenW 3689->3697 3690 406805 10 API calls 3690->3689 3693 405ed3 3 API calls 3693->3700 3694 406952 GetSystemDirectoryW 3694->3700 3695 406965 GetWindowsDirectoryW 3695->3700 3696 406038 5 API calls 3696->3697 3697->3685 3697->3688 3697->3689 3697->3690 3697->3696 4025 405f51 wsprintfW 3697->4025 4026 406009 lstrcpynW 3697->4026 3698 406805 10 API calls 3698->3700 3699 4069df lstrcatW 3699->3697 3700->3693 3700->3694 3700->3695 3700->3697 3700->3698 3700->3699 3701 406999 SHGetSpecialFolderLocation 3700->3701 3701->3700 3702 4069b1 SHGetPathFromIDListW CoTaskMemFree 3701->3702 3702->3700 3704 4062fc 3 API calls 3703->3704 3705 406c6f 3704->3705 3707 406c90 3705->3707 4028 406a99 lstrcpyW 3705->4028 3707->3529 3709 405c7a 3708->3709 3710 405c6e CloseHandle 3708->3710 3709->3529 3710->3709 3712 40139d 80 API calls 3711->3712 3713 401432 3712->3713 3713->3495 3720 406045 3714->3720 3715 4060bb 3716 4060c1 CharPrevW 3715->3716 3718 4060e1 3715->3718 3716->3715 3717 4060ae CharNextW 3717->3715 3717->3720 3718->3549 3719 405d06 CharNextW 3719->3720 3720->3715 3720->3717 3720->3719 3721 40609a CharNextW 3720->3721 3722 4060a9 CharNextW 3720->3722 3721->3720 3722->3717 3724 4037ea CreateDirectoryW 3723->3724 3725 40673f lstrcatW 3723->3725 3726 405e7f 3724->3726 3725->3724 3727 405e8c GetTickCount GetTempFileNameW 3726->3727 3728 405ec2 3727->3728 3729 4037fe 3727->3729 3728->3727 3728->3729 3729->3475 3730->3556 3731->3558 3733 406760 3732->3733 3734 4035f3 3733->3734 3735 406766 CharPrevW 3733->3735 3736 406009 lstrcpynW 3734->3736 3735->3733 3735->3734 3736->3562 3738 403357 3737->3738 3738->3576 3740 4032f3 3739->3740 3741 4032db 3739->3741 3744 403303 GetTickCount 3740->3744 3745 4032fb 3740->3745 3742 4032e4 DestroyWindow 3741->3742 3743 4032eb 3741->3743 3742->3743 3743->3565 3747 403311 CreateDialogParamW ShowWindow 3744->3747 3748 403334 3744->3748 3774 406332 3745->3774 3747->3748 3748->3565 3750->3571 3753 403398 3751->3753 3752 4033c3 3755 403336 ReadFile 3752->3755 3753->3752 3785 403368 SetFilePointer 3753->3785 3756 4033ce 3755->3756 3757 4033e7 GetTickCount 3756->3757 3758 403518 3756->3758 3760 4033d2 3756->3760 3770 4033fa 3757->3770 3759 40351c 3758->3759 3764 403540 3758->3764 3761 403336 ReadFile 3759->3761 3760->3580 3761->3760 3762 403336 ReadFile 3762->3764 3763 403336 ReadFile 3763->3770 3764->3760 3764->3762 3765 40355f WriteFile 3764->3765 3765->3760 3766 403574 3765->3766 3766->3760 3766->3764 3768 40345c GetTickCount 3768->3770 3769 403485 MulDiv wsprintfW 3786 404f72 3769->3786 3770->3760 3770->3763 3770->3768 3770->3769 3772 4034c9 WriteFile 3770->3772 3778 407312 3770->3778 3772->3760 3772->3770 3773->3572 3775 40634f PeekMessageW 3774->3775 3776 406345 DispatchMessageW 3775->3776 3777 403301 3775->3777 3776->3775 3777->3565 3779 407332 3778->3779 3780 40733a 3778->3780 3779->3770 3780->3779 3781 4073c2 GlobalFree 3780->3781 3782 4073cb GlobalAlloc 3780->3782 3783 407443 GlobalAlloc 3780->3783 3784 40743a GlobalFree 3780->3784 3781->3782 3782->3779 3782->3780 3783->3779 3783->3780 3784->3783 3785->3752 3787 404f8b 3786->3787 3796 40502f 3786->3796 3788 404fa9 lstrlenW 3787->3788 3789 406805 18 API calls 3787->3789 3790 404fd2 3788->3790 3791 404fb7 lstrlenW 3788->3791 3789->3788 3793 404fe5 3790->3793 3794 404fd8 SetWindowTextW 3790->3794 3792 404fc9 lstrcatW 3791->3792 3791->3796 3792->3790 3795 404feb SendMessageW SendMessageW SendMessageW 3793->3795 3793->3796 3794->3793 3795->3796 3796->3770 3798 403ea9 3797->3798 3826 405f51 wsprintfW 3798->3826 3800 403f1d 3801 406805 18 API calls 3800->3801 3802 403f29 SetWindowTextW 3801->3802 3804 403f44 3802->3804 3803 403f5f 3803->3595 3804->3803 3805 406805 18 API calls 3804->3805 3805->3804 3806->3592 3808 405f07 RegQueryValueExW 3807->3808 3809 405989 3807->3809 3810 405f29 RegCloseKey 3808->3810 3809->3590 3809->3591 3810->3809 3812->3597 3827 406009 lstrcpynW 3813->3827 3815 403e88 3816 406722 3 API calls 3815->3816 3817 403e8e lstrcatW 3816->3817 3817->3616 3828 403daf 3818->3828 3820 40506a 3823 4062a3 11 API calls 3820->3823 3825 405095 3820->3825 3831 40139d 3820->3831 3821 403daf SendMessageW 3822 4050a5 OleUninitialize 3821->3822 3822->3633 3823->3820 3825->3821 3826->3800 3827->3815 3829 403dc7 3828->3829 3830 403db8 SendMessageW 3828->3830 3829->3820 3830->3829 3834 4013a4 3831->3834 3832 401410 3832->3820 3834->3832 3835 4013dd MulDiv SendMessageW 3834->3835 3836 4015a0 3834->3836 3835->3834 3837 4015fa 3836->3837 3916 40160c 3836->3916 3838 401601 3837->3838 3839 401742 3837->3839 3840 401962 3837->3840 3841 4019ca 3837->3841 3842 40176e 3837->3842 3843 401650 3837->3843 3844 4017b1 3837->3844 3845 401672 3837->3845 3846 401693 3837->3846 3847 401616 3837->3847 3848 4016d6 3837->3848 3849 401736 3837->3849 3850 401897 3837->3850 3851 4018db 3837->3851 3852 40163c 3837->3852 3853 4016bd 3837->3853 3837->3916 3866 4062a3 11 API calls 3838->3866 3858 401751 ShowWindow 3839->3858 3859 401758 3839->3859 3863 40145c 18 API calls 3840->3863 3856 40145c 18 API calls 3841->3856 3860 40145c 18 API calls 3842->3860 3943 4062a3 lstrlenW wvsprintfW 3843->3943 3949 40145c 3844->3949 3861 40145c 18 API calls 3845->3861 3946 401446 3846->3946 3855 40145c 18 API calls 3847->3855 3872 401446 18 API calls 3848->3872 3848->3916 3849->3916 3965 405f51 wsprintfW 3849->3965 3862 40145c 18 API calls 3850->3862 3867 40145c 18 API calls 3851->3867 3857 401647 PostQuitMessage 3852->3857 3852->3916 3854 4062a3 11 API calls 3853->3854 3869 4016c7 SetForegroundWindow 3854->3869 3870 40161c 3855->3870 3871 4019d1 SearchPathW 3856->3871 3857->3916 3858->3859 3873 401765 ShowWindow 3859->3873 3859->3916 3874 401775 3860->3874 3875 401678 3861->3875 3876 40189d 3862->3876 3877 401968 GetFullPathNameW 3863->3877 3866->3916 3868 4018e2 3867->3868 3880 40145c 18 API calls 3868->3880 3869->3916 3881 4062a3 11 API calls 3870->3881 3871->3916 3872->3916 3873->3916 3884 4062a3 11 API calls 3874->3884 3885 4062a3 11 API calls 3875->3885 3961 4062d5 FindFirstFileW 3876->3961 3887 40197f 3877->3887 3929 4019a1 3877->3929 3879 40169a 3889 4062a3 11 API calls 3879->3889 3890 4018eb 3880->3890 3891 401627 3881->3891 3893 401785 SetFileAttributesW 3884->3893 3894 401683 3885->3894 3911 4062d5 2 API calls 3887->3911 3887->3929 3888 4062a3 11 API calls 3896 4017c9 3888->3896 3897 4016a7 Sleep 3889->3897 3899 40145c 18 API calls 3890->3899 3900 404f72 25 API calls 3891->3900 3902 40179a 3893->3902 3893->3916 3909 404f72 25 API calls 3894->3909 3954 405d59 CharNextW CharNextW 3896->3954 3897->3916 3898 4019b8 GetShortPathNameW 3898->3916 3907 4018f5 3899->3907 3900->3916 3901 40139d 65 API calls 3901->3916 3908 4062a3 11 API calls 3902->3908 3903 4018c2 3912 4062a3 11 API calls 3903->3912 3904 4018a9 3910 4062a3 11 API calls 3904->3910 3914 4062a3 11 API calls 3907->3914 3908->3916 3909->3916 3910->3916 3915 401991 3911->3915 3912->3916 3913 4017d4 3917 401864 3913->3917 3920 405d06 CharNextW 3913->3920 3938 4062a3 11 API calls 3913->3938 3918 401902 MoveFileW 3914->3918 3915->3929 3964 406009 lstrcpynW 3915->3964 3916->3834 3917->3894 3919 40186e 3917->3919 3921 401912 3918->3921 3922 40191e 3918->3922 3923 404f72 25 API calls 3919->3923 3925 4017e6 CreateDirectoryW 3920->3925 3921->3894 3927 401942 3922->3927 3932 4062d5 2 API calls 3922->3932 3928 401875 3923->3928 3925->3913 3926 4017fe GetLastError 3925->3926 3930 401827 GetFileAttributesW 3926->3930 3931 40180b GetLastError 3926->3931 3937 4062a3 11 API calls 3927->3937 3960 406009 lstrcpynW 3928->3960 3929->3898 3929->3916 3930->3913 3934 4062a3 11 API calls 3931->3934 3935 401929 3932->3935 3934->3913 3935->3927 3940 406c68 42 API calls 3935->3940 3936 401882 SetCurrentDirectoryW 3936->3916 3939 40195c 3937->3939 3938->3913 3939->3916 3941 401936 3940->3941 3942 404f72 25 API calls 3941->3942 3942->3927 3944 4060e7 9 API calls 3943->3944 3945 401664 3944->3945 3945->3901 3947 406805 18 API calls 3946->3947 3948 401455 3947->3948 3948->3879 3950 406805 18 API calls 3949->3950 3951 401488 3950->3951 3952 401497 3951->3952 3953 406038 5 API calls 3951->3953 3952->3888 3953->3952 3955 405d76 3954->3955 3956 405d88 3954->3956 3955->3956 3957 405d83 CharNextW 3955->3957 3958 405dac 3956->3958 3959 405d06 CharNextW 3956->3959 3957->3958 3958->3913 3959->3956 3960->3936 3962 4018a5 3961->3962 3963 4062eb FindClose 3961->3963 3962->3903 3962->3904 3963->3962 3964->3929 3965->3916 3967 403c91 3966->3967 3968 403876 3967->3968 3969 403c96 FreeLibrary GlobalFree 3967->3969 3970 406c9b 3968->3970 3969->3968 3969->3969 3971 40677e 18 API calls 3970->3971 3972 406cae 3971->3972 3973 406cb7 DeleteFileW 3972->3973 3974 406cce 3972->3974 4014 403882 CoUninitialize 3973->4014 3975 406e4b 3974->3975 4018 406009 lstrcpynW 3974->4018 3981 4062d5 2 API calls 3975->3981 4003 406e58 3975->4003 3975->4014 3977 406cf9 3978 406d03 lstrcatW 3977->3978 3979 406d0d 3977->3979 3980 406d13 3978->3980 3982 406751 2 API calls 3979->3982 3984 406d23 lstrcatW 3980->3984 3985 406d19 3980->3985 3983 406e64 3981->3983 3982->3980 3988 406722 3 API calls 3983->3988 3983->4014 3987 406d2b lstrlenW FindFirstFileW 3984->3987 3985->3984 3985->3987 3986 4062a3 11 API calls 3986->4014 3989 406e3b 3987->3989 3993 406d52 3987->3993 3990 406e6e 3988->3990 3989->3975 3992 4062a3 11 API calls 3990->3992 3991 405d06 CharNextW 3991->3993 3994 406e79 3992->3994 3993->3991 3997 406e18 FindNextFileW 3993->3997 4006 406c9b 72 API calls 3993->4006 4013 404f72 25 API calls 3993->4013 4015 4062a3 11 API calls 3993->4015 4016 404f72 25 API calls 3993->4016 4017 406c68 42 API calls 3993->4017 4019 406009 lstrcpynW 3993->4019 4020 405e30 GetFileAttributesW 3993->4020 3995 405e30 2 API calls 3994->3995 3996 406e81 RemoveDirectoryW 3995->3996 4000 406ec4 3996->4000 4001 406e8d 3996->4001 3997->3993 3999 406e30 FindClose 3997->3999 3999->3989 4002 404f72 25 API calls 4000->4002 4001->4003 4004 406e93 4001->4004 4002->4014 4003->3986 4005 4062a3 11 API calls 4004->4005 4007 406e9d 4005->4007 4006->3993 4009 404f72 25 API calls 4007->4009 4011 406ea7 4009->4011 4012 406c68 42 API calls 4011->4012 4012->4014 4013->3997 4014->3491 4014->3492 4015->3993 4016->3993 4017->3993 4018->3977 4019->3993 4021 405e4d DeleteFileW 4020->4021 4022 405e3f SetFileAttributesW 4020->4022 4021->3993 4022->4021 4023->3654 4024->3678 4025->3697 4026->3697 4027->3686 4029 406ae7 GetShortPathNameW 4028->4029 4030 406abe 4028->4030 4031 406b00 4029->4031 4032 406c62 4029->4032 4054 405e50 GetFileAttributesW CreateFileW 4030->4054 4031->4032 4034 406b08 WideCharToMultiByte 4031->4034 4032->3707 4034->4032 4036 406b25 WideCharToMultiByte 4034->4036 4035 406ac7 CloseHandle GetShortPathNameW 4035->4032 4037 406adf 4035->4037 4036->4032 4038 406b3d wsprintfA 4036->4038 4037->4029 4037->4032 4039 406805 18 API calls 4038->4039 4040 406b69 4039->4040 4055 405e50 GetFileAttributesW CreateFileW 4040->4055 4042 406b76 4042->4032 4043 406b83 GetFileSize GlobalAlloc 4042->4043 4044 406ba4 ReadFile 4043->4044 4045 406c58 CloseHandle 4043->4045 4044->4045 4046 406bbe 4044->4046 4045->4032 4046->4045 4056 405db6 lstrlenA 4046->4056 4049 406bd7 lstrcpyA 4052 406bf9 4049->4052 4050 406beb 4051 405db6 4 API calls 4050->4051 4051->4052 4053 406c30 SetFilePointer WriteFile GlobalFree 4052->4053 4053->4045 4054->4035 4055->4042 4057 405df7 lstrlenA 4056->4057 4058 405dd0 lstrcmpiA 4057->4058 4059 405dff 4057->4059 4058->4059 4060 405dee CharNextA 4058->4060 4059->4049 4059->4050 4060->4057 4921 402a84 4922 401553 19 API calls 4921->4922 4923 402a8e 4922->4923 4924 401446 18 API calls 4923->4924 4925 402a98 4924->4925 4926 401a13 4925->4926 4927 402ab2 RegEnumKeyW 4925->4927 4928 402abe RegEnumValueW 4925->4928 4929 402a7e 4927->4929 4928->4926 4928->4929 4929->4926 4930 4029e4 RegCloseKey 4929->4930 4930->4926 4931 402c8a 4932 402ca2 4931->4932 4933 402c8f 4931->4933 4935 40145c 18 API calls 4932->4935 4934 401446 18 API calls 4933->4934 4937 402c97 4934->4937 4936 402ca9 lstrlenW 4935->4936 4936->4937 4938 402ccb WriteFile 4937->4938 4939 401a13 4937->4939 4938->4939 4940 40400d 4941 40406a 4940->4941 4942 40401a lstrcpynA lstrlenA 4940->4942 4942->4941 4943 40404b 4942->4943 4943->4941 4944 404057 GlobalFree 4943->4944 4944->4941 4945 401d8e 4946 40145c 18 API calls 4945->4946 4947 401d95 ExpandEnvironmentStringsW 4946->4947 4948 401da8 4947->4948 4950 401db9 4947->4950 4949 401dad lstrcmpW 4948->4949 4948->4950 4949->4950 4951 401e0f 4952 401446 18 API calls 4951->4952 4953 401e17 4952->4953 4954 401446 18 API calls 4953->4954 4955 401e21 4954->4955 4956 4030e3 4955->4956 4958 405f51 wsprintfW 4955->4958 4958->4956 4959 402392 4960 40145c 18 API calls 4959->4960 4961 402399 4960->4961 4964 4071f8 4961->4964 4965 406ed2 25 API calls 4964->4965 4966 407218 4965->4966 4967 407222 lstrcpynW lstrcmpW 4966->4967 4968 4023a7 4966->4968 4969 407254 4967->4969 4970 40725a lstrcpynW 4967->4970 4969->4970 4970->4968 4971 402713 4986 406009 lstrcpynW 4971->4986 4973 40272c 4987 406009 lstrcpynW 4973->4987 4975 402738 4976 40145c 18 API calls 4975->4976 4978 402743 4975->4978 4976->4978 4977 402752 4980 40145c 18 API calls 4977->4980 4982 402761 4977->4982 4978->4977 4979 40145c 18 API calls 4978->4979 4979->4977 4980->4982 4981 40145c 18 API calls 4983 40276b 4981->4983 4982->4981 4984 4062a3 11 API calls 4983->4984 4985 40277f WritePrivateProfileStringW 4984->4985 4986->4973 4987->4975 4988 402797 4989 40145c 18 API calls 4988->4989 4990 4027ae 4989->4990 4991 40145c 18 API calls 4990->4991 4992 4027b7 4991->4992 4993 40145c 18 API calls 4992->4993 4994 4027c0 GetPrivateProfileStringW lstrcmpW 4993->4994 4995 402e18 4996 40145c 18 API calls 4995->4996 4997 402e1f FindFirstFileW 4996->4997 4998 402e32 4997->4998 5003 405f51 wsprintfW 4998->5003 5000 402e43 5004 406009 lstrcpynW 5000->5004 5002 402e50 5003->5000 5004->5002 5005 401e9a 5006 40145c 18 API calls 5005->5006 5007 401ea1 5006->5007 5008 401446 18 API calls 5007->5008 5009 401eab wsprintfW 5008->5009 4115 401a1f 4116 40145c 18 API calls 4115->4116 4117 401a26 4116->4117 4118 4062a3 11 API calls 4117->4118 4119 401a49 4118->4119 4120 401a64 4119->4120 4121 401a5c 4119->4121 4169 406009 lstrcpynW 4120->4169 4168 406009 lstrcpynW 4121->4168 4124 401a62 4128 406038 5 API calls 4124->4128 4125 401a6f 4126 406722 3 API calls 4125->4126 4127 401a75 lstrcatW 4126->4127 4127->4124 4130 401a81 4128->4130 4129 4062d5 2 API calls 4129->4130 4130->4129 4131 405e30 2 API calls 4130->4131 4133 401a98 CompareFileTime 4130->4133 4134 401ba9 4130->4134 4138 4062a3 11 API calls 4130->4138 4142 406009 lstrcpynW 4130->4142 4148 406805 18 API calls 4130->4148 4155 405ca0 MessageBoxIndirectW 4130->4155 4159 401b50 4130->4159 4166 401b5d 4130->4166 4167 405e50 GetFileAttributesW CreateFileW 4130->4167 4131->4130 4133->4130 4135 404f72 25 API calls 4134->4135 4137 401bb3 4135->4137 4136 404f72 25 API calls 4139 401b70 4136->4139 4140 40337f 37 API calls 4137->4140 4138->4130 4143 4062a3 11 API calls 4139->4143 4141 401bc6 4140->4141 4144 4062a3 11 API calls 4141->4144 4142->4130 4150 401b8b 4143->4150 4145 401bda 4144->4145 4146 401be9 SetFileTime 4145->4146 4147 401bf8 CloseHandle 4145->4147 4146->4147 4149 401c09 4147->4149 4147->4150 4148->4130 4151 401c21 4149->4151 4152 401c0e 4149->4152 4154 406805 18 API calls 4151->4154 4153 406805 18 API calls 4152->4153 4156 401c16 lstrcatW 4153->4156 4157 401c29 4154->4157 4155->4130 4156->4157 4158 4062a3 11 API calls 4157->4158 4160 401c34 4158->4160 4161 401b93 4159->4161 4162 401b53 4159->4162 4163 405ca0 MessageBoxIndirectW 4160->4163 4164 4062a3 11 API calls 4161->4164 4165 4062a3 11 API calls 4162->4165 4163->4150 4164->4150 4165->4166 4166->4136 4167->4130 4168->4124 4169->4125 5010 40209f GetDlgItem GetClientRect 5011 40145c 18 API calls 5010->5011 5012 4020cf LoadImageW SendMessageW 5011->5012 5013 4030e3 5012->5013 5014 4020ed DeleteObject 5012->5014 5014->5013 5015 402b9f 5016 401446 18 API calls 5015->5016 5021 402ba7 5016->5021 5017 402c4a 5018 402bdf ReadFile 5020 402c3d 5018->5020 5018->5021 5019 401446 18 API calls 5019->5020 5020->5017 5020->5019 5027 402d17 ReadFile 5020->5027 5021->5017 5021->5018 5021->5020 5022 402c06 MultiByteToWideChar 5021->5022 5023 402c3f 5021->5023 5025 402c4f 5021->5025 5022->5021 5022->5025 5028 405f51 wsprintfW 5023->5028 5025->5020 5026 402c6b SetFilePointer 5025->5026 5026->5020 5027->5020 5028->5017 5029 402b23 GlobalAlloc 5030 402b39 5029->5030 5031 402b4b 5029->5031 5032 401446 18 API calls 5030->5032 5033 40145c 18 API calls 5031->5033 5034 402b41 5032->5034 5035 402b52 WideCharToMultiByte lstrlenA 5033->5035 5036 402b93 5034->5036 5037 402b84 WriteFile 5034->5037 5035->5034 5037->5036 5038 402384 GlobalFree 5037->5038 5038->5036 5040 4044a5 5041 404512 5040->5041 5042 4044df 5040->5042 5044 40451f GetDlgItem GetAsyncKeyState 5041->5044 5051 4045b1 5041->5051 5108 405c84 GetDlgItemTextW 5042->5108 5047 40453e GetDlgItem 5044->5047 5054 40455c 5044->5054 5045 4044ea 5048 406038 5 API calls 5045->5048 5046 40469d 5106 404833 5046->5106 5110 405c84 GetDlgItemTextW 5046->5110 5049 403d3f 19 API calls 5047->5049 5050 4044f0 5048->5050 5053 404551 ShowWindow 5049->5053 5056 403e74 5 API calls 5050->5056 5051->5046 5057 406805 18 API calls 5051->5057 5051->5106 5053->5054 5059 404579 SetWindowTextW 5054->5059 5064 405d59 4 API calls 5054->5064 5055 403dca 8 API calls 5060 404847 5055->5060 5061 4044f5 GetDlgItem 5056->5061 5062 40462f SHBrowseForFolderW 5057->5062 5058 4046c9 5063 40677e 18 API calls 5058->5063 5065 403d3f 19 API calls 5059->5065 5066 404503 IsDlgButtonChecked 5061->5066 5061->5106 5062->5046 5067 404647 CoTaskMemFree 5062->5067 5068 4046cf 5063->5068 5069 40456f 5064->5069 5070 404597 5065->5070 5066->5041 5071 406722 3 API calls 5067->5071 5111 406009 lstrcpynW 5068->5111 5069->5059 5075 406722 3 API calls 5069->5075 5072 403d3f 19 API calls 5070->5072 5073 404654 5071->5073 5076 4045a2 5072->5076 5077 40468b SetDlgItemTextW 5073->5077 5082 406805 18 API calls 5073->5082 5075->5059 5109 403d98 SendMessageW 5076->5109 5077->5046 5078 4046e6 5080 4062fc 3 API calls 5078->5080 5089 4046ee 5080->5089 5081 4045aa 5085 4062fc 3 API calls 5081->5085 5083 404673 lstrcmpiW 5082->5083 5083->5077 5086 404684 lstrcatW 5083->5086 5084 404730 5112 406009 lstrcpynW 5084->5112 5085->5051 5086->5077 5088 404739 5090 405d59 4 API calls 5088->5090 5089->5084 5094 406751 2 API calls 5089->5094 5095 404785 5089->5095 5091 40473f GetDiskFreeSpaceW 5090->5091 5093 404763 MulDiv 5091->5093 5091->5095 5093->5095 5094->5089 5097 4047e2 5095->5097 5098 4043ad 21 API calls 5095->5098 5096 404805 5113 403d85 EnableWindow 5096->5113 5097->5096 5099 40141d 80 API calls 5097->5099 5100 4047d3 5098->5100 5099->5096 5102 4047e4 SetDlgItemTextW 5100->5102 5103 4047d8 5100->5103 5102->5097 5104 4043ad 21 API calls 5103->5104 5104->5097 5105 404821 5105->5106 5114 403d61 5105->5114 5106->5055 5108->5045 5109->5081 5110->5058 5111->5078 5112->5088 5113->5105 5115 403d74 SendMessageW 5114->5115 5116 403d6f 5114->5116 5115->5106 5116->5115 5117 402da5 5118 4030e3 5117->5118 5119 402dac 5117->5119 5120 401446 18 API calls 5119->5120 5121 402db8 5120->5121 5122 402dbf SetFilePointer 5121->5122 5122->5118 5123 402dcf 5122->5123 5123->5118 5125 405f51 wsprintfW 5123->5125 5125->5118 5126 4030a9 SendMessageW 5127 4030c2 InvalidateRect 5126->5127 5128 4030e3 5126->5128 5127->5128 5129 401cb2 5130 40145c 18 API calls 5129->5130 5131 401c54 5130->5131 5132 4062a3 11 API calls 5131->5132 5135 401c64 5131->5135 5133 401c59 5132->5133 5134 406c9b 81 API calls 5133->5134 5134->5135 4061 4021b5 4062 40145c 18 API calls 4061->4062 4063 4021bb 4062->4063 4064 40145c 18 API calls 4063->4064 4065 4021c4 4064->4065 4066 40145c 18 API calls 4065->4066 4067 4021cd 4066->4067 4068 40145c 18 API calls 4067->4068 4069 4021d6 4068->4069 4070 404f72 25 API calls 4069->4070 4071 4021e2 ShellExecuteW 4070->4071 4072 40221b 4071->4072 4073 40220d 4071->4073 4075 4062a3 11 API calls 4072->4075 4074 4062a3 11 API calls 4073->4074 4074->4072 4076 402230 4075->4076 5143 402238 5144 40145c 18 API calls 5143->5144 5145 40223e 5144->5145 5146 4062a3 11 API calls 5145->5146 5147 40224b 5146->5147 5148 404f72 25 API calls 5147->5148 5149 402255 5148->5149 5150 405c3f 2 API calls 5149->5150 5151 40225b 5150->5151 5152 4062a3 11 API calls 5151->5152 5155 4022ac CloseHandle 5151->5155 5158 40226d 5152->5158 5154 4030e3 5155->5154 5156 402283 WaitForSingleObject 5157 402291 GetExitCodeProcess 5156->5157 5156->5158 5157->5155 5160 4022a3 5157->5160 5158->5155 5158->5156 5159 406332 2 API calls 5158->5159 5159->5156 5162 405f51 wsprintfW 5160->5162 5162->5155 5163 4040b8 5164 4040d3 5163->5164 5172 404201 5163->5172 5168 40410e 5164->5168 5194 403fca WideCharToMultiByte 5164->5194 5165 40426c 5166 404276 GetDlgItem 5165->5166 5167 40433e 5165->5167 5169 404290 5166->5169 5170 4042ff 5166->5170 5173 403dca 8 API calls 5167->5173 5175 403d3f 19 API calls 5168->5175 5169->5170 5178 4042b6 6 API calls 5169->5178 5170->5167 5179 404311 5170->5179 5172->5165 5172->5167 5174 40423b GetDlgItem SendMessageW 5172->5174 5177 404339 5173->5177 5199 403d85 EnableWindow 5174->5199 5176 40414e 5175->5176 5181 403d3f 19 API calls 5176->5181 5178->5170 5182 404327 5179->5182 5183 404317 SendMessageW 5179->5183 5186 40415b CheckDlgButton 5181->5186 5182->5177 5187 40432d SendMessageW 5182->5187 5183->5182 5184 404267 5185 403d61 SendMessageW 5184->5185 5185->5165 5197 403d85 EnableWindow 5186->5197 5187->5177 5189 404179 GetDlgItem 5198 403d98 SendMessageW 5189->5198 5191 40418f SendMessageW 5192 4041b5 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5191->5192 5193 4041ac GetSysColor 5191->5193 5192->5177 5193->5192 5195 404007 5194->5195 5196 403fe9 GlobalAlloc WideCharToMultiByte 5194->5196 5195->5168 5196->5195 5197->5189 5198->5191 5199->5184 4077 401eb9 4078 401f24 4077->4078 4079 401ec6 4077->4079 4080 401f53 GlobalAlloc 4078->4080 4081 401f28 4078->4081 4082 401ed5 4079->4082 4089 401ef7 4079->4089 4083 406805 18 API calls 4080->4083 4088 4062a3 11 API calls 4081->4088 4093 401f36 4081->4093 4084 4062a3 11 API calls 4082->4084 4087 401f46 4083->4087 4085 401ee2 4084->4085 4090 402708 4085->4090 4095 406805 18 API calls 4085->4095 4087->4090 4091 402387 GlobalFree 4087->4091 4088->4093 4099 406009 lstrcpynW 4089->4099 4091->4090 4101 406009 lstrcpynW 4093->4101 4094 401f06 4100 406009 lstrcpynW 4094->4100 4095->4085 4097 401f15 4102 406009 lstrcpynW 4097->4102 4099->4094 4100->4097 4101->4087 4102->4090 5200 4074bb 5202 407344 5200->5202 5201 407c6d 5202->5201 5203 4073c2 GlobalFree 5202->5203 5204 4073cb GlobalAlloc 5202->5204 5205 407443 GlobalAlloc 5202->5205 5206 40743a GlobalFree 5202->5206 5203->5204 5204->5201 5204->5202 5205->5201 5205->5202 5206->5205

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 146 403883-403919 #17 SetErrorMode OleInitialize call 4062fc SHGetFileInfoW call 406009 GetCommandLineW call 406009 GetModuleHandleW 153 403923-403937 call 405d06 CharNextW 146->153 154 40391b-40391e 146->154 157 4039ca-4039d0 153->157 154->153 158 4039d6 157->158 159 40393c-403942 157->159 160 4039f5-403a0d GetTempPathW call 4037cc 158->160 161 403944-40394a 159->161 162 40394c-403950 159->162 169 403a33-403a4d DeleteFileW call 403587 160->169 170 403a0f-403a2d GetWindowsDirectoryW lstrcatW call 4037cc 160->170 161->161 161->162 164 403952-403957 162->164 165 403958-40395c 162->165 164->165 167 4039b8-4039c5 call 405d06 165->167 168 40395e-403965 165->168 167->157 183 4039c7 167->183 172 403967-40396e 168->172 173 40397a-40398c call 403800 168->173 186 403acc-403adb call 403859 CoUninitialize 169->186 187 403a4f-403a55 169->187 170->169 170->186 174 403970-403973 172->174 175 403975 172->175 184 4039a1-4039b6 call 403800 173->184 185 40398e-403995 173->185 174->173 174->175 175->173 183->157 184->167 202 4039d8-4039f0 call 407d6e call 406009 184->202 189 403997-40399a 185->189 190 40399c 185->190 200 403ae1-403af1 call 405ca0 ExitProcess 186->200 201 403bce-403bd4 186->201 192 403ab5-403abc call 40592c 187->192 193 403a57-403a60 call 405d06 187->193 189->184 189->190 190->184 199 403ac1-403ac7 call 4060e7 192->199 203 403a79-403a7b 193->203 199->186 206 403c51-403c59 201->206 207 403bd6-403bf3 call 4062fc * 3 201->207 202->160 211 403a62-403a74 call 403800 203->211 212 403a7d-403a87 203->212 213 403c5b 206->213 214 403c5f 206->214 238 403bf5-403bf7 207->238 239 403c3d-403c48 ExitWindowsEx 207->239 211->212 225 403a76 211->225 219 403af7-403b11 lstrcatW lstrcmpiW 212->219 220 403a89-403a99 call 40677e 212->220 213->214 219->186 224 403b13-403b29 CreateDirectoryW SetCurrentDirectoryW 219->224 220->186 231 403a9b-403ab1 call 406009 * 2 220->231 228 403b36-403b56 call 406009 * 2 224->228 229 403b2b-403b31 call 406009 224->229 225->203 245 403b5b-403b77 call 406805 DeleteFileW 228->245 229->228 231->192 238->239 243 403bf9-403bfb 238->243 239->206 242 403c4a-403c4c call 40141d 239->242 242->206 243->239 247 403bfd-403c0f GetCurrentProcess 243->247 253 403bb8-403bc0 245->253 254 403b79-403b89 CopyFileW 245->254 247->239 252 403c11-403c33 247->252 252->239 253->245 255 403bc2-403bc9 call 406c68 253->255 254->253 256 403b8b-403bab call 406c68 call 406805 call 405c3f 254->256 255->186 256->253 266 403bad-403bb4 CloseHandle 256->266 266->253
                                                      APIs
                                                      • #17.COMCTL32 ref: 004038A2
                                                      • SetErrorMode.KERNELBASE(00008001), ref: 004038AD
                                                      • OleInitialize.OLE32(00000000), ref: 004038B4
                                                        • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                        • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                        • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                      • SHGetFileInfoW.SHELL32(00409264,00000000,?,000002B4,00000000), ref: 004038DC
                                                        • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                      • GetCommandLineW.KERNEL32(0046ADC0,NSIS Error), ref: 004038F1
                                                      • GetModuleHandleW.KERNEL32(00000000,004C30A0,00000000), ref: 00403904
                                                      • CharNextW.USER32(00000000,004C30A0,00000020), ref: 0040392B
                                                      • GetTempPathW.KERNEL32(00002004,004D70C8,00000000,00000020), ref: 00403A00
                                                      • GetWindowsDirectoryW.KERNEL32(004D70C8,00001FFF), ref: 00403A15
                                                      • lstrcatW.KERNEL32(004D70C8,\Temp), ref: 00403A21
                                                      • DeleteFileW.KERNELBASE(004D30C0), ref: 00403A38
                                                      • CoUninitialize.COMBASE(?), ref: 00403AD1
                                                      • ExitProcess.KERNEL32 ref: 00403AF1
                                                      • lstrcatW.KERNEL32(004D70C8,~nsu.tmp), ref: 00403AFD
                                                      • lstrcmpiW.KERNEL32(004D70C8,004CF0B8,004D70C8,~nsu.tmp), ref: 00403B09
                                                      • CreateDirectoryW.KERNEL32(004D70C8,00000000), ref: 00403B15
                                                      • SetCurrentDirectoryW.KERNEL32(004D70C8), ref: 00403B1C
                                                      • DeleteFileW.KERNEL32(004331E8,004331E8,?,00477008,00409204,00473000,?), ref: 00403B6D
                                                      • CopyFileW.KERNEL32(004DF0D8,004331E8,00000001), ref: 00403B81
                                                      • CloseHandle.KERNEL32(00000000,004331E8,004331E8,?,004331E8,00000000), ref: 00403BAE
                                                      • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C04
                                                      • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C40
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                                      • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp$1C
                                                      • API String ID: 2435955865-239407132
                                                      • Opcode ID: b4c90e19bc4a522d6528af1b5983b0f211df9e73c6af6eb8e5ff34ebe7c06cb6
                                                      • Instruction ID: 7cf1fa831aca86d96b8495533088dbe4cf0b0326274ef0a42366eb07f7c747b9
                                                      • Opcode Fuzzy Hash: b4c90e19bc4a522d6528af1b5983b0f211df9e73c6af6eb8e5ff34ebe7c06cb6
                                                      • Instruction Fuzzy Hash: C4A1B671544305BAD6207F629D4AF1B3EACAF0070AF15483FF585B61D2DBBC8A448B6E

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 625 4074bb-4074c0 626 4074c2-4074ef 625->626 627 40752f-407547 625->627 629 4074f1-4074f4 626->629 630 4074f6-4074fa 626->630 628 407aeb-407aff 627->628 634 407b01-407b17 628->634 635 407b19-407b2c 628->635 631 407506-407509 629->631 632 407502 630->632 633 4074fc-407500 630->633 636 407527-40752a 631->636 637 40750b-407514 631->637 632->631 633->631 638 407b33-407b3a 634->638 635->638 641 4076f6-407713 636->641 642 407516 637->642 643 407519-407525 637->643 639 407b61-407c68 638->639 640 407b3c-407b40 638->640 656 407350 639->656 657 407cec 639->657 645 407b46-407b5e 640->645 646 407ccd-407cd4 640->646 648 407715-407729 641->648 649 40772b-40773e 641->649 642->643 644 407589-4075b6 643->644 652 4075d2-4075ec 644->652 653 4075b8-4075d0 644->653 645->639 650 407cdd-407cea 646->650 654 407741-40774b 648->654 649->654 655 407cef-407cf6 650->655 658 4075f0-4075fa 652->658 653->658 659 40774d 654->659 660 4076ee-4076f4 654->660 661 407357-40735b 656->661 662 40749b-4074b6 656->662 663 40746d-407471 656->663 664 4073ff-407403 656->664 657->655 667 407600 658->667 668 407571-407577 658->668 669 407845-4078a1 659->669 670 4076c9-4076cd 659->670 660->641 666 407692-40769c 660->666 661->650 671 407361-40736e 661->671 662->628 676 407c76-407c7d 663->676 677 407477-40748b 663->677 682 407409-407420 664->682 683 407c6d-407c74 664->683 672 4076a2-4076c4 666->672 673 407c9a-407ca1 666->673 685 407556-40756e 667->685 686 407c7f-407c86 667->686 674 40762a-407630 668->674 675 40757d-407583 668->675 669->628 678 407c91-407c98 670->678 679 4076d3-4076eb 670->679 671->657 687 407374-4073ba 671->687 672->669 673->650 688 40768e 674->688 689 407632-40764f 674->689 675->644 675->688 676->650 684 40748e-407496 677->684 678->650 679->660 690 407423-407427 682->690 683->650 684->663 694 407498 684->694 685->668 686->650 692 4073e2-4073e4 687->692 693 4073bc-4073c0 687->693 688->666 695 407651-407665 689->695 696 407667-40767a 689->696 690->664 691 407429-40742f 690->691 698 407431-407438 691->698 699 407459-40746b 691->699 702 4073f5-4073fd 692->702 703 4073e6-4073f3 692->703 700 4073c2-4073c5 GlobalFree 693->700 701 4073cb-4073d9 GlobalAlloc 693->701 694->662 697 40767d-407687 695->697 696->697 697->674 704 407689 697->704 705 407443-407453 GlobalAlloc 698->705 706 40743a-40743d GlobalFree 698->706 699->684 700->701 701->657 707 4073df 701->707 702->690 703->702 703->703 709 407c88-407c8f 704->709 710 40760f-407627 704->710 705->657 705->699 706->705 707->692 709->650 710->674
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                                      • Instruction ID: b44593247c4c050b0e646bb53675e7b1a8962b0b92449cff70e8ee1879f4dc4f
                                                      • Opcode Fuzzy Hash: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                                      • Instruction Fuzzy Hash: 00F14871908249DBDF18CF28C8946E93BB1FF44345F14852AFD5A9B281D338E986DF86
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                      • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                      • GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleLibraryLoadModuleProc
                                                      • String ID:
                                                      • API String ID: 310444273-0
                                                      • Opcode ID: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                      • Instruction ID: 23f85fcbdf3119ad7ff9d94b99dcad510d7c567b01d836bd9cab37df641e0753
                                                      • Opcode Fuzzy Hash: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                      • Instruction Fuzzy Hash: 53D0123120010597C6001B65AE0895F776CEF95611707803EF542F3132EB34D415AAEC
                                                      APIs
                                                      • FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                                      • FindClose.KERNEL32(00000000), ref: 004062EC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFileFirst
                                                      • String ID:
                                                      • API String ID: 2295610775-0
                                                      • Opcode ID: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                                      • Instruction ID: 3dd5e1b78c12f0f437ff376ab6b0e1f90f8becb0d3509d6a9a7f52ed6ae53baf
                                                      • Opcode Fuzzy Hash: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                                      • Instruction Fuzzy Hash: 7AD0C9315041205BC25127386E0889B6A589F163723258A7AB5A6E11E0CB388C2296A8

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 4015a0-4015f4 1 4030e3-4030ec 0->1 2 4015fa 0->2 26 4030ee-4030f2 1->26 4 401601-401611 call 4062a3 2->4 5 401742-40174f 2->5 6 401962-40197d call 40145c GetFullPathNameW 2->6 7 4019ca-4019e6 call 40145c SearchPathW 2->7 8 40176e-401794 call 40145c call 4062a3 SetFileAttributesW 2->8 9 401650-401668 call 40137e call 4062a3 call 40139d 2->9 10 4017b1-4017d8 call 40145c call 4062a3 call 405d59 2->10 11 401672-401686 call 40145c call 4062a3 2->11 12 401693-4016ac call 401446 call 4062a3 2->12 13 401715-401731 2->13 14 401616-40162d call 40145c call 4062a3 call 404f72 2->14 15 4016d6-4016db 2->15 16 401736-4030de 2->16 17 401897-4018a7 call 40145c call 4062d5 2->17 18 4018db-401910 call 40145c * 3 call 4062a3 MoveFileW 2->18 19 40163c-401645 2->19 20 4016bd-4016d1 call 4062a3 SetForegroundWindow 2->20 4->26 30 401751-401755 ShowWindow 5->30 31 401758-40175f 5->31 65 4019a3-4019a8 6->65 66 40197f-401984 6->66 7->1 58 4019ec-4019f8 7->58 8->1 83 40179a-4017a6 call 4062a3 8->83 92 40166d 9->92 105 401864-40186c 10->105 106 4017de-4017fc call 405d06 CreateDirectoryW 10->106 84 401689-40168e call 404f72 11->84 89 4016b1-4016b8 Sleep 12->89 90 4016ae-4016b0 12->90 13->26 27 401632-401637 14->27 24 401702-401710 15->24 25 4016dd-4016fd call 401446 15->25 16->1 60 4030de call 405f51 16->60 85 4018c2-4018d6 call 4062a3 17->85 86 4018a9-4018bd call 4062a3 17->86 113 401912-401919 18->113 114 40191e-401921 18->114 19->27 28 401647-40164e PostQuitMessage 19->28 20->1 24->1 25->1 27->26 28->27 30->31 31->1 49 401765-401769 ShowWindow 31->49 49->1 58->1 60->1 69 4019af-4019b2 65->69 66->69 76 401986-401989 66->76 69->1 79 4019b8-4019c5 GetShortPathNameW 69->79 76->69 87 40198b-401993 call 4062d5 76->87 79->1 100 4017ab-4017ac 83->100 84->1 85->26 86->26 87->65 110 401995-4019a1 call 406009 87->110 89->1 90->89 92->26 100->1 108 401890-401892 105->108 109 40186e-40188b call 404f72 call 406009 SetCurrentDirectoryW 105->109 118 401846-40184e call 4062a3 106->118 119 4017fe-401809 GetLastError 106->119 108->84 109->1 110->69 113->84 120 401923-40192b call 4062d5 114->120 121 40194a-401950 114->121 133 401853-401854 118->133 124 401827-401832 GetFileAttributesW 119->124 125 40180b-401825 GetLastError call 4062a3 119->125 120->121 139 40192d-401948 call 406c68 call 404f72 120->139 129 401957-40195d call 4062a3 121->129 131 401834-401844 call 4062a3 124->131 132 401855-40185e 124->132 125->132 129->100 131->133 132->105 132->106 133->132 139->129
                                                      APIs
                                                      • PostQuitMessage.USER32(00000000), ref: 00401648
                                                      • Sleep.KERNELBASE(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                                      • SetForegroundWindow.USER32(?), ref: 004016CB
                                                      • ShowWindow.USER32(?), ref: 00401753
                                                      • ShowWindow.USER32(?), ref: 00401767
                                                      • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                                      • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                                      • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                                      • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                                      • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                                      • SetCurrentDirectoryW.KERNELBASE(?,004CB0B0,?,000000E6,0040F0D0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                                      • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                                      • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,0040F0D0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                                      • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                                      • SearchPathW.KERNEL32(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                                      Strings
                                                      • CreateDirectory: "%s" created, xrefs: 00401849
                                                      • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                                      • Jump: %d, xrefs: 00401602
                                                      • Aborting: "%s", xrefs: 0040161D
                                                      • BringToFront, xrefs: 004016BD
                                                      • SetFileAttributes failed., xrefs: 004017A1
                                                      • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                                      • Rename on reboot: %s, xrefs: 00401943
                                                      • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                                      • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                                      • Rename: %s, xrefs: 004018F8
                                                      • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                                      • Sleep(%d), xrefs: 0040169D
                                                      • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                                      • detailprint: %s, xrefs: 00401679
                                                      • Call: %d, xrefs: 0040165A
                                                      • Rename failed: %s, xrefs: 0040194B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                                      • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                                      • API String ID: 2872004960-3619442763
                                                      • Opcode ID: 2a82ad59b9370b3cc3d5141fac41001cfacad1d5dd7d37275e8bf63d0114621f
                                                      • Instruction ID: b6b48939bc8a7188504c618ab7841b31fdd5898bf24c808f75461ec369738802
                                                      • Opcode Fuzzy Hash: 2a82ad59b9370b3cc3d5141fac41001cfacad1d5dd7d37275e8bf63d0114621f
                                                      • Instruction Fuzzy Hash: 0AB1F471A00204ABDB10BF61DD46DAE3B69EF44314B21817FF946B21E1DA7D4E40CAAE

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 267 40592c-405944 call 4062fc 270 405946-405956 call 405f51 267->270 271 405958-405990 call 405ed3 267->271 279 4059b3-4059dc call 403e95 call 40677e 270->279 276 405992-4059a3 call 405ed3 271->276 277 4059a8-4059ae lstrcatW 271->277 276->277 277->279 285 405a70-405a78 call 40677e 279->285 286 4059e2-4059e7 279->286 292 405a86-405a8d 285->292 293 405a7a-405a81 call 406805 285->293 286->285 287 4059ed-405a15 call 405ed3 286->287 287->285 294 405a17-405a1b 287->294 296 405aa6-405acb LoadImageW 292->296 297 405a8f-405a95 292->297 293->292 301 405a1d-405a2c call 405d06 294->301 302 405a2f-405a3b lstrlenW 294->302 299 405ad1-405b13 RegisterClassW 296->299 300 405b66-405b6e call 40141d 296->300 297->296 298 405a97-405a9c call 403e74 297->298 298->296 306 405c35 299->306 307 405b19-405b61 SystemParametersInfoW CreateWindowExW 299->307 319 405b70-405b73 300->319 320 405b78-405b83 call 403e95 300->320 301->302 303 405a63-405a6b call 406722 call 406009 302->303 304 405a3d-405a4b lstrcmpiW 302->304 303->285 304->303 311 405a4d-405a57 GetFileAttributesW 304->311 310 405c37-405c3e 306->310 307->300 316 405a59-405a5b 311->316 317 405a5d-405a5e call 406751 311->317 316->303 316->317 317->303 319->310 325 405b89-405ba6 ShowWindow LoadLibraryW 320->325 326 405c0c-405c14 call 405047 320->326 328 405ba8-405bad LoadLibraryW 325->328 329 405baf-405bc1 GetClassInfoW 325->329 334 405c16-405c1c 326->334 335 405c2e-405c30 call 40141d 326->335 328->329 330 405bc3-405bd3 GetClassInfoW RegisterClassW 329->330 331 405bd9-405c0a DialogBoxParamW call 40141d call 403c68 329->331 330->331 331->310 334->319 337 405c22-405c29 call 40141d 334->337 335->306 337->319
                                                      APIs
                                                        • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                        • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                        • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                      • lstrcatW.KERNEL32(004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,004C30A0,-00000002,00000000,004D70C8,00403AC1,?), ref: 004059AE
                                                      • lstrlenW.KERNEL32(00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,004C30A0), ref: 00405A30
                                                      • lstrcmpiW.KERNEL32(00462538,.exe,00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000), ref: 00405A43
                                                      • GetFileAttributesW.KERNEL32(00462540), ref: 00405A4E
                                                        • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                      • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004C70A8), ref: 00405AB7
                                                      • RegisterClassW.USER32(0046AD60), ref: 00405B0A
                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B22
                                                      • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B5B
                                                        • Part of subcall function 00403E95: SetWindowTextW.USER32(00000000,0046ADC0), ref: 00403F30
                                                      • ShowWindow.USER32(00000005,00000000), ref: 00405B91
                                                      • LoadLibraryW.KERNEL32(RichEd20), ref: 00405BA2
                                                      • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BAD
                                                      • GetClassInfoW.USER32(00000000,RichEdit20A,0046AD60), ref: 00405BBD
                                                      • GetClassInfoW.USER32(00000000,RichEdit,0046AD60), ref: 00405BCA
                                                      • RegisterClassW.USER32(0046AD60), ref: 00405BD3
                                                      • DialogBoxParamW.USER32(?,00000000,00405479,00000000), ref: 00405BF2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                                      • String ID: .DEFAULT\Control Panel\International$.exe$@%F$@rD$B%F$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                      • API String ID: 608394941-1650083594
                                                      • Opcode ID: 18be7924d3bcca259bbbf180237d25193f30e5c9112311b2c349bb590eb249de
                                                      • Instruction ID: 271ce27004ef92612bfc9362a6cc74883a37054a4c8cca7c49d128c059fded9a
                                                      • Opcode Fuzzy Hash: 18be7924d3bcca259bbbf180237d25193f30e5c9112311b2c349bb590eb249de
                                                      • Instruction Fuzzy Hash: 5E71A370604B04AED721AB65EE85F2736ACEB44749F00053FF945B22E2D7B89D418F6E

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                      • lstrcatW.KERNEL32(00000000,00000000,open,004CB0B0,00000000,00000000), ref: 00401A76
                                                      • CompareFileTime.KERNEL32(-00000014,?,open,open,00000000,00000000,open,004CB0B0,00000000,00000000), ref: 00401AA0
                                                        • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                        • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                        • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                        • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                        • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                                      • String ID: File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"$open
                                                      • API String ID: 4286501637-2478300759
                                                      • Opcode ID: 2ab80255bde4e5d1782dd9130ab292fdec73e4a72f9567b243a786bab725b233
                                                      • Instruction ID: fe683e2e252f9e2189d7cf48164ff2fe6631720e8c40e43e96375682ff159270
                                                      • Opcode Fuzzy Hash: 2ab80255bde4e5d1782dd9130ab292fdec73e4a72f9567b243a786bab725b233
                                                      • Instruction Fuzzy Hash: 9D510871901114BADF10BBB1CD46EAE3A68DF05369F21413FF416B10D2EB7C5A518AAE

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 428 403587-4035d5 GetTickCount GetModuleFileNameW call 405e50 431 4035e1-40360f call 406009 call 406751 call 406009 GetFileSize 428->431 432 4035d7-4035dc 428->432 440 403615 431->440 441 4036fc-40370a call 4032d2 431->441 433 4037b6-4037ba 432->433 443 40361a-403631 440->443 447 403710-403713 441->447 448 4037c5-4037ca 441->448 445 403633 443->445 446 403635-403637 call 403336 443->446 445->446 452 40363c-40363e 446->452 450 403715-40372d call 403368 call 403336 447->450 451 40373f-403769 GlobalAlloc call 403368 call 40337f 447->451 448->433 450->448 478 403733-403739 450->478 451->448 476 40376b-40377c 451->476 454 403644-40364b 452->454 455 4037bd-4037c4 call 4032d2 452->455 460 4036c7-4036cb 454->460 461 40364d-403661 call 405e0c 454->461 455->448 464 4036d5-4036db 460->464 465 4036cd-4036d4 call 4032d2 460->465 461->464 475 403663-40366a 461->475 472 4036ea-4036f4 464->472 473 4036dd-4036e7 call 407281 464->473 465->464 472->443 477 4036fa 472->477 473->472 475->464 481 40366c-403673 475->481 482 403784-403787 476->482 483 40377e 476->483 477->441 478->448 478->451 481->464 484 403675-40367c 481->484 485 40378a-403792 482->485 483->482 484->464 486 40367e-403685 484->486 485->485 487 403794-4037af SetFilePointer call 405e0c 485->487 486->464 488 403687-4036a7 486->488 491 4037b4 487->491 488->448 490 4036ad-4036b1 488->490 492 4036b3-4036b7 490->492 493 4036b9-4036c1 490->493 491->433 492->477 492->493 493->464 494 4036c3-4036c5 493->494 494->464
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00403598
                                                      • GetModuleFileNameW.KERNEL32(00000000,004DF0D8,00002004,?,?,?,00000000,00403A47,?), ref: 004035B4
                                                        • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                        • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                      • GetFileSize.KERNEL32(00000000,00000000,004E30E0,00000000,004CF0B8,004CF0B8,004DF0D8,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00403600
                                                      Strings
                                                      • Inst, xrefs: 0040366C
                                                      • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037C5
                                                      • Null, xrefs: 0040367E
                                                      • soft, xrefs: 00403675
                                                      • Error launching installer, xrefs: 004035D7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                      • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                      • API String ID: 4283519449-527102705
                                                      • Opcode ID: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                                      • Instruction ID: 97831ba7e8e922ff386f77eab0e0d18630bd2de4bbb47cca7d976ce2c46b30f6
                                                      • Opcode Fuzzy Hash: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                                      • Instruction Fuzzy Hash: 3151D5B1900204AFDB219F65CD85B9E7EB8AB14756F10803FE605B72D1D77D9E808B9C

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 495 40337f-403396 496 403398 495->496 497 40339f-4033a7 495->497 496->497 498 4033a9 497->498 499 4033ae-4033b3 497->499 498->499 500 4033c3-4033d0 call 403336 499->500 501 4033b5-4033be call 403368 499->501 505 4033d2 500->505 506 4033da-4033e1 500->506 501->500 507 4033d4-4033d5 505->507 508 4033e7-403407 GetTickCount call 4072f2 506->508 509 403518-40351a 506->509 510 403539-40353d 507->510 521 403536 508->521 523 40340d-403415 508->523 511 40351c-40351f 509->511 512 40357f-403583 509->512 514 403521 511->514 515 403524-40352d call 403336 511->515 516 403540-403546 512->516 517 403585 512->517 514->515 515->505 530 403533 515->530 519 403548 516->519 520 40354b-403559 call 403336 516->520 517->521 519->520 520->505 532 40355f-403572 WriteFile 520->532 521->510 526 403417 523->526 527 40341a-403428 call 403336 523->527 526->527 527->505 533 40342a-403433 527->533 530->521 534 403511-403513 532->534 535 403574-403577 532->535 536 403439-403456 call 407312 533->536 534->507 535->534 537 403579-40357c 535->537 540 40350a-40350c 536->540 541 40345c-403473 GetTickCount 536->541 537->512 540->507 542 403475-40347d 541->542 543 4034be-4034c2 541->543 544 403485-4034bb MulDiv wsprintfW call 404f72 542->544 545 40347f-403483 542->545 546 4034c4-4034c7 543->546 547 4034ff-403502 543->547 544->543 545->543 545->544 550 4034e7-4034ed 546->550 551 4034c9-4034db WriteFile 546->551 547->523 548 403508 547->548 548->521 552 4034f3-4034f7 550->552 551->534 554 4034dd-4034e0 551->554 552->536 556 4034fd 552->556 554->534 555 4034e2-4034e5 554->555 555->552 556->521
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 004033E7
                                                      • GetTickCount.KERNEL32 ref: 00403464
                                                      • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 00403491
                                                      • wsprintfW.USER32 ref: 004034A4
                                                      • WriteFile.KERNELBASE(00000000,00000000,?,7FFFFFFF,00000000), ref: 004034D3
                                                      • WriteFile.KERNEL32(00000000,0041F150,?,00000000,00000000,0041F150,?,000000FF,00000004,00000000,00000000,00000000), ref: 0040356A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: CountFileTickWrite$wsprintf
                                                      • String ID: ... %d%%$P1B$X1C$X1C
                                                      • API String ID: 651206458-1535804072
                                                      • Opcode ID: 71a0af70068d15f1e2712f5ef5f0e4f02d53f291cdcd50b6d0822de58acd1dbf
                                                      • Instruction ID: 0313947f0097750978ec936bbe46de4fad37e772bc1cb17ec77dd8e30cfa9ece
                                                      • Opcode Fuzzy Hash: 71a0af70068d15f1e2712f5ef5f0e4f02d53f291cdcd50b6d0822de58acd1dbf
                                                      • Instruction Fuzzy Hash: 88518D71900219ABDF10DF65AE44AAF7BACAB00316F14417BF900B7290DB78DF40CBA9

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 557 401eb9-401ec4 558 401f24-401f26 557->558 559 401ec6-401ec9 557->559 560 401f53-401f7b GlobalAlloc call 406805 558->560 561 401f28-401f2a 558->561 562 401ed5-401ee3 call 4062a3 559->562 563 401ecb-401ecf 559->563 576 4030e3-4030f2 560->576 577 402387-40238d GlobalFree 560->577 565 401f3c-401f4e call 406009 561->565 566 401f2c-401f36 call 4062a3 561->566 574 401ee4-402702 call 406805 562->574 563->559 567 401ed1-401ed3 563->567 565->577 566->565 567->562 573 401ef7-402e50 call 406009 * 3 567->573 573->576 589 402708-40270e 574->589 577->576 589->576
                                                      APIs
                                                        • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                      • GlobalFree.KERNELBASE(00796288), ref: 00402387
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: FreeGloballstrcpyn
                                                      • String ID: Exch: stack < %d elements$Pop: stack empty$open
                                                      • API String ID: 1459762280-1711415406
                                                      • Opcode ID: 4c8c09c83ece9067cd01ebc7f99896dd0048823aea7dafec600988da42eaf391
                                                      • Instruction ID: ae7cb1f2c63b60d7baa415153617f8c61fd22799b34192a347ea6a0a5f6d971a
                                                      • Opcode Fuzzy Hash: 4c8c09c83ece9067cd01ebc7f99896dd0048823aea7dafec600988da42eaf391
                                                      • Instruction Fuzzy Hash: 4721D172601105EBE710EB95DD81A6F77A8EF44318B21003FF542F32D1EB7998118AAD

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 592 4022fd-402325 call 40145c GetFileVersionInfoSizeW 595 4030e3-4030f2 592->595 596 40232b-402339 GlobalAlloc 592->596 596->595 597 40233f-40234e GetFileVersionInfoW 596->597 599 402350-402367 VerQueryValueW 597->599 600 402384-40238d GlobalFree 597->600 599->600 603 402369-402381 call 405f51 * 2 599->603 600->595 603->600
                                                      APIs
                                                      • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                                      • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                                      • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                                      • VerQueryValueW.VERSION(?,00408838,?,?,?,?,?,00000000), ref: 00402360
                                                        • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                      • GlobalFree.KERNELBASE(00796288), ref: 00402387
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                                      • String ID:
                                                      • API String ID: 3376005127-0
                                                      • Opcode ID: 8c326ffdf613bec965b24eefbd291de90d56381beca0eea403caad45aa1d2aeb
                                                      • Instruction ID: 606d2f288e59f9406d2e88b5b0598c54d729d8d595f649ff0f3e4a994beab86c
                                                      • Opcode Fuzzy Hash: 8c326ffdf613bec965b24eefbd291de90d56381beca0eea403caad45aa1d2aeb
                                                      • Instruction Fuzzy Hash: 82115E72900109AFCF00EFA1DD45DAE7BB8EF04344F10403AFA09F61A1D7799A40DB19

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 608 402b23-402b37 GlobalAlloc 609 402b39-402b49 call 401446 608->609 610 402b4b-402b6a call 40145c WideCharToMultiByte lstrlenA 608->610 615 402b70-402b73 609->615 610->615 616 402b93 615->616 617 402b75-402b8d call 405f6a WriteFile 615->617 618 4030e3-4030f2 616->618 617->616 622 402384-40238d GlobalFree 617->622 622->618
                                                      APIs
                                                      • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                                      • WideCharToMultiByte.KERNEL32(?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                                      • lstrlenA.KERNEL32(?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                                      • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                                      • String ID:
                                                      • API String ID: 2568930968-0
                                                      • Opcode ID: a43f8298630559bd8253c369c7e0cb3863940d209ccab43e1d506770e08af364
                                                      • Instruction ID: 5d007b3c2ae3d1ce6b2586a1921c4ad46276280cee2e515d5d1d957ff8a092fa
                                                      • Opcode Fuzzy Hash: a43f8298630559bd8253c369c7e0cb3863940d209ccab43e1d506770e08af364
                                                      • Instruction Fuzzy Hash: 76016171500205FBDB14AF70DE48D9E3B78EF05359F10443AF646B91E1D6798982DB68

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 711 4021b5-40220b call 40145c * 4 call 404f72 ShellExecuteW 722 402223-4030f2 call 4062a3 711->722 723 40220d-40221b call 4062a3 711->723 723->722
                                                      APIs
                                                        • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                        • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                        • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                        • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                      • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004CB0B0,?), ref: 00402202
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                      Strings
                                                      • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                                      • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                                      • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                                      • API String ID: 3156913733-2180253247
                                                      • Opcode ID: a6f9f0949098482436c6c9f8cce42b162511fb53d9db31c2e6f8192b5b466978
                                                      • Instruction ID: bbc106df3db47d5a89d2587a4e22f40687ed87c50c6518a2742e337a88eb4af1
                                                      • Opcode Fuzzy Hash: a6f9f0949098482436c6c9f8cce42b162511fb53d9db31c2e6f8192b5b466978
                                                      • Instruction Fuzzy Hash: E001F7B2B4021476DB2077B69C87F6B2A5CDB41764B20047BF502F20E3E5BD88009139

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 731 405e7f-405e8b 732 405e8c-405ec0 GetTickCount GetTempFileNameW 731->732 733 405ec2-405ec4 732->733 734 405ecf-405ed1 732->734 733->732 736 405ec6 733->736 735 405ec9-405ecc 734->735 736->735
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00405E9D
                                                      • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,004037FE,004D30C0,004D70C8), ref: 00405EB8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: CountFileNameTempTick
                                                      • String ID: nsa
                                                      • API String ID: 1716503409-2209301699
                                                      • Opcode ID: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                      • Instruction ID: bbb7b3741c82bae03d84fc31e008e00914f4f4b6280f54d22115683b6c602e07
                                                      • Opcode Fuzzy Hash: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                      • Instruction Fuzzy Hash: 39F0F635600604BBDB00CF55DD05A9FBBBDEF90310F00803BE944E7140E6B09E00C798

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 737 4078c5-4078cb 738 4078d0-4078eb 737->738 739 4078cd-4078cf 737->739 740 407aeb-407aff 738->740 741 407bad-407bba 738->741 739->738 743 407b01-407b17 740->743 744 407b19-407b2c 740->744 742 407be7-407beb 741->742 745 407c4a-407c5d 742->745 746 407bed-407c0c 742->746 747 407b33-407b3a 743->747 744->747 750 407c65-407c68 745->750 751 407c25-407c39 746->751 752 407c0e-407c23 746->752 748 407b61-407b64 747->748 749 407b3c-407b40 747->749 748->750 753 407b46-407b5e 749->753 754 407ccd-407cd4 749->754 758 407350 750->758 759 407cec 750->759 755 407c3c-407c43 751->755 752->755 753->748 757 407cdd-407cea 754->757 760 407be1-407be4 755->760 761 407c45 755->761 762 407cef-407cf6 757->762 763 407357-40735b 758->763 764 40749b-4074b6 758->764 765 40746d-407471 758->765 766 4073ff-407403 758->766 759->762 760->742 768 407cd6 761->768 769 407bc6-407bde 761->769 763->757 771 407361-40736e 763->771 764->740 772 407c76-407c7d 765->772 773 407477-40748b 765->773 774 407409-407420 766->774 775 407c6d-407c74 766->775 768->757 769->760 771->759 776 407374-4073ba 771->776 772->757 777 40748e-407496 773->777 778 407423-407427 774->778 775->757 780 4073e2-4073e4 776->780 781 4073bc-4073c0 776->781 777->765 782 407498 777->782 778->766 779 407429-40742f 778->779 783 407431-407438 779->783 784 407459-40746b 779->784 787 4073f5-4073fd 780->787 788 4073e6-4073f3 780->788 785 4073c2-4073c5 GlobalFree 781->785 786 4073cb-4073d9 GlobalAlloc 781->786 782->764 789 407443-407453 GlobalAlloc 783->789 790 40743a-40743d GlobalFree 783->790 784->777 785->786 786->759 791 4073df 786->791 787->778 788->787 788->788 789->759 789->784 790->789 791->780
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                                      • Instruction ID: 5b61ba0e549d4a34e11b5feda41afe9ae6537485a044c30e59ebd23bda5797f4
                                                      • Opcode Fuzzy Hash: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                                      • Instruction Fuzzy Hash: BCA14771908248DBEF18CF28C8946AD3BB1FB44359F14812AFC56AB280D738E985DF85

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 792 407ac3-407ac7 793 407ac9-407bba 792->793 794 407ade-407ae4 792->794 804 407be7-407beb 793->804 796 407aeb-407aff 794->796 797 407b01-407b17 796->797 798 407b19-407b2c 796->798 801 407b33-407b3a 797->801 798->801 802 407b61-407b64 801->802 803 407b3c-407b40 801->803 807 407c65-407c68 802->807 805 407b46-407b5e 803->805 806 407ccd-407cd4 803->806 808 407c4a-407c5d 804->808 809 407bed-407c0c 804->809 805->802 810 407cdd-407cea 806->810 816 407350 807->816 817 407cec 807->817 808->807 812 407c25-407c39 809->812 813 407c0e-407c23 809->813 815 407cef-407cf6 810->815 814 407c3c-407c43 812->814 813->814 823 407be1-407be4 814->823 824 407c45 814->824 818 407357-40735b 816->818 819 40749b-4074b6 816->819 820 40746d-407471 816->820 821 4073ff-407403 816->821 817->815 818->810 825 407361-40736e 818->825 819->796 826 407c76-407c7d 820->826 827 407477-40748b 820->827 829 407409-407420 821->829 830 407c6d-407c74 821->830 823->804 831 407cd6 824->831 832 407bc6-407bde 824->832 825->817 833 407374-4073ba 825->833 826->810 834 40748e-407496 827->834 835 407423-407427 829->835 830->810 831->810 832->823 837 4073e2-4073e4 833->837 838 4073bc-4073c0 833->838 834->820 839 407498 834->839 835->821 836 407429-40742f 835->836 840 407431-407438 836->840 841 407459-40746b 836->841 844 4073f5-4073fd 837->844 845 4073e6-4073f3 837->845 842 4073c2-4073c5 GlobalFree 838->842 843 4073cb-4073d9 GlobalAlloc 838->843 839->819 846 407443-407453 GlobalAlloc 840->846 847 40743a-40743d GlobalFree 840->847 841->834 842->843 843->817 848 4073df 843->848 844->835 845->844 845->845 846->817 846->841 847->846 848->837
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                                      • Instruction ID: 0868455ade8710e2db62ea7c97591ecaf8a07f5330254cde648c5a00cf1b77b0
                                                      • Opcode Fuzzy Hash: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                                      • Instruction Fuzzy Hash: 30912871908248DBEF14CF18C8947A93BB1FF44359F14812AFC5AAB291D738E985DF89

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 849 407312-407330 850 407332-407335 849->850 851 40733a-407341 849->851 852 407cf0-407cf6 850->852 853 407344-40734a 851->853 854 407350 853->854 855 407cec 853->855 856 407357-40735b 854->856 857 40749b-407aff 854->857 858 40746d-407471 854->858 859 4073ff-407403 854->859 860 407cef 855->860 861 407361-40736e 856->861 862 407cdd-407cea 856->862 870 407b01-407b17 857->870 871 407b19-407b2c 857->871 863 407c76-407c7d 858->863 864 407477-40748b 858->864 866 407409-407420 859->866 867 407c6d-407c74 859->867 860->852 861->855 868 407374-4073ba 861->868 862->860 863->862 869 40748e-407496 864->869 872 407423-407427 866->872 867->862 874 4073e2-4073e4 868->874 875 4073bc-4073c0 868->875 869->858 876 407498 869->876 877 407b33-407b3a 870->877 871->877 872->859 873 407429-40742f 872->873 880 407431-407438 873->880 881 407459-40746b 873->881 884 4073f5-4073fd 874->884 885 4073e6-4073f3 874->885 882 4073c2-4073c5 GlobalFree 875->882 883 4073cb-4073d9 GlobalAlloc 875->883 876->857 878 407b61-407c68 877->878 879 407b3c-407b40 877->879 878->853 886 407b46-407b5e 879->886 887 407ccd-407cd4 879->887 888 407443-407453 GlobalAlloc 880->888 889 40743a-40743d GlobalFree 880->889 881->869 882->883 883->855 891 4073df 883->891 884->872 885->884 885->885 886->878 887->862 888->855 888->881 889->888 891->874
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                                      • Instruction ID: 3981f1dd08afc316d24d9ed5113be2a17ca7da729ed8f25fba603efd3ef4d826
                                                      • Opcode Fuzzy Hash: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                                      • Instruction Fuzzy Hash: 39815931908248DBEF14CF29C8446AE3BB1FF44355F10812AFC66AB291D778E985DF86
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                                      • Instruction ID: 01891581271c5a124b16634c3a8992e7a6857e255b4271240234ec945a90a24d
                                                      • Opcode Fuzzy Hash: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                                      • Instruction Fuzzy Hash: 73713571908248DBEF18CF28C894AAD3BF1FB44355F14812AFC56AB291D738E985DF85
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                                      • Instruction ID: 94e3b44a92ae0aa4503ed5f8848dd13d39bc4d5c5e61625994f203468061122b
                                                      • Opcode Fuzzy Hash: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                                      • Instruction Fuzzy Hash: 25713671908248DBEF18CF19C894BA93BF1FB44345F10812AFC56AA291C738E985DF86
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                                      • Instruction ID: 61f7b93237898aea062553d5d4b8719da8ac7eccb5076a10c91df3859b53dd49
                                                      • Opcode Fuzzy Hash: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                                      • Instruction Fuzzy Hash: 98612771908248DBEF18CF19C894BAD3BF1FB44345F14812AFC56AA291C738E985DF86
                                                      APIs
                                                      • GlobalFree.KERNELBASE(?), ref: 004073C5
                                                      • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 004073CE
                                                      • GlobalFree.KERNELBASE(?), ref: 0040743D
                                                      • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 00407448
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: Global$AllocFree
                                                      • String ID:
                                                      • API String ID: 3394109436-0
                                                      • Opcode ID: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                                      • Instruction ID: da36524f31269fd1e9de8fc6705d7123eeae9c681c0d19372ba3dadca10d6d3f
                                                      • Opcode Fuzzy Hash: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                                      • Instruction Fuzzy Hash: 81513871918248EBEF18CF19C894AAD3BF1FF44345F10812AFC56AA291C738E985DF85
                                                      APIs
                                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                                      • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                                      • Instruction ID: d71d45502f518029c3ce7990b7c8d381ac94a1bb539c673c2af025244294d997
                                                      • Opcode Fuzzy Hash: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                                      • Instruction Fuzzy Hash: 96F0F471A10220DFD7555B74DD04B273699AB80361F24463BF911F62F1E6B8DC528B4E
                                                      APIs
                                                      • GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                      • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: File$AttributesCreate
                                                      • String ID:
                                                      • API String ID: 415043291-0
                                                      • Opcode ID: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                      • Instruction ID: fe2e31f24f36ecb58ba6038de6e4569557e5a61990f2f31681ab57118d472e11
                                                      • Opcode Fuzzy Hash: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                      • Instruction Fuzzy Hash: BCD09E71554202EFEF098F60DE1AF6EBBA2FB94B00F11852CB292550F0DAB25819DB15
                                                      APIs
                                                      • GetFileAttributesW.KERNELBASE(?,00406E81,?,?,?), ref: 00405E34
                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E47
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                      • Instruction ID: a99f375bd2b1051765f890e1d94d2f722c1bb1ba0a12d38356d8610c0186b9c0
                                                      • Opcode Fuzzy Hash: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                      • Instruction Fuzzy Hash: 84C01272404800EAC6000B34DF0881A7B62AB90330B268B39B0BAE00F0CB3488A99A18
                                                      APIs
                                                      • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033CE,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: FileRead
                                                      • String ID:
                                                      • API String ID: 2738559852-0
                                                      • Opcode ID: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                      • Instruction ID: a3bc5d39330dd194e4c7332763fdc94ca13499671d705f1c19c6925397c50364
                                                      • Opcode Fuzzy Hash: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                      • Instruction Fuzzy Hash: C8E08C32550118BFCB109EA69C40EE73B5CFB047A2F00C832BD55E5290DA30DA00EBE8
                                                      APIs
                                                        • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                        • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                        • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                        • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                      • CreateDirectoryW.KERNELBASE(004D70C8,00000000,004D70C8,004D70C8,004D70C8,-00000002,00403A0B), ref: 004037ED
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: Char$Next$CreateDirectoryPrev
                                                      • String ID:
                                                      • API String ID: 4115351271-0
                                                      • Opcode ID: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                                      • Instruction ID: 8ea1286759415c6f695425ed34242866ebe8a7a529327a4e56f2759b30593fc1
                                                      • Opcode Fuzzy Hash: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                                      • Instruction Fuzzy Hash: B1D0A921083C3221C562332A3D06FCF090C8F2635AB02C07BF841B61CA8B2C4B8240EE
                                                      APIs
                                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040375A,?,?,?,?,00000000,00403A47,?), ref: 00403376
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: FilePointer
                                                      • String ID:
                                                      • API String ID: 973152223-0
                                                      • Opcode ID: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                      • Instruction ID: da19c3e449f5d10d282cbd9bcc1d8f2f369397d5e390659c1e8fea63e82898b0
                                                      • Opcode Fuzzy Hash: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                      • Instruction Fuzzy Hash: 0CB09231140204AEDA214B109E05F067A21FB94700F208824B2A0380F086711420EA0C
                                                      APIs
                                                      • GetDlgItem.USER32(?,00000403), ref: 0040512F
                                                      • GetDlgItem.USER32(?,000003EE), ref: 0040513E
                                                      • GetClientRect.USER32(?,?), ref: 00405196
                                                      • GetSystemMetrics.USER32(00000015), ref: 0040519E
                                                      • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051BF
                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051D0
                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004051E3
                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004051F1
                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405204
                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405226
                                                      • ShowWindow.USER32(?,00000008), ref: 0040523A
                                                      • GetDlgItem.USER32(?,000003EC), ref: 0040525B
                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040526B
                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405280
                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040528C
                                                      • GetDlgItem.USER32(?,000003F8), ref: 0040514D
                                                        • Part of subcall function 00403D98: SendMessageW.USER32(00000028,?,00000001,004057B4), ref: 00403DA6
                                                        • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                      • GetDlgItem.USER32(?,000003EC), ref: 004052AB
                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00005047,00000000), ref: 004052B9
                                                      • CloseHandle.KERNEL32(00000000), ref: 004052C0
                                                      • ShowWindow.USER32(00000000), ref: 004052E7
                                                      • ShowWindow.USER32(?,00000008), ref: 004052EC
                                                      • ShowWindow.USER32(00000008), ref: 00405333
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405365
                                                      • CreatePopupMenu.USER32 ref: 00405376
                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040538B
                                                      • GetWindowRect.USER32(?,?), ref: 0040539E
                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053C0
                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 004053FB
                                                      • OpenClipboard.USER32(00000000), ref: 0040540B
                                                      • EmptyClipboard.USER32 ref: 00405411
                                                      • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 0040541D
                                                      • GlobalLock.KERNEL32(00000000), ref: 00405427
                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040543B
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0040545D
                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00405468
                                                      • CloseClipboard.USER32 ref: 0040546E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                                      • String ID: @rD$New install of "%s" to "%s"${
                                                      • API String ID: 2110491804-2409696222
                                                      • Opcode ID: a32262366b6956f6ce6576a17cc772d230ae976b6d31d5dbcf7d3a173ee933fc
                                                      • Instruction ID: 480b9f2609884c7685ddca5963e0cfcc77f9e358d06567921943d8ab7e89b76b
                                                      • Opcode Fuzzy Hash: a32262366b6956f6ce6576a17cc772d230ae976b6d31d5dbcf7d3a173ee933fc
                                                      • Instruction Fuzzy Hash: 14B15B70800608FFDB11AFA0DD85EAE7B79EF44355F00803AFA45BA1A0CBB49A519F59
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003F9), ref: 00404993
                                                      • GetDlgItem.USER32(?,00000408), ref: 004049A0
                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 004049EF
                                                      • LoadBitmapW.USER32(0000006E), ref: 00404A02
                                                      • SetWindowLongW.USER32(?,000000FC,Function_000048CC), ref: 00404A1C
                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A2E
                                                      • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A42
                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00404A58
                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A64
                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404A74
                                                      • DeleteObject.GDI32(?), ref: 00404A79
                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AA4
                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404AB0
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B51
                                                      • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404B74
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B85
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404BAF
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BBE
                                                      • ShowWindow.USER32(?,00000005), ref: 00404BCF
                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CCD
                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D28
                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D3D
                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D61
                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404D87
                                                      • ImageList_Destroy.COMCTL32(?), ref: 00404D9C
                                                      • GlobalFree.KERNEL32(?), ref: 00404DAC
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E1C
                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 00404ECA
                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404ED9
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00404EF9
                                                      • ShowWindow.USER32(?,00000000), ref: 00404F49
                                                      • GetDlgItem.USER32(?,000003FE), ref: 00404F54
                                                      • ShowWindow.USER32(00000000), ref: 00404F5B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                      • String ID: $ @$M$N
                                                      • API String ID: 1638840714-3479655940
                                                      • Opcode ID: 222e44079ed98782fbb34ec8da515d99173e785f6e02dcb26c66960398e67004
                                                      • Instruction ID: e2b6c32447eba08f07ab18e4c0942225b167af9b9c7e550a0b0592367213937f
                                                      • Opcode Fuzzy Hash: 222e44079ed98782fbb34ec8da515d99173e785f6e02dcb26c66960398e67004
                                                      • Instruction Fuzzy Hash: 09026CB0900209AFEF209FA4CD45AAE7BB5FB84314F10413AF615B62E1D7B89D91DF58
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003F0), ref: 004044F9
                                                      • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404507
                                                      • GetDlgItem.USER32(?,000003FB), ref: 00404527
                                                      • GetAsyncKeyState.USER32(00000010), ref: 0040452E
                                                      • GetDlgItem.USER32(?,000003F0), ref: 00404543
                                                      • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404554
                                                      • SetWindowTextW.USER32(?,?), ref: 00404583
                                                      • SHBrowseForFolderW.SHELL32(?), ref: 0040463D
                                                      • lstrcmpiW.KERNEL32(00462540,00447240,00000000,?,?), ref: 0040467A
                                                      • lstrcatW.KERNEL32(?,00462540), ref: 00404686
                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404696
                                                      • CoTaskMemFree.OLE32(00000000), ref: 00404648
                                                        • Part of subcall function 00405C84: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403F81), ref: 00405C97
                                                        • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                        • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                        • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                        • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                        • Part of subcall function 00403E74: lstrcatW.KERNEL32(00000000,00000000,0046A560,004C70A8,install.log,00405A9C,004C70A8,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006), ref: 00403E8F
                                                      • GetDiskFreeSpaceW.KERNEL32(00443238,?,?,0000040F,?,00443238,00443238,?,00000000,00443238,?,?,000003FB,?), ref: 00404759
                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404774
                                                        • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                      • SetDlgItemTextW.USER32(00000000,00000400,00409264), ref: 004047ED
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                                      • String ID: 82D$@%F$@rD$A
                                                      • API String ID: 3347642858-1086125096
                                                      • Opcode ID: 41223eded68e0cc8c9bf9fa9bd2dae48608aba550ad56c91da83586f0d18507e
                                                      • Instruction ID: 5c5d6a603380bcdbc7d7d35b60f5621b43697e5e98684918e033f9398a36e476
                                                      • Opcode Fuzzy Hash: 41223eded68e0cc8c9bf9fa9bd2dae48608aba550ad56c91da83586f0d18507e
                                                      • Instruction Fuzzy Hash: D1B1A4B1900209BBDB11AFA1CD85AAF7AB8EF45314F10847BF605B72D1D77C8A41CB59
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                                      • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F30
                                                      • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FA9
                                                      • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FB5
                                                      • lstrcmpA.KERNEL32(name,?), ref: 00406FC7
                                                      • CloseHandle.KERNEL32(?), ref: 004071E6
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                                      • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                                                      • API String ID: 1916479912-1189179171
                                                      • Opcode ID: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                                      • Instruction ID: 34713ba181b26839f7619e948cf229fd8716e5ee99c03f3e8673f79b0d3e70cf
                                                      • Opcode Fuzzy Hash: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                                      • Instruction Fuzzy Hash: 9091BF70D1412DAACF04EBA5DD909FEBBBAEF48301F00416AF592F72D0E6785A05DB64
                                                      APIs
                                                      • DeleteFileW.KERNEL32(?,?,004C30A0), ref: 00406CB8
                                                      • lstrcatW.KERNEL32(0045C918,\*.*,0045C918,?,-00000002,004D70C8,?,004C30A0), ref: 00406D09
                                                      • lstrcatW.KERNEL32(?,00408838,?,0045C918,?,-00000002,004D70C8,?,004C30A0), ref: 00406D29
                                                      • lstrlenW.KERNEL32(?), ref: 00406D2C
                                                      • FindFirstFileW.KERNEL32(0045C918,?), ref: 00406D40
                                                      • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E22
                                                      • FindClose.KERNEL32(?), ref: 00406E33
                                                      Strings
                                                      • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E58
                                                      • RMDir: RemoveDirectory("%s"), xrefs: 00406E6F
                                                      • Delete: DeleteFile("%s"), xrefs: 00406DBC
                                                      • Delete: DeleteFile failed("%s"), xrefs: 00406DFD
                                                      • \*.*, xrefs: 00406D03
                                                      • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EB0
                                                      • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406E93
                                                      • Delete: DeleteFile on Reboot("%s"), xrefs: 00406DE0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                      • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*
                                                      • API String ID: 2035342205-3294556389
                                                      • Opcode ID: 929039bad7d15a30b60f6521e1025dcf5eb1071aca27ca1d219e219807f84f48
                                                      • Instruction ID: 0ca3ec5a28b3c1cae8259a28e21d86b18febecd5c0179aed135e39ed79665852
                                                      • Opcode Fuzzy Hash: 929039bad7d15a30b60f6521e1025dcf5eb1071aca27ca1d219e219807f84f48
                                                      • Instruction Fuzzy Hash: 2D51E3315043056ADB20AB61CD46EAF37B89F81725F22803FF943751D2DB7C49A2DAAD
                                                      APIs
                                                      • GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                      • GetSystemDirectoryW.KERNEL32(00462540,00002004), ref: 00406958
                                                        • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                      • GetWindowsDirectoryW.KERNEL32(00462540,00002004), ref: 0040696B
                                                      • lstrcatW.KERNEL32(00462540,\Microsoft\Internet Explorer\Quick Launch), ref: 004069E5
                                                      • lstrlenW.KERNEL32(00462540,0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 00406A47
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                                      • String ID: @%F$@%F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                      • API String ID: 3581403547-784952888
                                                      • Opcode ID: 5b9b76f287d52b653a8a41dc6b1224aada0ccbd74d66441f1f03372adecf381e
                                                      • Instruction ID: 7881bd453c5698e0e02013fa1c3524f2cf467b60749c67c5a59258f73e57ab2a
                                                      • Opcode Fuzzy Hash: 5b9b76f287d52b653a8a41dc6b1224aada0ccbd74d66441f1f03372adecf381e
                                                      • Instruction Fuzzy Hash: F171F4B1A00215ABDB20AF28CD44A7E3771EF55314F12C03FE906B62E0E77C89A19B5D
                                                      APIs
                                                      • CoCreateInstance.OLE32(00409B24,?,00000001,00409B04,?), ref: 0040257E
                                                      Strings
                                                      • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: CreateInstance
                                                      • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                                      • API String ID: 542301482-1377821865
                                                      • Opcode ID: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                                      • Instruction ID: c24c797a6f187c751e7d972b1a807078ee58ffeb38f484aa28d094541f0f6205
                                                      • Opcode Fuzzy Hash: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                                      • Instruction Fuzzy Hash: 02415E74A00205BFCF04EFA0CC99EAE7B79FF48314B20456AF915EB2E1C679A941CB54
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402E27
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: FileFindFirst
                                                      • String ID:
                                                      • API String ID: 1974802433-0
                                                      • Opcode ID: b5b7ab79f27b5d75a187df3fe9f711fb4388b9579a399927462dc59dec62d440
                                                      • Instruction ID: b91193b5dd17d351e639dca097a4c2443a83fae7855d8014906372cda19badf2
                                                      • Opcode Fuzzy Hash: b5b7ab79f27b5d75a187df3fe9f711fb4388b9579a399927462dc59dec62d440
                                                      • Instruction Fuzzy Hash: 4EE06D32600204AFD700EB749D45ABE736CDF01329F20457BF146F20D1E6B89A41976A
                                                      APIs
                                                      • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063BF
                                                      • lstrlenW.KERNEL32(?), ref: 004063CC
                                                      • GetVersionExW.KERNEL32(?), ref: 0040642A
                                                        • Part of subcall function 0040602B: CharUpperW.USER32(?,00406401,?), ref: 00406031
                                                      • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406469
                                                      • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00406488
                                                      • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00406492
                                                      • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 0040649D
                                                      • FreeLibrary.KERNEL32(00000000), ref: 004064D4
                                                      • GlobalFree.KERNEL32(?), ref: 004064DD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                                      • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                                      • API String ID: 20674999-2124804629
                                                      • Opcode ID: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                                      • Instruction ID: f5db07f83b48746be4b9c4f5c588c21b75103c60b5638216cabcef37c42edb4d
                                                      • Opcode Fuzzy Hash: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                                      • Instruction Fuzzy Hash: 38919331900219EBDF109FA4CD88AAFBBB8EF44741F11447BE546F6281DB388A51CF68
                                                      APIs
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054B5
                                                      • ShowWindow.USER32(?), ref: 004054D2
                                                      • DestroyWindow.USER32 ref: 004054E6
                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 00405502
                                                      • GetDlgItem.USER32(?,?), ref: 00405523
                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405537
                                                      • IsWindowEnabled.USER32(00000000), ref: 0040553E
                                                      • GetDlgItem.USER32(?,00000001), ref: 004055ED
                                                      • GetDlgItem.USER32(?,00000002), ref: 004055F7
                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 00405611
                                                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00405662
                                                      • GetDlgItem.USER32(?,00000003), ref: 00405708
                                                      • ShowWindow.USER32(00000000,?), ref: 0040572A
                                                      • EnableWindow.USER32(?,?), ref: 0040573C
                                                      • EnableWindow.USER32(?,?), ref: 00405757
                                                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040576D
                                                      • EnableMenuItem.USER32(00000000), ref: 00405774
                                                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040578C
                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040579F
                                                      • lstrlenW.KERNEL32(00447240,?,00447240,0046ADC0), ref: 004057C8
                                                      • SetWindowTextW.USER32(?,00447240), ref: 004057DC
                                                      • ShowWindow.USER32(?,0000000A), ref: 00405910
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                      • String ID: @rD
                                                      • API String ID: 184305955-3814967855
                                                      • Opcode ID: 892c705fd8619986465a6960d4e81f7d1e8168c1c52714a2b5abc7a1d7472251
                                                      • Instruction ID: 0f9b988f21b44e482dc064b3562f20aa73efc2902ac8c6ffeb9ddf27563d0ddb
                                                      • Opcode Fuzzy Hash: 892c705fd8619986465a6960d4e81f7d1e8168c1c52714a2b5abc7a1d7472251
                                                      • Instruction Fuzzy Hash: D8C1C371500A04EBDB216F61EE49E2B3BA9EB45345F00093EF551B12F0DB799891EF2E
                                                      APIs
                                                      • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040416D
                                                      • GetDlgItem.USER32(?,000003E8), ref: 00404181
                                                      • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040419E
                                                      • GetSysColor.USER32(?), ref: 004041AF
                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004041BD
                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004041CB
                                                      • lstrlenW.KERNEL32(?), ref: 004041D6
                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004041E3
                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004041F2
                                                        • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404124,?), ref: 00403FE1
                                                        • Part of subcall function 00403FCA: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404124,?), ref: 00403FF0
                                                        • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404124,?), ref: 00404004
                                                      • GetDlgItem.USER32(?,0000040A), ref: 0040424A
                                                      • SendMessageW.USER32(00000000), ref: 00404251
                                                      • GetDlgItem.USER32(?,000003E8), ref: 0040427E
                                                      • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004042C1
                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 004042CF
                                                      • SetCursor.USER32(00000000), ref: 004042D2
                                                      • ShellExecuteW.SHELL32(0000070B,open,00462540,00000000,00000000,00000001), ref: 004042E7
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 004042F3
                                                      • SetCursor.USER32(00000000), ref: 004042F6
                                                      • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404325
                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404337
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                                                      • String ID: @%F$N$open
                                                      • API String ID: 3928313111-3849437375
                                                      • Opcode ID: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                                      • Instruction ID: 2c1438ad93098d7b112eeb2502b55652a68651cb38e922ac8f4fb42b83a973d4
                                                      • Opcode Fuzzy Hash: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                                      • Instruction Fuzzy Hash: 0F71A4B1900609FFDB109F60DD45EAA7B79FB44305F00843AFA05B62D1C778A991CF99
                                                      APIs
                                                      • lstrcpyW.KERNEL32(0045B2C8,NUL,?,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AA9
                                                      • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AC8
                                                      • GetShortPathNameW.KERNEL32(000000F1,0045B2C8,00000400), ref: 00406AD1
                                                        • Part of subcall function 00405DB6: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                                        • Part of subcall function 00405DB6: lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                                      • GetShortPathNameW.KERNEL32(000000F1,00460920,00000400), ref: 00406AF2
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0045B2C8,000000FF,0045BAC8,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B1B
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00460920,000000FF,0045C118,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B33
                                                      • wsprintfA.USER32 ref: 00406B4D
                                                      • GetFileSize.KERNEL32(00000000,00000000,00460920,C0000000,00000004,00460920,?,?,00000000,000000F1,?), ref: 00406B85
                                                      • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406B94
                                                      • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BB0
                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406BE0
                                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,0045C518,00000000,-0000000A,0040987C,00000000,[Rename]), ref: 00406C37
                                                        • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                        • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                      • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C4B
                                                      • GlobalFree.KERNEL32(00000000), ref: 00406C52
                                                      • CloseHandle.KERNEL32(?), ref: 00406C5C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                                      • String ID: F$%s=%s$NUL$[Rename]
                                                      • API String ID: 565278875-1653569448
                                                      • Opcode ID: a83451b5c4aab99109613fb463f01f18261c5de4d9c28115f8397278e7cafe6e
                                                      • Instruction ID: f97e154d5ee7f709bd30e138c0dd6e282719408add8f0d739c14b832633f1bd9
                                                      • Opcode Fuzzy Hash: a83451b5c4aab99109613fb463f01f18261c5de4d9c28115f8397278e7cafe6e
                                                      • Instruction Fuzzy Hash: AE412632104208BFE6206B619E8CD6B3B6CDF86754B16043EF586F22D1DA3CDC158ABC
                                                      APIs
                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                                      • DeleteObject.GDI32(?), ref: 004010F6
                                                      • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                                      • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                                      • SelectObject.GDI32(00000000,?), ref: 00401149
                                                      • DrawTextW.USER32(00000000,0046ADC0,000000FF,00000010,00000820), ref: 0040115F
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                                      • DeleteObject.GDI32(?), ref: 0040116E
                                                      • EndPaint.USER32(?,?), ref: 00401177
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                      • String ID: F
                                                      • API String ID: 941294808-1304234792
                                                      • Opcode ID: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                                      • Instruction ID: e7530e13063599d95e155ed3b2c7b7521dfa2668d538c4695d9c695e9582dc0d
                                                      • Opcode Fuzzy Hash: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                                      • Instruction Fuzzy Hash: 01516C71400209AFCB058F95DE459AF7FB9FF45311F00802EF992AA1A0CB78DA55DFA4
                                                      APIs
                                                      • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                                                      • lstrlenW.KERNEL32(004130D8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                                                      • RegSetValueExW.ADVAPI32(?,?,?,?,004130D8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                                                      • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                      Strings
                                                      • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                                      • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                                      • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                                      • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                                      • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                                      • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$CloseCreateValuewvsprintf
                                                      • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                                      • API String ID: 1641139501-220328614
                                                      • Opcode ID: d79db666ee92a39b53e47641609ed565b43369f8775619f718224e07aa5483b4
                                                      • Instruction ID: 4ea7a0066738be70411365ddd6f3e5606018e51d84950e7919a1ab5782edcef9
                                                      • Opcode Fuzzy Hash: d79db666ee92a39b53e47641609ed565b43369f8775619f718224e07aa5483b4
                                                      • Instruction Fuzzy Hash: 3D41BFB2D00209BFDF11AF90CE46DAEBBB9EB04704F20407BF505B61A1D6B94B509B59
                                                      APIs
                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                                                      • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                                                      • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                                                      • GlobalFree.KERNEL32(00000000), ref: 00402F17
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                                                      • DeleteFileW.KERNEL32(?), ref: 00402F56
                                                      Strings
                                                      • created uninstaller: %d, "%s", xrefs: 00402F3B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                      • String ID: created uninstaller: %d, "%s"
                                                      • API String ID: 3294113728-3145124454
                                                      • Opcode ID: c666975226392a23a96cc8c7abb3eb5c8f7508c76e04a15e1ccd320165ca38cb
                                                      • Instruction ID: 876417c632a2c352b67fb01c84f3ccb8dada3a759dccfb7ac575e016526b3130
                                                      • Opcode Fuzzy Hash: c666975226392a23a96cc8c7abb3eb5c8f7508c76e04a15e1ccd320165ca38cb
                                                      • Instruction Fuzzy Hash: E231B272800115BBCB11AFA4CE45DAF7FB9EF08364F10023AF555B61E1CB794E419B98
                                                      APIs
                                                      • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                                      • GetFileAttributesW.KERNEL32(0046A560,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040613C
                                                      • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,0046A560,40000000,00000004), ref: 00406175
                                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,0046A560,40000000,00000004), ref: 00406181
                                                      • lstrcatW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00409678,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040619B
                                                      • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),?,?,004062D4,00000000), ref: 004061A2
                                                      • WriteFile.KERNEL32(RMDir: RemoveDirectory invalid input(""),00000000,004062D4,00000000,?,?,004062D4,00000000), ref: 004061B7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                                      • String ID: RMDir: RemoveDirectory invalid input("")
                                                      • API String ID: 3734993849-2769509956
                                                      • Opcode ID: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                                      • Instruction ID: 719ae6cd10854ac59b0cdc08190af65770ef99398ad526dd54b0ef62760a23c4
                                                      • Opcode Fuzzy Hash: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                                      • Instruction Fuzzy Hash: 4621F271400200BBD710AB64DD88D9B376CEB02370B25C73AF626BA1E1E77449868BAD
                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000EB), ref: 00403DE4
                                                      • GetSysColor.USER32(00000000), ref: 00403E00
                                                      • SetTextColor.GDI32(?,00000000), ref: 00403E0C
                                                      • SetBkMode.GDI32(?,?), ref: 00403E18
                                                      • GetSysColor.USER32(?), ref: 00403E2B
                                                      • SetBkColor.GDI32(?,?), ref: 00403E3B
                                                      • DeleteObject.GDI32(?), ref: 00403E55
                                                      • CreateBrushIndirect.GDI32(?), ref: 00403E5F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                      • String ID:
                                                      • API String ID: 2320649405-0
                                                      • Opcode ID: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                                      • Instruction ID: efe235911933e34786796033030fc6f48e67331b78f43f6f4bde0ddab4ebbdd0
                                                      • Opcode Fuzzy Hash: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                                      • Instruction Fuzzy Hash: 7D1166715007046BCB219F78DE08B5BBFF8AF01755F048A2DE886F22A0D774DA48CB94
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                                        • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                        • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                        • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                        • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                      • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                                      • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                                      Strings
                                                      • Error registering DLL: Could not load %s, xrefs: 004024DB
                                                      • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                                      • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                                                      • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s
                                                      • API String ID: 1033533793-945480824
                                                      • Opcode ID: aebbfb54fe117075fb91935afd2b3d42be9cb3525beaf419298f1839c78bdf39
                                                      • Instruction ID: e967fad4df15afb35ea17a6f8951328f27fda4bee3b51f855042d01f5ead75df
                                                      • Opcode Fuzzy Hash: aebbfb54fe117075fb91935afd2b3d42be9cb3525beaf419298f1839c78bdf39
                                                      • Instruction Fuzzy Hash: 34219131904208BBCF206FA1CE45E9E7A74AF40314F30817FF511B61E1D7BD4A819A5D
                                                      APIs
                                                      • lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                      • lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                      • lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                      • SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                        • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                                      • String ID:
                                                      • API String ID: 2740478559-0
                                                      • Opcode ID: 7bcaf298b14bfcb271399e4538be81cf37b8538d1c197863d88476df1de4366a
                                                      • Instruction ID: 1d640e6b4f0869ec625b39ce8112f9bd6789598538fb42bade37fe3884716a8e
                                                      • Opcode Fuzzy Hash: 7bcaf298b14bfcb271399e4538be81cf37b8538d1c197863d88476df1de4366a
                                                      • Instruction Fuzzy Hash: 3C21B0B1900518BACF119FA5DD84E9EBFB5EF84310F10813AFA04BA291D7798E509F98
                                                      APIs
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                        • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                        • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                        • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                        • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                        • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                        • Part of subcall function 00405C3F: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                                        • Part of subcall function 00405C3F: CloseHandle.KERNEL32(?), ref: 00405C71
                                                      • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                                      • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                                      Strings
                                                      • Exec: command="%s", xrefs: 00402241
                                                      • Exec: success ("%s"), xrefs: 00402263
                                                      • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                                      • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                                      • API String ID: 2014279497-3433828417
                                                      • Opcode ID: 04fd410bbb31de0d7d21d8cf733f8caec58fdd5b228a354368cf1c704b35d166
                                                      • Instruction ID: 1f9fd54ce4b92d80b15c686f19ace2d36b15c716f321f29b17dee5dd027f7fd2
                                                      • Opcode Fuzzy Hash: 04fd410bbb31de0d7d21d8cf733f8caec58fdd5b228a354368cf1c704b35d166
                                                      • Instruction Fuzzy Hash: 3E11C632904115EBDB11BBE0DE46AAE3A61EF00314B24807FF501B50D1CBBC4D41D79D
                                                      APIs
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404869
                                                      • GetMessagePos.USER32 ref: 00404871
                                                      • ScreenToClient.USER32(?,?), ref: 00404889
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040489B
                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048C1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: Message$Send$ClientScreen
                                                      • String ID: f
                                                      • API String ID: 41195575-1993550816
                                                      • Opcode ID: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                                      • Instruction ID: 7db1728360bf3821ce9645a1193633f180912fe022e8629b13ab7a69f18166cd
                                                      • Opcode Fuzzy Hash: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                                      • Instruction Fuzzy Hash: C5015E7290021CBAEB00DBA4DD85BEEBBB8AF54710F10452ABB50B61D0D7B85A058BA5
                                                      APIs
                                                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                                      • MulDiv.KERNEL32(00011E00,00000064,?), ref: 00403295
                                                      • wsprintfW.USER32 ref: 004032A5
                                                      • SetWindowTextW.USER32(?,?), ref: 004032B5
                                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                                      Strings
                                                      • verifying installer: %d%%, xrefs: 0040329F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                      • String ID: verifying installer: %d%%
                                                      • API String ID: 1451636040-82062127
                                                      • Opcode ID: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                                      • Instruction ID: 2210906da4c477318a924a5c8cf459ae641b3a2c10b729e3aa38b42dd2c8d99c
                                                      • Opcode Fuzzy Hash: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                                      • Instruction Fuzzy Hash: 98014470610109ABEF109F60DD49FAA3B69FB00349F00803DFA46B51E0DB7996558B58
                                                      APIs
                                                      • lstrlenW.KERNEL32(00447240,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00447240,?), ref: 0040444A
                                                      • wsprintfW.USER32 ref: 00404457
                                                      • SetDlgItemTextW.USER32(?,00447240,000000DF), ref: 0040446A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: ItemTextlstrlenwsprintf
                                                      • String ID: %u.%u%s%s$@rD
                                                      • API String ID: 3540041739-1813061909
                                                      • Opcode ID: 49e77ae85f825c85ec9bd325533554715bd64ccbe848738256e3a305efe714d4
                                                      • Instruction ID: f1896056faf18a44ee7e341cc3389f256aee6b01e91544d35c55ed1e8b934206
                                                      • Opcode Fuzzy Hash: 49e77ae85f825c85ec9bd325533554715bd64ccbe848738256e3a305efe714d4
                                                      • Instruction Fuzzy Hash: EF11BD327002087BDB10AA6A9D45E9E765EEBC5334F10423BFA15F30E1F6788A218679
                                                      APIs
                                                      • CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                      • CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                      • CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                      • CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: Char$Next$Prev
                                                      • String ID: *?|<>/":
                                                      • API String ID: 589700163-165019052
                                                      • Opcode ID: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                      • Instruction ID: 6b5d27536512bbf775d32d1a11483b1b035cd55ac1fbc93341df7bc26af2800c
                                                      • Opcode Fuzzy Hash: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                      • Instruction Fuzzy Hash: C611EB2184061559CB30FB659C4097BA6F9AE56750712843FE886F32C1FB7CCCE192BD
                                                      APIs
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                                      • RegCloseKey.ADVAPI32(?), ref: 00401504
                                                      • RegCloseKey.ADVAPI32(?), ref: 00401529
                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: Close$DeleteEnumOpen
                                                      • String ID:
                                                      • API String ID: 1912718029-0
                                                      • Opcode ID: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                                      • Instruction ID: 29266b44d1cae769f6d8fca298176d7cc4518162af5fbc8546bcefd12e7d5eb7
                                                      • Opcode Fuzzy Hash: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                                      • Instruction Fuzzy Hash: EF114972500008FFDF119F90EE85DAA3B7AFB54348F00407AFA06F6170D7759E54AA29
                                                      APIs
                                                      • GetDlgItem.USER32(?), ref: 004020A3
                                                      • GetClientRect.USER32(00000000,?), ref: 004020B0
                                                      • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                                      • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                                      • DeleteObject.GDI32(00000000), ref: 004020EE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                      • String ID:
                                                      • API String ID: 1849352358-0
                                                      • Opcode ID: 3f37f65ad39e50193b5eb5465f4a6a1b76990ca473236759665c0c01a91169be
                                                      • Instruction ID: a6d8e4af78efbdafb2d3f18e6b80530ac635d705efb76da9f8ac6e555915fa7b
                                                      • Opcode Fuzzy Hash: 3f37f65ad39e50193b5eb5465f4a6a1b76990ca473236759665c0c01a91169be
                                                      • Instruction Fuzzy Hash: 95F012B2600508AFDB00EBA4EF89DAF7BBCEB04305B104579F642F6161C6759E418B28
                                                      APIs
                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Timeout
                                                      • String ID: !
                                                      • API String ID: 1777923405-2657877971
                                                      • Opcode ID: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                                      • Instruction ID: e43e738488dd09895ebc4b193b1bc1394e214230f2e5861cb954e074e697f1bf
                                                      • Opcode Fuzzy Hash: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                                      • Instruction Fuzzy Hash: 93217171900209ABDF15AFB4D986ABE7BB9EF04349F14413EF602F60E2D6798A40D758
                                                      APIs
                                                        • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                                      • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                      Strings
                                                      • DeleteRegKey: "%s\%s", xrefs: 00402843
                                                      • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                                      • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                                      • API String ID: 1697273262-1764544995
                                                      • Opcode ID: 48bae300e43d63654b7fe916574e47b7d5bb67918eda10473d167f607cc9ee43
                                                      • Instruction ID: a9eecf508c221bc7802a822649300ece756bcc80235207ffe39efc99e8d71eac
                                                      • Opcode Fuzzy Hash: 48bae300e43d63654b7fe916574e47b7d5bb67918eda10473d167f607cc9ee43
                                                      • Instruction Fuzzy Hash: FA11A772E00101ABDB10FFA5DD4AABE7AA4EF40354F14443FF50AB61D2D6BD8A50879D
                                                      APIs
                                                      • IsWindowVisible.USER32(?), ref: 00404902
                                                      • CallWindowProcW.USER32(?,00000200,?,?), ref: 00404970
                                                        • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: Window$CallMessageProcSendVisible
                                                      • String ID: $@rD
                                                      • API String ID: 3748168415-881980237
                                                      • Opcode ID: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                                      • Instruction ID: bed307b1c5f775dd60c200178c13c7fdb07d6bd57f5d25ab133f42f3a31df96a
                                                      • Opcode Fuzzy Hash: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                                      • Instruction Fuzzy Hash: 7A114FB1500218ABEF21AF61ED41E9B3769AB84359F00803BF714751A2C77C8D519BAD
                                                      APIs
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                        • Part of subcall function 004062D5: FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                                        • Part of subcall function 004062D5: FindClose.KERNEL32(00000000), ref: 004062EC
                                                      • lstrlenW.KERNEL32 ref: 004026B4
                                                      • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                                      • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                                      • String ID: CopyFiles "%s"->"%s"
                                                      • API String ID: 2577523808-3778932970
                                                      • Opcode ID: f84dc7438b734d649018535b99f5ff883fadf72990f7ea17a428efaae3f8c2d6
                                                      • Instruction ID: a779005ae7d6007116ac0765ed120a10e3eb966af121a96df1e98a57451096ba
                                                      • Opcode Fuzzy Hash: f84dc7438b734d649018535b99f5ff883fadf72990f7ea17a428efaae3f8c2d6
                                                      • Instruction Fuzzy Hash: A0112171D00214A6CB10FFBA994699FBBBCEF44354F10843FB506F72D2E6B985118B59
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: lstrcatwsprintf
                                                      • String ID: %02x%c$...
                                                      • API String ID: 3065427908-1057055748
                                                      • Opcode ID: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                                      • Instruction ID: b8620b589ecf2e5093343df65250d9ec4fb1615d5218d90249241d8ea01b8719
                                                      • Opcode Fuzzy Hash: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                                      • Instruction Fuzzy Hash: A2014932500214EFCB10EF58CC84A9EBBE9EB84304F20407AF405F3180D6759EA48794
                                                      APIs
                                                        • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                      • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfileStringWritelstrcpyn
                                                      • String ID: <RM>$WriteINIStr: wrote [%s] %s=%s in %s$open
                                                      • API String ID: 247603264-1827671502
                                                      • Opcode ID: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                                      • Instruction ID: 1675f45263e21dacb3bd3d3c28f4c469aa899418fcec56767b4290250f933745
                                                      • Opcode Fuzzy Hash: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                                      • Instruction Fuzzy Hash: 05014F70D40319BADB10BFA18D859AF7A78AF09304F10403FF11A761E3D7B80A408BAD
                                                      APIs
                                                      • OleInitialize.OLE32(00000000), ref: 00405057
                                                        • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                      • OleUninitialize.OLE32(00000404,00000000), ref: 004050A5
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                                      • String ID: Section: "%s"$Skipping section: "%s"
                                                      • API String ID: 2266616436-4211696005
                                                      • Opcode ID: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                                      • Instruction ID: 490ae00110c0e09774d0d246d4d4a011172e9101669e5a2b786a62fce758e9f8
                                                      • Opcode Fuzzy Hash: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                                      • Instruction Fuzzy Hash: 41F0F4338087009BE6506B64AE07B9B77A4DFD4320F24007FFE48721E1ABFC48818A9D
                                                      APIs
                                                      • GetDC.USER32(?), ref: 00402100
                                                      • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                                      • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                                        • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                      • CreateFontIndirectW.GDI32(0041F0F0), ref: 0040216A
                                                        • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                                      • String ID:
                                                      • API String ID: 1599320355-0
                                                      • Opcode ID: 6f0d7b084d37585979e4dd0fd2aac30abed8a2b5fd168dddd791f163065a0eb0
                                                      • Instruction ID: 656afd6720eca978824560f17fb47cc17b19fb3a621816cfe3730d6e1c8eda21
                                                      • Opcode Fuzzy Hash: 6f0d7b084d37585979e4dd0fd2aac30abed8a2b5fd168dddd791f163065a0eb0
                                                      • Instruction Fuzzy Hash: DA017172644650EFE701ABB4ED4ABDA3BA4A725315F10C43AE645A61E3C678440A8B2D
                                                      APIs
                                                        • Part of subcall function 00406ED2: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                                      • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407239
                                                      • lstrcmpW.KERNEL32(?,Version ), ref: 0040724A
                                                      • lstrcpynW.KERNEL32(?,?,?), ref: 00407261
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: lstrcpyn$CreateFilelstrcmp
                                                      • String ID: Version
                                                      • API String ID: 512980652-315105994
                                                      • Opcode ID: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                                      • Instruction ID: 151640cc4cfa07bb85738859349229c9473c158da19ee21f10eacb3052f8d035
                                                      • Opcode Fuzzy Hash: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                                      • Instruction Fuzzy Hash: 3EF03172A0021CABDB109AA5DD46EEA777CAB44700F100476F600F6191E6B59E158BA5
                                                      APIs
                                                      • DestroyWindow.USER32(00000000,00000000,00403703,00000001,?,?,?,00000000,00403A47,?), ref: 004032E5
                                                      • GetTickCount.KERNEL32 ref: 00403303
                                                      • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                                      • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A47,?), ref: 0040332E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                      • String ID:
                                                      • API String ID: 2102729457-0
                                                      • Opcode ID: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                                      • Instruction ID: 401e6cecbc7a0b9e3d471fb50fe358663bd3ad25f9a7ebc527197863dd5a4904
                                                      • Opcode Fuzzy Hash: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                                      • Instruction Fuzzy Hash: 23F08230502620EBC221AF64FE5CBAB7F68FB04B82701447EF545F12A4CB7849928BDC
                                                      APIs
                                                      • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 00406370
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 00406386
                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 00406395
                                                      • GlobalFree.KERNEL32(00000000), ref: 0040639E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                                      • String ID:
                                                      • API String ID: 2883127279-0
                                                      • Opcode ID: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                                      • Instruction ID: 581917a1a4a7218ca9fbbc4554f9bfb31441e22884f00dccc1ee77d568dea7f2
                                                      • Opcode Fuzzy Hash: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                                      • Instruction Fuzzy Hash: 19E048712012107BE2101B669E8CD677EADDFCA7B6B05013EF695F51A0CE348C15D675
                                                      APIs
                                                      • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                                        • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                      • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: Window$EnableShowlstrlenwvsprintf
                                                      • String ID: HideWindow
                                                      • API String ID: 1249568736-780306582
                                                      • Opcode ID: 2f246f05ebd7dc674da9b5ff0baef701d10e4a3e2a51ec62881f8ce9e704e4b5
                                                      • Instruction ID: bfe0de145d0e58e27592ef60cc9cda220d4f3e6bacb950e19a0f62fa040dbd34
                                                      • Opcode Fuzzy Hash: 2f246f05ebd7dc674da9b5ff0baef701d10e4a3e2a51ec62881f8ce9e704e4b5
                                                      • Instruction Fuzzy Hash: F1E09232A05111DBCB08FBB5A74A5AE76B4EA9532A721007FE143F20D0DABD8D01C62D
                                                      APIs
                                                      • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                                      • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfileStringlstrcmp
                                                      • String ID: !N~
                                                      • API String ID: 623250636-529124213
                                                      • Opcode ID: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                                      • Instruction ID: 7cd271610f6b1cb64eb4c57d825f56a096f62725fe87e34e9129affe44791136
                                                      • Opcode Fuzzy Hash: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                                      • Instruction Fuzzy Hash: 37E0E571500208ABDB00BBA0DE85DAE7BBCAF05304F14443AF641F71E3EA7459028718
                                                      APIs
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                                      • CloseHandle.KERNEL32(?), ref: 00405C71
                                                      Strings
                                                      • Error launching installer, xrefs: 00405C48
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateHandleProcess
                                                      • String ID: Error launching installer
                                                      • API String ID: 3712363035-66219284
                                                      • Opcode ID: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                                      • Instruction ID: c3c9ba135fb9cbcc5263534f4c07e322ce29f53e9eda4e03cc008bde6a4ec24c
                                                      • Opcode Fuzzy Hash: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                                      • Instruction Fuzzy Hash: 44E0EC70504209ABEF009B64EE49E7F7BBCEB00305F504575BD51E2561D774D9188A68
                                                      APIs
                                                      • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                      • wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                        • Part of subcall function 004060E7: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: CloseHandlelstrlenwvsprintf
                                                      • String ID: RMDir: RemoveDirectory invalid input("")
                                                      • API String ID: 3509786178-2769509956
                                                      • Opcode ID: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                                      • Instruction ID: 8d95e7b1bd6a8fe250904a0927f32055e446839aab417a06e937ad69edd5bb19
                                                      • Opcode Fuzzy Hash: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                                      • Instruction Fuzzy Hash: 04D05E34150316BACA009BA0DE09E997B64FBD0384F50442EF147C5070FA748001C70E
                                                      APIs
                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                                      • lstrcmpiA.KERNEL32(?,?), ref: 00405DDE
                                                      • CharNextA.USER32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DEF
                                                      • lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1379664267.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1379636432.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379688512.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379707736.0000000000497000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1379847481.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_QqHWdVqNBs.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                      • String ID:
                                                      • API String ID: 190613189-0
                                                      • Opcode ID: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                      • Instruction ID: 82a91399e33c41d3abe84131f59dcd741317d7299bce3ff9d06b8c6e92496674
                                                      • Opcode Fuzzy Hash: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                      • Instruction Fuzzy Hash: D5F0CD31205988EFCB019FA9CD04C9FBBA8EF56350B2180AAE840E7310D630EE01DBA4

                                                      Execution Graph

                                                      Execution Coverage:4.1%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:1.8%
                                                      Total number of Nodes:2000
                                                      Total number of Limit Nodes:45
                                                      execution_graph 100844 bd107d 100849 be2fc5 100844->100849 100846 bd108c 100880 bf2ea0 100846->100880 100850 be2fd5 __ftell_nolock 100849->100850 100883 be1207 100850->100883 100854 be3094 100895 bf07ec 100854->100895 100861 be1207 59 API calls 100862 be30c5 100861->100862 100914 be19e1 100862->100914 100864 be30ce RegOpenKeyExW 100865 c20123 RegQueryValueExW 100864->100865 100870 be30f0 Mailbox 100864->100870 100866 c20140 100865->100866 100867 c201b5 RegCloseKey 100865->100867 100918 bf0f16 100866->100918 100867->100870 100878 c201c7 _wcscat Mailbox __wsetenvp 100867->100878 100869 c20159 100928 be433f 100869->100928 100870->100846 100873 c20181 100931 be1821 100873->100931 100875 c2019b 100875->100867 100877 be4c94 59 API calls 100877->100878 100878->100870 100878->100877 100879 be1609 59 API calls 100878->100879 100940 be1a36 100878->100940 100879->100878 101005 bf2da4 100880->101005 100882 bd1096 100884 bf0f16 Mailbox 59 API calls 100883->100884 100885 be1228 100884->100885 100886 bf0f16 Mailbox 59 API calls 100885->100886 100887 be1236 100886->100887 100888 befffa 100887->100888 100944 c01aa0 100888->100944 100891 be1a36 59 API calls 100892 bf002d 100891->100892 100946 bf01af 100892->100946 100894 bf0037 Mailbox 100894->100854 100896 c01aa0 __ftell_nolock 100895->100896 100897 bf07f9 GetFullPathNameW 100896->100897 100898 bf081b 100897->100898 100899 be1821 59 API calls 100898->100899 100900 be309f 100899->100900 100901 be1900 100900->100901 100902 c1f4b4 100901->100902 100903 be1914 100901->100903 100973 be1c7e 100902->100973 100968 be18a5 100903->100968 100906 be191f 100908 be4c94 100906->100908 100907 c1f4bf __wsetenvp _memmove 100909 be4ca2 100908->100909 100913 be4cc4 _memmove 100908->100913 100911 bf0f16 Mailbox 59 API calls 100909->100911 100910 bf0f16 Mailbox 59 API calls 100912 be30bc 100910->100912 100911->100913 100912->100861 100913->100910 100915 be19fb 100914->100915 100917 be19ee 100914->100917 100916 bf0f16 Mailbox 59 API calls 100915->100916 100916->100917 100917->100864 100920 bf0f1e 100918->100920 100921 bf0f38 100920->100921 100923 bf0f3c std::exception::exception 100920->100923 100976 bf586c 100920->100976 100993 bf3503 DecodePointer 100920->100993 100921->100869 100994 bf86fb RaiseException 100923->100994 100925 bf0f66 100995 bf8631 58 API calls _free 100925->100995 100927 bf0f78 100927->100869 100929 bf0f16 Mailbox 59 API calls 100928->100929 100930 be4351 RegQueryValueExW 100929->100930 100930->100873 100930->100875 100932 be182d __wsetenvp 100931->100932 100933 be189a 100931->100933 100936 be1868 100932->100936 100937 be1843 100932->100937 100934 be1981 59 API calls 100933->100934 100935 be184b _memmove 100934->100935 100935->100875 100939 be1c7e 59 API calls 100936->100939 101004 be1b7c 59 API calls Mailbox 100937->101004 100939->100935 100941 be1a45 __wsetenvp _memmove 100940->100941 100942 bf0f16 Mailbox 59 API calls 100941->100942 100943 be1a83 100942->100943 100943->100878 100945 bf0007 GetModuleFileNameW 100944->100945 100945->100891 100947 c01aa0 __ftell_nolock 100946->100947 100948 bf01bc GetFullPathNameW 100947->100948 100949 bf01db 100948->100949 100950 bf01f8 100948->100950 100952 be1821 59 API calls 100949->100952 100951 be19e1 59 API calls 100950->100951 100953 bf01e7 100951->100953 100952->100953 100956 be133d 100953->100956 100957 be134b 100956->100957 100960 be1981 100957->100960 100959 be135b 100959->100894 100961 be198f 100960->100961 100962 be1998 _memmove 100960->100962 100961->100962 100964 be1aa4 100961->100964 100962->100959 100965 be1ab7 100964->100965 100966 be1ab4 _memmove 100964->100966 100967 bf0f16 Mailbox 59 API calls 100965->100967 100966->100962 100967->100966 100969 be18b4 __wsetenvp 100968->100969 100970 be1c7e 59 API calls 100969->100970 100971 be18c5 _memmove 100969->100971 100972 c1f471 _memmove 100970->100972 100971->100906 100974 bf0f16 Mailbox 59 API calls 100973->100974 100975 be1c88 100974->100975 100975->100907 100977 bf58e7 100976->100977 100985 bf5878 100976->100985 101002 bf3503 DecodePointer 100977->101002 100979 bf58ed 101003 bf8c88 58 API calls __getptd_noexit 100979->101003 100982 bf58ab RtlAllocateHeap 100983 bf58df 100982->100983 100982->100985 100983->100920 100985->100982 100986 bf58d3 100985->100986 100987 bf5883 100985->100987 100991 bf58d1 100985->100991 100999 bf3503 DecodePointer 100985->100999 101000 bf8c88 58 API calls __getptd_noexit 100986->101000 100987->100985 100996 bfa2cb 58 API calls 2 library calls 100987->100996 100997 bfa328 58 API calls 7 library calls 100987->100997 100998 bf3201 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 100987->100998 101001 bf8c88 58 API calls __getptd_noexit 100991->101001 100993->100920 100994->100925 100995->100927 100996->100987 100997->100987 100999->100985 101000->100991 101001->100983 101002->100979 101003->100983 101004->100935 101006 bf2db0 __tzset_nolock 101005->101006 101013 bf3379 101006->101013 101012 bf2dd7 __tzset_nolock 101012->100882 101030 bf9d6b 101013->101030 101015 bf2db9 101016 bf2de8 DecodePointer DecodePointer 101015->101016 101017 bf2dc5 101016->101017 101018 bf2e15 101016->101018 101027 bf2de2 101017->101027 101018->101017 101076 bf8904 59 API calls 2 library calls 101018->101076 101020 bf2e78 EncodePointer EncodePointer 101020->101017 101021 bf2e27 101021->101020 101022 bf2e4c 101021->101022 101077 bf89c4 61 API calls 2 library calls 101021->101077 101022->101017 101025 bf2e66 EncodePointer 101022->101025 101078 bf89c4 61 API calls 2 library calls 101022->101078 101025->101020 101026 bf2e60 101026->101017 101026->101025 101079 bf3382 101027->101079 101031 bf9d8f EnterCriticalSection 101030->101031 101032 bf9d7c 101030->101032 101031->101015 101037 bf9df3 101032->101037 101034 bf9d82 101034->101031 101061 bf3217 58 API calls 3 library calls 101034->101061 101038 bf9dff __tzset_nolock 101037->101038 101039 bf9e08 101038->101039 101040 bf9e20 101038->101040 101062 bfa2cb 58 API calls 2 library calls 101039->101062 101048 bf9e41 __tzset_nolock 101040->101048 101065 bf897d 58 API calls 2 library calls 101040->101065 101043 bf9e0d 101063 bfa328 58 API calls 7 library calls 101043->101063 101044 bf9e35 101046 bf9e3c 101044->101046 101047 bf9e4b 101044->101047 101066 bf8c88 58 API calls __getptd_noexit 101046->101066 101052 bf9d6b __lock 58 API calls 101047->101052 101048->101034 101049 bf9e14 101064 bf3201 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101049->101064 101054 bf9e52 101052->101054 101055 bf9e5f 101054->101055 101056 bf9e77 101054->101056 101067 bf9f8b InitializeCriticalSectionAndSpinCount 101055->101067 101068 bf2eb5 101056->101068 101059 bf9e6b 101074 bf9e93 LeaveCriticalSection _doexit 101059->101074 101062->101043 101063->101049 101065->101044 101066->101048 101067->101059 101069 bf2ebe RtlFreeHeap 101068->101069 101070 bf2ee7 __dosmaperr 101068->101070 101069->101070 101071 bf2ed3 101069->101071 101070->101059 101075 bf8c88 58 API calls __getptd_noexit 101071->101075 101073 bf2ed9 GetLastError 101073->101070 101074->101048 101075->101073 101076->101021 101077->101022 101078->101026 101082 bf9ed5 LeaveCriticalSection 101079->101082 101081 bf2de7 101081->101012 101082->101081 103985 bd9a6c 103988 bd829c 103985->103988 103987 bd9a78 103989 bd82b4 103988->103989 103996 bd8308 103988->103996 103990 bd53b0 441 API calls 103989->103990 103989->103996 103994 bd82eb 103990->103994 103992 c10e08 103992->103992 103993 bd8331 103993->103987 103994->103993 103997 bd523c 59 API calls 103994->103997 103996->103993 103998 c3a2fa 89 API calls 4 library calls 103996->103998 103997->103996 103998->103992 103999 c0e393 104011 bd373a 103999->104011 104001 c0e3a9 104002 c0e3bf 104001->104002 104004 c0e42a 104001->104004 104020 bd5376 60 API calls 104002->104020 104005 bdb020 441 API calls 104004->104005 104010 c0e41e Mailbox 104005->104010 104007 c0e3fe 104007->104010 104021 c38777 59 API calls Mailbox 104007->104021 104008 c0ef76 Mailbox 104010->104008 104022 c3a2fa 89 API calls 4 library calls 104010->104022 104012 bd3758 104011->104012 104013 bd3746 104011->104013 104015 bd375e 104012->104015 104016 bd3787 104012->104016 104023 bd523c 59 API calls 104013->104023 104017 bf0f16 Mailbox 59 API calls 104015->104017 104024 bd523c 59 API calls 104016->104024 104019 bd3750 104017->104019 104019->104001 104020->104007 104021->104010 104022->104008 104023->104019 104024->104019 104025 bd9a88 104028 bd86e0 104025->104028 104027 bd9a96 104029 bd86fd 104028->104029 104030 c10f28 104029->104030 104031 c10edd 104029->104031 104045 bd8724 104029->104045 104063 c4a898 441 API calls __cinit 104030->104063 104034 c10ee0 104031->104034 104040 c10ef7 104031->104040 104032 bd5278 59 API calls 104032->104045 104035 c10ee5 104034->104035 104034->104045 104061 c4aeac 441 API calls 104035->104061 104036 bf2ea0 __cinit 67 API calls 104036->104045 104039 c10ef2 104039->104027 104044 bd898d 104040->104044 104062 c4b354 441 API calls 3 library calls 104040->104062 104041 c111b9 104041->104027 104042 bd3c30 68 API calls 104042->104045 104050 bd8a17 104044->104050 104067 c3a2fa 89 API calls 4 library calls 104044->104067 104045->104032 104045->104036 104045->104042 104045->104044 104046 c110df 104045->104046 104047 bd3f42 68 API calls 104045->104047 104045->104050 104051 bd39be 68 API calls 104045->104051 104055 bd53b0 441 API calls 104045->104055 104056 be1c9c 59 API calls 104045->104056 104058 bd3938 68 API calls 104045->104058 104059 bd84e2 89 API calls 104045->104059 104060 bd835f 441 API calls 104045->104060 104064 bd523c 59 API calls 104045->104064 104065 c2718e 59 API calls 104045->104065 104066 c4ac03 89 API calls 104046->104066 104047->104045 104050->104027 104051->104045 104055->104045 104056->104045 104058->104045 104059->104045 104060->104045 104061->104039 104062->104044 104063->104045 104064->104045 104065->104045 104066->104044 104067->104041 101083 bd1055 101088 bd2a19 101083->101088 101086 bf2ea0 __cinit 67 API calls 101087 bd1064 101086->101087 101089 be1207 59 API calls 101088->101089 101090 bd2a87 101089->101090 101095 bd1256 101090->101095 101092 bd2b24 101093 bd105a 101092->101093 101098 bd13c7 59 API calls 2 library calls 101092->101098 101093->101086 101099 bd1284 101095->101099 101098->101092 101100 bd1291 101099->101100 101101 bd1275 101099->101101 101100->101101 101102 bd1298 RegOpenKeyExW 101100->101102 101101->101092 101102->101101 101103 bd12b2 RegQueryValueExW 101102->101103 101104 bd12e8 RegCloseKey 101103->101104 101105 bd12d3 101103->101105 101104->101101 101105->101104 101106 bd5ff5 101121 bd5ede Mailbox _memmove 101106->101121 101107 bf0f16 59 API calls Mailbox 101107->101121 101108 bd6a9b 101392 bda9de 441 API calls 101108->101392 101111 c0ef29 101408 bd5190 59 API calls Mailbox 101111->101408 101112 bd6abc 101406 c3a2fa 89 API calls 4 library calls 101112->101406 101114 c0ef37 101409 c3a2fa 89 API calls 4 library calls 101114->101409 101117 c0ef1b 101163 bd5569 Mailbox 101117->101163 101407 c26ad4 59 API calls Mailbox 101117->101407 101119 bd60e5 101119->101112 101120 bd6152 Mailbox 101119->101120 101122 c0e067 101119->101122 101125 bd63bd Mailbox 101119->101125 101120->101112 101159 bd61bf 101120->101159 101402 c27890 59 API calls 101120->101402 101121->101107 101121->101108 101121->101111 101121->101112 101121->101114 101121->101119 101126 be1a36 59 API calls 101121->101126 101121->101163 101177 bd53b0 101121->101177 101348 c4c11d 101121->101348 101391 bd523c 59 API calls 101121->101391 101396 be1c9c 101121->101396 101400 c37d7e 59 API calls Mailbox 101121->101400 101401 c26ad4 59 API calls Mailbox 101121->101401 101122->101125 101393 c27890 59 API calls 101122->101393 101128 bf0f16 Mailbox 59 API calls 101125->101128 101126->101121 101131 bd63d1 101128->101131 101131->101112 101132 bd63de 101131->101132 101134 bd6413 101132->101134 101135 c0e0a2 101132->101135 101138 bd6426 101134->101138 101164 bd5447 Mailbox 101134->101164 101394 c4c644 85 API calls 2 library calls 101135->101394 101395 c4c791 95 API calls Mailbox 101138->101395 101140 c0e0cd 101140->101140 101141 c0e5c1 101403 c3a2fa 89 API calls 4 library calls 101141->101403 101142 c0f095 101411 c3a2fa 89 API calls 4 library calls 101142->101411 101146 bd69fa 101150 be1c9c 59 API calls 101146->101150 101148 c0e5d0 101149 bf0f16 59 API calls Mailbox 101149->101164 101150->101163 101152 c0e2fd VariantClear 101152->101159 101153 c0e9ca 101158 be1c9c 59 API calls 101153->101158 101154 bd69ff 101154->101141 101154->101142 101155 be1c9c 59 API calls 101155->101164 101156 be1207 59 API calls 101156->101164 101158->101163 101159->101112 101159->101117 101159->101152 101159->101163 101205 c33fa7 101159->101205 101208 c4ef7a 101159->101208 101213 c4e3d4 101159->101213 101216 bdd679 101159->101216 101256 c45be2 101159->101256 101281 c33f97 101159->101281 101284 bdcfd7 101159->101284 101303 c3d52b 101159->101303 101390 bd5190 59 API calls Mailbox 101159->101390 101160 c0ea97 101160->101163 101404 c27890 59 API calls 101160->101404 101161 c27890 59 API calls 101161->101164 101164->101141 101164->101146 101164->101149 101164->101153 101164->101154 101164->101155 101164->101156 101164->101160 101164->101161 101164->101163 101165 bf2ea0 67 API calls __cinit 101164->101165 101166 c0ee58 101164->101166 101168 bd5a1a 101164->101168 101388 bd7e50 441 API calls 2 library calls 101164->101388 101389 bd6e30 60 API calls Mailbox 101164->101389 101165->101164 101405 c3a2fa 89 API calls 4 library calls 101166->101405 101410 c3a2fa 89 API calls 4 library calls 101168->101410 101178 bd53cf 101177->101178 101186 bd53fd Mailbox 101177->101186 101179 bf0f16 Mailbox 59 API calls 101178->101179 101179->101186 101180 bd69fa 101181 be1c9c 59 API calls 101180->101181 101189 bd5569 Mailbox 101181->101189 101182 bd69ff 101183 c0e5c1 101182->101183 101184 c0f095 101182->101184 101414 c3a2fa 89 API calls 4 library calls 101183->101414 101418 c3a2fa 89 API calls 4 library calls 101184->101418 101185 be1207 59 API calls 101185->101186 101186->101180 101186->101182 101186->101183 101186->101185 101186->101189 101192 bf0f16 59 API calls Mailbox 101186->101192 101194 c0e9ca 101186->101194 101195 be1c9c 59 API calls 101186->101195 101198 c27890 59 API calls 101186->101198 101199 c0ea97 101186->101199 101200 bf2ea0 67 API calls __cinit 101186->101200 101202 c0ee58 101186->101202 101204 bd5a1a 101186->101204 101412 bd7e50 441 API calls 2 library calls 101186->101412 101413 bd6e30 60 API calls Mailbox 101186->101413 101189->101121 101191 c0e5d0 101191->101121 101192->101186 101197 be1c9c 59 API calls 101194->101197 101195->101186 101197->101189 101198->101186 101199->101189 101415 c27890 59 API calls 101199->101415 101200->101186 101416 c3a2fa 89 API calls 4 library calls 101202->101416 101417 c3a2fa 89 API calls 4 library calls 101204->101417 101419 c347b7 GetFileAttributesW 101205->101419 101423 bd4d37 101208->101423 101212 c4efa6 101212->101159 101556 c4cf8e 101213->101556 101215 c4e3e4 101215->101159 101666 bd4f98 101216->101666 101219 bf0f16 Mailbox 59 API calls 101221 bdd6aa 101219->101221 101222 bdd6ba 101221->101222 101696 be3df7 60 API calls Mailbox 101221->101696 101226 bd4d37 84 API calls 101222->101226 101223 c14f98 101224 bdd6df 101223->101224 101716 c3fa24 59 API calls 101223->101716 101231 bdd6ec 101224->101231 101717 bd502b 101224->101717 101228 bdd6c8 101226->101228 101697 be3e47 101228->101697 101229 c14fe0 101229->101231 101232 c14fe8 101229->101232 101679 be41d6 101231->101679 101234 bd502b 59 API calls 101232->101234 101236 bdd6f3 101234->101236 101238 bdd70d 101236->101238 101239 c14ffa 101236->101239 101240 be1207 59 API calls 101238->101240 101241 bf0f16 Mailbox 59 API calls 101239->101241 101242 bdd715 101240->101242 101243 c15000 101241->101243 101708 be3b7b 65 API calls Mailbox 101242->101708 101245 c15014 101243->101245 101684 be3ea1 101243->101684 101250 c15018 _memmove 101245->101250 101687 c37aec 101245->101687 101247 bdd724 101247->101250 101709 bd4f3c 59 API calls Mailbox 101247->101709 101251 bdd738 Mailbox 101252 bdd772 101251->101252 101710 be42cf 101251->101710 101252->101159 101257 c45c0b 101256->101257 101258 c45c39 WSAStartup 101257->101258 101259 bd502b 59 API calls 101257->101259 101260 c45c62 101258->101260 101280 c45c4d Mailbox 101258->101280 101261 c45c26 101259->101261 101764 be40cd 101260->101764 101261->101258 101265 bd502b 59 API calls 101261->101265 101264 bd4d37 84 API calls 101266 c45c77 101264->101266 101267 c45c35 101265->101267 101769 be402a WideCharToMultiByte 101266->101769 101267->101258 101269 c45c84 inet_addr gethostbyname 101270 c45ca2 IcmpCreateFile 101269->101270 101269->101280 101271 c45cc6 101270->101271 101270->101280 101272 bf0f16 Mailbox 59 API calls 101271->101272 101273 c45cdf 101272->101273 101274 be433f 59 API calls 101273->101274 101275 c45cea 101274->101275 101276 c45cf9 IcmpSendEcho 101275->101276 101277 c45d1a IcmpSendEcho 101275->101277 101279 c45d32 101276->101279 101277->101279 101278 c45d99 IcmpCloseHandle WSACleanup 101278->101280 101279->101278 101280->101159 101282 c347b7 3 API calls 101281->101282 101283 c33f9e 101282->101283 101283->101159 101285 bd4d37 84 API calls 101284->101285 101286 bdd001 101285->101286 101779 bd5278 101286->101779 101288 bdd018 101289 bd502b 59 API calls 101288->101289 101290 bdd57b 101288->101290 101293 bdd439 Mailbox __wsetenvp 101288->101293 101289->101293 101290->101159 101292 bf0b90 62 API calls 101292->101293 101293->101290 101293->101292 101295 bd4f98 59 API calls 101293->101295 101298 bd502b 59 API calls 101293->101298 101299 bd4d37 84 API calls 101293->101299 101300 be1821 59 API calls 101293->101300 101784 bf305f 101293->101784 101794 be59d3 101293->101794 101805 be5ac3 101293->101805 101809 be162d 101293->101809 101814 be153b 59 API calls 2 library calls 101293->101814 101815 bd4f3c 59 API calls Mailbox 101293->101815 101295->101293 101298->101293 101299->101293 101300->101293 101304 c3d555 101303->101304 101305 c3d54a 101303->101305 101309 be1207 59 API calls 101304->101309 101346 c3d62f Mailbox 101304->101346 101306 bd502b 59 API calls 101305->101306 101306->101304 101307 bf0f16 Mailbox 59 API calls 101308 c3d678 101307->101308 101310 c3d684 101308->101310 101868 be3df7 60 API calls Mailbox 101308->101868 101311 c3d579 101309->101311 101314 bd4d37 84 API calls 101310->101314 101313 be1207 59 API calls 101311->101313 101315 c3d582 101313->101315 101316 c3d69c 101314->101316 101317 bd4d37 84 API calls 101315->101317 101318 be3e47 67 API calls 101316->101318 101319 c3d58e 101317->101319 101320 c3d6ab 101318->101320 101321 bf0044 59 API calls 101319->101321 101323 c3d6af GetLastError 101320->101323 101325 c3d6e3 101320->101325 101322 c3d5a3 101321->101322 101324 be17e0 59 API calls 101322->101324 101328 c3d6c8 101323->101328 101329 c3d5d6 101324->101329 101326 c3d745 101325->101326 101327 c3d70e 101325->101327 101330 bf0f16 Mailbox 59 API calls 101326->101330 101331 bf0f16 Mailbox 59 API calls 101327->101331 101343 c3d638 Mailbox 101328->101343 101869 be3f0b CloseHandle 101328->101869 101334 c33f97 3 API calls 101329->101334 101347 c3d600 Mailbox 101329->101347 101335 c3d74a 101330->101335 101336 c3d713 101331->101336 101333 bd502b 59 API calls 101333->101346 101337 c3d5e6 101334->101337 101339 be1207 59 API calls 101335->101339 101335->101343 101338 c3d724 101336->101338 101340 be1207 59 API calls 101336->101340 101342 be1a36 59 API calls 101337->101342 101337->101347 101870 c30267 59 API calls 2 library calls 101338->101870 101339->101343 101340->101338 101344 c3d5f7 101342->101344 101343->101159 101856 c33d8a 101344->101856 101346->101307 101346->101343 101347->101333 101349 c4c162 101348->101349 101350 c4c148 101348->101350 101871 c4a6c5 101349->101871 101898 c3a2fa 89 API calls 4 library calls 101350->101898 101354 bd53b0 440 API calls 101355 c4c1ce 101354->101355 101356 c4c260 101355->101356 101360 c4c20f 101355->101360 101381 c4c15a Mailbox 101355->101381 101357 c4c2b6 101356->101357 101358 c4c266 101356->101358 101359 bd4d37 84 API calls 101357->101359 101357->101381 101899 c37d42 59 API calls 101358->101899 101361 c4c2c8 101359->101361 101365 c37707 59 API calls 101360->101365 101363 be1aa4 59 API calls 101361->101363 101366 c4c2ec CharUpperBuffW 101363->101366 101364 c4c289 101900 be35b9 59 API calls Mailbox 101364->101900 101368 c4c23f 101365->101368 101371 c4c306 101366->101371 101370 c26c9f 440 API calls 101368->101370 101369 c4c291 Mailbox 101901 bdb020 101369->101901 101370->101381 101372 c4c30d 101371->101372 101373 c4c359 101371->101373 101878 c37707 101372->101878 101374 bd4d37 84 API calls 101373->101374 101376 c4c361 101374->101376 101943 bd5376 60 API calls 101376->101943 101381->101121 101382 c4c36b 101382->101381 101383 bd4d37 84 API calls 101382->101383 101384 c4c386 101383->101384 101944 be35b9 59 API calls Mailbox 101384->101944 101386 c4c396 101387 bdb020 440 API calls 101386->101387 101387->101381 101388->101164 101389->101164 101390->101159 101391->101121 101392->101112 101393->101125 101394->101138 101395->101140 101397 be1caf 101396->101397 101398 be1ca7 101396->101398 101397->101121 101399 be1bcc 59 API calls 101398->101399 101399->101397 101400->101121 101401->101121 101402->101120 101403->101148 101404->101163 101405->101168 101406->101117 101407->101163 101408->101117 101409->101117 101410->101163 101411->101163 101412->101186 101413->101186 101414->101191 101415->101189 101416->101204 101417->101189 101418->101189 101420 c33fac 101419->101420 101421 c347d2 FindFirstFileW 101419->101421 101420->101159 101421->101420 101422 c347e7 FindClose 101421->101422 101422->101420 101424 bd4d51 101423->101424 101433 bd4d4b 101423->101433 101425 c0da58 __i64tow 101424->101425 101426 bd4d99 101424->101426 101430 bd4d57 __itow 101424->101430 101432 c0d95f 101424->101432 101451 bf37fa 83 API calls 3 library calls 101426->101451 101429 bf0f16 Mailbox 59 API calls 101431 bd4d71 101429->101431 101430->101429 101431->101433 101435 be1a36 59 API calls 101431->101435 101434 bf0f16 Mailbox 59 API calls 101432->101434 101439 c0d9d7 Mailbox _wcscpy 101432->101439 101441 c33fb5 CreateToolhelp32Snapshot Process32FirstW 101433->101441 101436 c0d9a4 101434->101436 101435->101433 101437 bf0f16 Mailbox 59 API calls 101436->101437 101438 c0d9ca 101437->101438 101438->101439 101440 be1a36 59 API calls 101438->101440 101452 bf37fa 83 API calls 3 library calls 101439->101452 101440->101439 101453 c34b4f 101441->101453 101443 c34002 Process32NextW 101444 c340b1 CloseHandle 101443->101444 101445 c33ffb Mailbox 101443->101445 101444->101212 101445->101443 101445->101444 101446 be1207 59 API calls 101445->101446 101447 be1a36 59 API calls 101445->101447 101459 bf0044 101445->101459 101510 be17e0 101445->101510 101519 be151f 101445->101519 101446->101445 101447->101445 101451->101430 101452->101425 101454 c34b76 101453->101454 101455 c34b5d 101453->101455 101523 bf36f5 59 API calls __wcstoi64 101454->101523 101455->101454 101458 c34b7c 101455->101458 101522 bf378e GetStringTypeW _iswctype 101455->101522 101458->101445 101460 be1207 59 API calls 101459->101460 101461 bf005a 101460->101461 101462 be1207 59 API calls 101461->101462 101463 bf0062 101462->101463 101464 be1207 59 API calls 101463->101464 101465 bf006a 101464->101465 101466 be1207 59 API calls 101465->101466 101467 bf0072 101466->101467 101468 c26062 101467->101468 101469 bf00a6 101467->101469 101470 be1c9c 59 API calls 101468->101470 101471 be1462 59 API calls 101469->101471 101472 c2606b 101470->101472 101473 bf00b4 101471->101473 101474 be19e1 59 API calls 101472->101474 101475 be1981 59 API calls 101473->101475 101477 bf00e9 101474->101477 101476 bf00be 101475->101476 101476->101477 101478 be1462 59 API calls 101476->101478 101480 bf0108 101477->101480 101494 c2608b 101477->101494 101496 bf0129 101477->101496 101481 bf00df 101478->101481 101537 be1609 101480->101537 101485 be1981 59 API calls 101481->101485 101483 bf013a 101487 bf014c 101483->101487 101489 be1c9c 59 API calls 101483->101489 101484 c2615b 101488 be1821 59 API calls 101484->101488 101485->101477 101490 bf015c 101487->101490 101492 be1c9c 59 API calls 101487->101492 101505 c26118 101488->101505 101489->101487 101495 bf0163 101490->101495 101497 be1c9c 59 API calls 101490->101497 101491 be1462 59 API calls 101491->101496 101492->101490 101493 c26144 101493->101484 101501 c2612f 101493->101501 101494->101484 101494->101493 101504 c260c2 101494->101504 101498 be1c9c 59 API calls 101495->101498 101507 bf016a Mailbox 101495->101507 101524 be1462 101496->101524 101497->101495 101498->101507 101499 be1609 59 API calls 101499->101505 101500 c26120 101502 be1821 59 API calls 101500->101502 101503 be1821 59 API calls 101501->101503 101502->101505 101503->101505 101504->101500 101508 c2610b 101504->101508 101505->101496 101505->101499 101540 be153b 59 API calls 2 library calls 101505->101540 101507->101445 101509 be1821 59 API calls 101508->101509 101509->101505 101511 c1f381 101510->101511 101512 be17f2 101510->101512 101548 c285dc 59 API calls _memmove 101511->101548 101542 be1680 101512->101542 101515 be17fe 101515->101445 101516 c1f38b 101517 be1c9c 59 API calls 101516->101517 101518 c1f393 Mailbox 101517->101518 101549 be14db 101519->101549 101522->101455 101523->101458 101525 be14ce 101524->101525 101526 be1471 101524->101526 101527 be1981 59 API calls 101525->101527 101526->101525 101528 be147c 101526->101528 101534 be149f _memmove 101527->101534 101529 be1497 101528->101529 101530 c1f15e 101528->101530 101541 be1b7c 59 API calls Mailbox 101529->101541 101531 be1c7e 59 API calls 101530->101531 101533 c1f168 101531->101533 101535 bf0f16 Mailbox 59 API calls 101533->101535 101534->101483 101536 c1f188 101535->101536 101538 be1aa4 59 API calls 101537->101538 101539 be1614 101538->101539 101539->101491 101539->101496 101540->101505 101541->101534 101543 be1692 101542->101543 101546 be16ba _memmove 101542->101546 101544 bf0f16 Mailbox 59 API calls 101543->101544 101543->101546 101547 be176f _memmove 101544->101547 101545 bf0f16 Mailbox 59 API calls 101545->101547 101546->101515 101547->101545 101548->101516 101550 be14e9 CompareStringW 101549->101550 101555 c1f190 101549->101555 101552 be150c 101550->101552 101552->101445 101553 c1f1df 101554 bf4de8 60 API calls 101554->101555 101555->101553 101555->101554 101557 bd4d37 84 API calls 101556->101557 101558 c4cfcb 101557->101558 101581 c4d012 Mailbox 101558->101581 101594 c4dc56 101558->101594 101560 c4d26a 101561 c4d3df 101560->101561 101565 c4d278 101560->101565 101645 c4dd79 92 API calls Mailbox 101561->101645 101564 c4d3ee 101564->101565 101567 c4d3fa 101564->101567 101607 c4ce1f 101565->101607 101566 bd4d37 84 API calls 101584 c4d063 Mailbox 101566->101584 101567->101581 101572 c4d2b1 101622 bf0d68 101572->101622 101575 c4d2e4 101630 bd47be 101575->101630 101576 c4d2cb 101629 c3a2fa 89 API calls 4 library calls 101576->101629 101579 c4d2d6 GetCurrentProcess TerminateProcess 101579->101575 101581->101215 101584->101560 101584->101566 101584->101581 101627 c30267 59 API calls 2 library calls 101584->101627 101628 c4d490 61 API calls 2 library calls 101584->101628 101586 c4d455 101586->101581 101590 c4d469 FreeLibrary 101586->101590 101587 c4d31c 101642 c4dafa 107 API calls _free 101587->101642 101590->101581 101592 c4d32d 101592->101586 101643 bd4230 59 API calls Mailbox 101592->101643 101644 bd523c 59 API calls 101592->101644 101646 c4dafa 107 API calls _free 101592->101646 101595 be1aa4 59 API calls 101594->101595 101596 c4dc71 CharLowerBuffW 101595->101596 101647 c2f6e6 101596->101647 101600 be1207 59 API calls 101601 c4dcaa 101600->101601 101602 be1462 59 API calls 101601->101602 101604 c4dcc1 101602->101604 101603 c4dd09 Mailbox 101603->101584 101605 be1981 59 API calls 101604->101605 101606 c4dccd Mailbox 101605->101606 101606->101603 101654 c4d490 61 API calls 2 library calls 101606->101654 101608 c4ce3a 101607->101608 101609 c4ce8f 101607->101609 101610 bf0f16 Mailbox 59 API calls 101608->101610 101613 c4df01 101609->101613 101612 c4ce5c 101610->101612 101611 bf0f16 Mailbox 59 API calls 101611->101612 101612->101609 101612->101611 101614 c4e12a Mailbox 101613->101614 101615 c4df24 _strcat _wcscpy __wsetenvp 101613->101615 101614->101572 101615->101614 101616 bd50d5 59 API calls 101615->101616 101617 bd502b 59 API calls 101615->101617 101618 bd5087 59 API calls 101615->101618 101619 bd4d37 84 API calls 101615->101619 101620 bf586c 58 API calls __crtLCMapStringA_stat 101615->101620 101655 c35caf 61 API calls 2 library calls 101615->101655 101616->101615 101617->101615 101618->101615 101619->101615 101620->101615 101623 bf0d7d 101622->101623 101624 bf0e15 Sleep 101623->101624 101625 bf0de3 101623->101625 101626 bf0e03 CloseHandle 101623->101626 101624->101625 101625->101575 101625->101576 101626->101625 101627->101584 101628->101584 101629->101579 101631 bd47c6 101630->101631 101632 bf0f16 Mailbox 59 API calls 101631->101632 101633 bd47d4 101632->101633 101634 bd47e0 101633->101634 101656 bd46ec 59 API calls Mailbox 101633->101656 101636 bd4540 101634->101636 101657 bd4650 101636->101657 101638 bf0f16 Mailbox 59 API calls 101640 bd45eb 101638->101640 101639 bd454f 101639->101638 101639->101640 101640->101592 101641 bd4230 59 API calls Mailbox 101640->101641 101641->101587 101642->101592 101643->101592 101644->101592 101645->101564 101646->101592 101648 c2f711 __wsetenvp 101647->101648 101649 c2f750 101648->101649 101652 c2f746 101648->101652 101653 c2f7f7 101648->101653 101649->101600 101649->101606 101650 be14db 61 API calls 101650->101652 101651 be14db 61 API calls 101651->101653 101652->101649 101652->101650 101653->101649 101653->101651 101654->101603 101655->101615 101656->101634 101658 bd4659 Mailbox 101657->101658 101659 c0d61c 101658->101659 101664 bd4663 101658->101664 101660 bf0f16 Mailbox 59 API calls 101659->101660 101661 c0d628 101660->101661 101662 bd466a 101662->101639 101664->101662 101665 bd5190 59 API calls Mailbox 101664->101665 101665->101664 101667 bd4fa8 101666->101667 101668 c0dc5b 101666->101668 101672 bf0f16 Mailbox 59 API calls 101667->101672 101669 c0dc6c 101668->101669 101670 be1821 59 API calls 101668->101670 101671 be19e1 59 API calls 101669->101671 101670->101669 101674 c0dc76 101671->101674 101673 bd4fbb 101672->101673 101673->101674 101675 bd4fc6 101673->101675 101676 bd4fd4 101674->101676 101677 be1207 59 API calls 101674->101677 101675->101676 101678 be1a36 59 API calls 101675->101678 101676->101219 101676->101223 101677->101676 101678->101676 101721 be410a 101679->101721 101682 be410a 2 API calls 101683 be420b 101682->101683 101683->101236 101731 be4220 101684->101731 101688 c37af7 101687->101688 101689 bf0f16 Mailbox 59 API calls 101688->101689 101690 c37afe 101689->101690 101691 c37b2b 101690->101691 101692 c37b0a 101690->101692 101694 bf0f16 Mailbox 59 API calls 101691->101694 101693 bf0f16 Mailbox 59 API calls 101692->101693 101695 c37b13 _memset 101693->101695 101694->101695 101695->101250 101696->101222 101698 be42cf CloseHandle 101697->101698 101699 be3e53 101698->101699 101738 be42f9 101699->101738 101701 bdd6d7 101701->101223 101701->101224 101715 be3f0b CloseHandle 101701->101715 101702 be3e72 101702->101701 101746 be3c61 62 API calls Mailbox 101702->101746 101704 be3e84 101747 be389f 101704->101747 101708->101247 101709->101251 101711 be42e8 101710->101711 101712 bdd766 101710->101712 101711->101712 101713 be42ed CloseHandle 101711->101713 101712->101252 101714 be3f0b CloseHandle 101712->101714 101713->101712 101714->101252 101715->101223 101716->101223 101718 bd5041 101717->101718 101719 bd503c 101717->101719 101718->101229 101719->101718 101763 bf36ec 59 API calls 101719->101763 101727 be4124 101721->101727 101722 be41ab SetFilePointerEx 101729 be42ae SetFilePointerEx 101722->101729 101723 c2064c 101730 be42ae SetFilePointerEx 101723->101730 101726 c20666 101727->101722 101727->101723 101728 be417f 101727->101728 101728->101682 101729->101728 101730->101726 101732 be422e 101731->101732 101733 be4293 101731->101733 101735 be3eb2 101732->101735 101736 be4266 ReadFile 101732->101736 101737 be42ae SetFilePointerEx 101733->101737 101735->101245 101736->101732 101736->101735 101737->101732 101739 be4312 CreateFileW 101738->101739 101740 c2067c 101738->101740 101741 be4334 101739->101741 101740->101741 101742 c20682 CreateFileW 101740->101742 101741->101702 101742->101741 101743 c206a8 101742->101743 101744 be410a 2 API calls 101743->101744 101745 c206b3 101744->101745 101745->101741 101746->101704 101748 be38a8 101747->101748 101749 be38b5 101747->101749 101750 be410a 2 API calls 101748->101750 101749->101701 101751 c337ba 101749->101751 101750->101749 101754 c336b9 101751->101754 101753 c337c6 WriteFile 101753->101701 101755 c336c0 101754->101755 101756 c336cb 101754->101756 101761 be42ae SetFilePointerEx 101755->101761 101756->101753 101758 c33725 SetFilePointerEx 101762 be42ae SetFilePointerEx 101758->101762 101760 c33744 101760->101753 101761->101758 101762->101760 101763->101718 101765 bf0f16 Mailbox 59 API calls 101764->101765 101766 be40e0 101765->101766 101767 be1c7e 59 API calls 101766->101767 101768 be40ed 101767->101768 101768->101264 101770 be404e 101769->101770 101771 be4085 101769->101771 101772 bf0f16 Mailbox 59 API calls 101770->101772 101778 be3f20 59 API calls Mailbox 101771->101778 101774 be4055 WideCharToMultiByte 101772->101774 101777 be3f79 59 API calls 2 library calls 101774->101777 101775 be4077 101775->101269 101777->101775 101778->101775 101780 bf0f16 Mailbox 59 API calls 101779->101780 101781 bd5285 101780->101781 101782 bd5294 101781->101782 101783 be1a36 59 API calls 101781->101783 101782->101288 101783->101782 101785 bf306b 101784->101785 101786 bf30e0 101784->101786 101793 bf3090 101785->101793 101816 bf8c88 58 API calls __getptd_noexit 101785->101816 101818 bf30f2 60 API calls 4 library calls 101786->101818 101789 bf30ed 101789->101293 101790 bf3077 101817 bf8f16 9 API calls __fptostr 101790->101817 101792 bf3082 101792->101293 101793->101293 101795 be59fe _memset 101794->101795 101819 be5800 101795->101819 101799 be5a9d Shell_NotifyIconW 101801 be5aab 101799->101801 101800 be5ab9 Shell_NotifyIconW 101800->101801 101823 be56f8 101801->101823 101802 be5a83 101802->101799 101802->101800 101804 be5ab2 101804->101293 101806 be5b25 101805->101806 101807 be5ad5 _memset 101805->101807 101806->101293 101808 be5af4 Shell_NotifyIconW 101807->101808 101808->101806 101810 bf0f16 Mailbox 59 API calls 101809->101810 101811 be1652 101810->101811 101812 bf0f16 Mailbox 59 API calls 101811->101812 101813 be1660 101812->101813 101813->101293 101814->101293 101815->101293 101816->101790 101817->101792 101818->101789 101820 be581c 101819->101820 101821 be5810 101819->101821 101820->101821 101822 be5821 DestroyIcon 101820->101822 101821->101802 101853 c3334a 62 API calls _W_store_winword 101821->101853 101822->101821 101824 be57fa Mailbox 101823->101824 101825 be5715 101823->101825 101824->101804 101826 be162d 59 API calls 101825->101826 101827 be5723 101826->101827 101828 c20bcc LoadStringW 101827->101828 101829 be5730 101827->101829 101832 c20be6 101828->101832 101830 be1821 59 API calls 101829->101830 101831 be5745 101830->101831 101833 be5752 101831->101833 101841 c20bf4 101831->101841 101834 be1c9c 59 API calls 101832->101834 101833->101832 101835 be5760 101833->101835 101839 be5778 _memset _wcscpy 101834->101839 101836 be1900 59 API calls 101835->101836 101837 be576a 101836->101837 101838 be17e0 59 API calls 101837->101838 101838->101839 101843 be57e0 Shell_NotifyIconW 101839->101843 101840 c20c37 Mailbox 101855 bf37fa 83 API calls 3 library calls 101840->101855 101841->101839 101841->101840 101842 be1207 59 API calls 101841->101842 101844 c20c1e 101842->101844 101843->101824 101854 c30035 60 API calls Mailbox 101844->101854 101847 c20c56 101849 be1900 59 API calls 101847->101849 101848 c20c29 101850 be17e0 59 API calls 101848->101850 101851 c20c67 101849->101851 101850->101840 101852 be1900 59 API calls 101851->101852 101852->101839 101853->101802 101854->101848 101855->101847 101857 be133d 59 API calls 101856->101857 101858 c33dbf GetFileAttributesW 101857->101858 101859 c33dd3 GetLastError 101858->101859 101862 c33dec Mailbox 101858->101862 101860 c33de0 CreateDirectoryW 101859->101860 101861 c33dee 101859->101861 101860->101861 101860->101862 101861->101862 101863 be1981 59 API calls 101861->101863 101862->101347 101864 c33e30 101863->101864 101865 c33d8a 59 API calls 101864->101865 101866 c33e39 101865->101866 101866->101862 101867 c33e3d CreateDirectoryW 101866->101867 101867->101862 101868->101310 101869->101343 101870->101343 101872 c4a6e0 101871->101872 101877 c4a738 101871->101877 101873 bf0f16 Mailbox 59 API calls 101872->101873 101876 c4a702 101873->101876 101874 bf0f16 Mailbox 59 API calls 101874->101876 101876->101874 101876->101877 101945 c26f3e 59 API calls Mailbox 101876->101945 101877->101354 101879 c37719 101878->101879 101881 c37750 101878->101881 101880 bf0f16 Mailbox 59 API calls 101879->101880 101879->101881 101880->101881 101882 c26c9f 101881->101882 101883 c26ce9 101882->101883 101887 c26cff Mailbox 101882->101887 101884 be1a36 59 API calls 101883->101884 101884->101887 101885 c26d2a 101888 c4c11d 441 API calls 101885->101888 101886 c26d3d 101946 bda820 101886->101946 101887->101885 101887->101886 101894 c26d36 101888->101894 101891 c26de5 101891->101381 101892 c26d74 101893 c26dbf 101892->101893 101892->101894 101896 c26da4 101892->101896 101893->101894 101969 c3a2fa 89 API calls 4 library calls 101893->101969 101970 c26ad4 59 API calls Mailbox 101894->101970 101963 c26e50 101896->101963 101898->101381 101899->101364 101900->101369 102070 be3740 101901->102070 101903 c12fe6 102171 c3a2fa 89 API calls 4 library calls 101903->102171 101906 bdb07f 101906->101903 101907 c13004 101906->101907 101927 bdbb86 101906->101927 101939 bdb132 Mailbox _memmove 101906->101939 102172 c3a2fa 89 API calls 4 library calls 101907->102172 101909 c1348e 101942 bdb4dd 101909->101942 102202 c3a2fa 89 API calls 4 library calls 101909->102202 101910 c270ed 59 API calls 101910->101939 101911 c130ba 101911->101942 102174 c3a2fa 89 API calls 4 library calls 101911->102174 101916 c13036 101916->101911 102173 bda9de 441 API calls 101916->102173 101919 bd53b0 441 API calls 101919->101939 101920 bd3b31 59 API calls 101920->101939 101923 c13348 101924 bd53b0 441 API calls 101923->101924 101925 c13378 101924->101925 101925->101942 102196 bd39be 101925->102196 102170 c3a2fa 89 API calls 4 library calls 101927->102170 101931 c130f3 102175 c3a2fa 89 API calls 4 library calls 101931->102175 101932 bd3c30 68 API calls 101932->101939 101933 c1339f 102200 c3a2fa 89 API calls 4 library calls 101933->102200 101937 bd523c 59 API calls 101937->101939 101938 be1c9c 59 API calls 101938->101939 101939->101909 101939->101910 101939->101916 101939->101919 101939->101920 101939->101923 101939->101927 101939->101931 101939->101932 101939->101933 101939->101937 101939->101938 101941 bf0f16 59 API calls Mailbox 101939->101941 101939->101942 102075 bd3add 101939->102075 102082 bdbc70 101939->102082 102168 bd3a40 59 API calls Mailbox 101939->102168 102169 bd5190 59 API calls Mailbox 101939->102169 102176 c26a45 59 API calls 2 library calls 101939->102176 102177 c4a78b 85 API calls Mailbox 101939->102177 102178 c26a01 59 API calls Mailbox 101939->102178 102179 c35d5f 68 API calls 101939->102179 102180 bd3ea3 101939->102180 102201 c39f97 59 API calls 101939->102201 101941->101939 101942->101381 101943->101382 101944->101386 101945->101876 101947 c12c81 101946->101947 101950 bda84c 101946->101950 101972 c3a2fa 89 API calls 4 library calls 101947->101972 101949 c12c92 101949->101892 101951 c12c9a 101950->101951 101956 bda888 _memmove 101950->101956 101973 c3a2fa 89 API calls 4 library calls 101951->101973 101953 bda975 101953->101892 101955 bf0f16 59 API calls Mailbox 101955->101956 101956->101953 101956->101955 101957 c12cde 101956->101957 101958 bd53b0 441 API calls 101956->101958 101960 c12cf8 101956->101960 101962 bda962 101956->101962 101974 bda9de 441 API calls 101957->101974 101958->101956 101960->101953 101975 c3a2fa 89 API calls 4 library calls 101960->101975 101962->101953 101971 c4a78b 85 API calls Mailbox 101962->101971 101964 c26e68 101963->101964 101966 c33fa7 3 API calls 101964->101966 101967 c4ef7a 91 API calls 101964->101967 101976 bdec83 101964->101976 101965 c26ebc 101965->101894 101966->101965 101967->101965 101969->101894 101970->101891 101971->101953 101972->101949 101973->101953 101974->101960 101975->101953 101977 bd4d37 84 API calls 101976->101977 101978 bdeca2 101977->101978 101979 bd4d37 84 API calls 101978->101979 101980 bdecb7 101979->101980 101981 bd4d37 84 API calls 101980->101981 101982 bdecca 101981->101982 101983 bd4d37 84 API calls 101982->101983 101984 bdece0 101983->101984 101985 be162d 59 API calls 101984->101985 101986 bdecf4 101985->101986 101987 bded19 101986->101987 101988 bd502b 59 API calls 101986->101988 101989 c15a97 101987->101989 102015 bded43 __wopenfile 101987->102015 101988->101987 101990 bd47be 59 API calls 101989->101990 101991 c15aaa 101990->101991 101993 bd4540 59 API calls 101991->101993 101992 bdef3e 101994 bd47be 59 API calls 101992->101994 101996 c15abc 101993->101996 101995 c15c7a 101994->101995 101998 c15c83 101995->101998 101999 c15cc7 101995->101999 102002 bd43d0 59 API calls 101996->102002 102028 c15ae1 101996->102028 101997 bd4d37 84 API calls 102000 bdedca 101997->102000 102001 bd4540 59 API calls 101998->102001 102003 bd4540 59 API calls 101999->102003 102004 bd4d37 84 API calls 102000->102004 102007 c15c8e 102001->102007 102002->102028 102008 c15cd1 102003->102008 102009 bdeddf 102004->102009 102005 bdef0c Mailbox 102005->101965 102006 c15b3f 102006->101992 102018 bd4540 59 API calls 102006->102018 102011 bd4d37 84 API calls 102007->102011 102012 bd43d0 59 API calls 102008->102012 102009->101992 102017 bd47be 59 API calls 102009->102017 102014 c15ca0 102011->102014 102016 c15ced 102012->102016 102013 bd477a 59 API calls 102013->102028 102066 be1364 59 API calls 2 library calls 102014->102066 102015->101992 102015->101997 102015->102006 102041 bdee30 __wopenfile 102015->102041 102025 bd4d37 84 API calls 102016->102025 102020 bdedfe 102017->102020 102023 c15ba6 102018->102023 102020->102006 102021 bdee09 102020->102021 102026 bd4540 59 API calls 102021->102026 102022 bd43d0 59 API calls 102022->102028 102029 bd43d0 59 API calls 102023->102029 102024 c15cb4 102030 bd477a 59 API calls 102024->102030 102031 c15d08 102025->102031 102032 bdee18 102026->102032 102028->102005 102028->102013 102028->102022 102064 be1364 59 API calls 2 library calls 102028->102064 102029->102041 102033 c15cc2 102030->102033 102067 be1364 59 API calls 2 library calls 102031->102067 102035 be19e1 59 API calls 102032->102035 102038 bd43d0 59 API calls 102033->102038 102035->102041 102036 bd477a 59 API calls 102036->102041 102037 c15d1c 102039 bd477a 59 API calls 102037->102039 102038->102005 102039->102033 102041->102005 102041->102036 102042 c15bf2 102041->102042 102054 be1364 59 API calls 2 library calls 102041->102054 102055 bd43d0 102041->102055 102043 c15c2b 102042->102043 102044 c15c1c 102042->102044 102051 bd477a 102043->102051 102065 be153b 59 API calls 2 library calls 102044->102065 102048 bd43d0 59 API calls 102049 c15c4c 102048->102049 102050 be19e1 59 API calls 102049->102050 102050->101992 102052 bf0f16 Mailbox 59 API calls 102051->102052 102053 bd4787 102052->102053 102053->102048 102054->102041 102056 c0d5f9 102055->102056 102058 bd43e7 102055->102058 102056->102058 102069 bd40cb 59 API calls Mailbox 102056->102069 102059 bd44e8 102058->102059 102060 bd4530 102058->102060 102063 bd44ef 102058->102063 102061 bf0f16 Mailbox 59 API calls 102059->102061 102068 bd523c 59 API calls 102060->102068 102061->102063 102063->102041 102064->102028 102065->101992 102066->102024 102067->102037 102068->102063 102069->102058 102071 be374f 102070->102071 102074 be376a 102070->102074 102072 be1aa4 59 API calls 102071->102072 102073 be3757 CharUpperBuffW 102072->102073 102073->102074 102074->101906 102076 bd3aee 102075->102076 102077 c0d2fd 102075->102077 102078 bf0f16 Mailbox 59 API calls 102076->102078 102079 bd3af5 102078->102079 102080 bd3b16 102079->102080 102203 bd3ba5 59 API calls Mailbox 102079->102203 102080->101939 102083 c134cf 102082->102083 102094 bdbc95 102082->102094 102329 c3a2fa 89 API calls 4 library calls 102083->102329 102085 bdbf3b 102085->101939 102087 bdc2b6 102087->102085 102090 bdc2c3 102087->102090 102327 bdc483 441 API calls Mailbox 102090->102327 102093 bdc2ca LockWindowUpdate DestroyWindow GetMessageW 102093->102085 102095 bdc2fc 102093->102095 102158 bdbca5 Mailbox 102094->102158 102330 bd5376 60 API calls 102094->102330 102331 c26def 441 API calls 102094->102331 102096 c14439 TranslateMessage DispatchMessageW GetMessageW 102095->102096 102096->102096 102098 c14469 102096->102098 102097 c135e3 Sleep 102097->102158 102098->102085 102099 bd5376 60 API calls 102099->102158 102101 c13f8d WaitForSingleObject 102107 c13fad GetExitCodeProcess CloseHandle 102101->102107 102101->102158 102102 bdbf54 timeGetTime 102102->102158 102103 bf0f16 59 API calls Mailbox 102103->102158 102104 be1c9c 59 API calls 102104->102158 102105 be1207 59 API calls 102138 c137ce Mailbox 102105->102138 102106 bdc210 Sleep 102106->102158 102112 bdc36b 102107->102112 102109 c142d9 Sleep 102109->102138 102112->101939 102113 bdc324 timeGetTime 102328 bd5376 60 API calls 102113->102328 102115 c33fb5 66 API calls 102115->102138 102117 bd4d37 84 API calls 102117->102158 102118 c14370 GetExitCodeProcess 102123 c14386 WaitForSingleObject 102118->102123 102124 c1439c CloseHandle 102118->102124 102120 c5632a 110 API calls 102120->102138 102121 bd6d79 109 API calls 102121->102158 102123->102124 102123->102158 102124->102138 102125 bd6cd8 419 API calls 102125->102158 102126 c13feb 102126->102112 102127 c143f8 Sleep 102127->102158 102128 c137da Sleep 102128->102158 102130 be1a36 59 API calls 102130->102138 102134 bd3ea3 68 API calls 102134->102138 102135 bd53b0 419 API calls 102135->102158 102137 bdc26d 102140 be1a36 59 API calls 102137->102140 102138->102105 102138->102115 102138->102118 102138->102120 102138->102126 102138->102127 102138->102128 102138->102130 102138->102134 102138->102158 102338 c32a1b 60 API calls 102138->102338 102339 bd5376 60 API calls 102138->102339 102340 bd6cd8 441 API calls 102138->102340 102341 c26ec5 59 API calls 102138->102341 102342 c3566c QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 102138->102342 102343 bf074e timeGetTime 102138->102343 102139 bdb020 419 API calls 102139->102158 102144 bdbf25 Mailbox 102140->102144 102141 be1a36 59 API calls 102141->102158 102143 c4c11d 419 API calls 102143->102158 102144->102085 102326 bdc460 10 API calls Mailbox 102144->102326 102145 c3a2fa 89 API calls 102145->102158 102147 bda820 419 API calls 102147->102158 102148 bd5190 59 API calls Mailbox 102148->102158 102149 bd3ea3 68 API calls 102149->102158 102150 c26ad4 59 API calls Mailbox 102150->102158 102152 bd39be 68 API calls 102152->102158 102153 c13d43 VariantClear 102153->102158 102154 c13dd9 VariantClear 102154->102158 102155 bd41c4 59 API calls Mailbox 102155->102158 102156 c27890 59 API calls 102156->102158 102157 c13b87 VariantClear 102157->102158 102158->102097 102158->102099 102158->102101 102158->102102 102158->102103 102158->102104 102158->102106 102158->102109 102158->102112 102158->102113 102158->102117 102158->102121 102158->102125 102158->102135 102158->102137 102158->102138 102158->102139 102158->102141 102158->102143 102158->102144 102158->102145 102158->102147 102158->102148 102158->102149 102158->102150 102158->102152 102158->102153 102158->102154 102158->102155 102158->102156 102158->102157 102159 c4e3d4 130 API calls 102158->102159 102164 be42cf CloseHandle 102158->102164 102165 c33f97 3 API calls 102158->102165 102204 bd52b0 102158->102204 102213 bd9a00 102158->102213 102220 bd9c80 102158->102220 102251 c3e30d 102158->102251 102254 c3c0dd 102158->102254 102261 c4f704 102158->102261 102264 c3bb43 102158->102264 102294 c4ede4 102158->102294 102316 bde36d 102158->102316 102325 bf074e timeGetTime 102158->102325 102332 c5641d 59 API calls 102158->102332 102333 c39ec5 59 API calls Mailbox 102158->102333 102334 c2de8d 59 API calls 102158->102334 102335 c26a45 59 API calls 2 library calls 102158->102335 102336 bd38ff 59 API calls 102158->102336 102337 bd3a40 59 API calls Mailbox 102158->102337 102159->102158 102164->102158 102165->102158 102168->101939 102169->101939 102170->101903 102171->101942 102172->101942 102173->101911 102174->101942 102175->101942 102176->101939 102177->101939 102178->101939 102179->101939 102712 bd3c30 102180->102712 102182 bd3eb3 102183 bd3f2d 102182->102183 102184 bd3ebd 102182->102184 102720 bd523c 59 API calls 102183->102720 102185 bf0f16 Mailbox 59 API calls 102184->102185 102187 bd3ece 102185->102187 102188 bd3edc 102187->102188 102189 be1207 59 API calls 102187->102189 102190 bd3eeb 102188->102190 102191 be1bcc 59 API calls 102188->102191 102189->102188 102192 bf0f16 Mailbox 59 API calls 102190->102192 102191->102190 102193 bd3ef5 102192->102193 102719 bd3bc8 68 API calls 102193->102719 102195 bd3f1d 102195->101939 102197 bd39c9 102196->102197 102198 bd3ea3 68 API calls 102197->102198 102199 bd39f0 102197->102199 102198->102199 102199->101933 102200->101942 102201->101939 102202->101942 102203->102080 102205 bd52c6 102204->102205 102207 bd5313 102204->102207 102206 bd52d3 PeekMessageW 102205->102206 102205->102207 102206->102207 102208 bd52ec 102206->102208 102207->102208 102210 c0de98 TranslateAcceleratorW 102207->102210 102211 bd533e PeekMessageW 102207->102211 102212 bd5352 TranslateMessage DispatchMessageW 102207->102212 102344 bd359e 102207->102344 102208->102158 102210->102207 102210->102211 102211->102207 102211->102208 102212->102211 102214 bd9a1d 102213->102214 102215 bd9a31 102213->102215 102349 bd94e0 102214->102349 102383 c3a2fa 89 API calls 4 library calls 102215->102383 102218 bd9a28 102218->102158 102219 c123a8 102219->102219 102221 bd9cb5 102220->102221 102222 c123ad 102221->102222 102225 bd9d1f 102221->102225 102229 bd9d79 102221->102229 102223 bd53b0 441 API calls 102222->102223 102224 c123c2 102223->102224 102246 bd9f50 Mailbox 102224->102246 102396 c3a2fa 89 API calls 4 library calls 102224->102396 102228 be1207 59 API calls 102225->102228 102225->102229 102226 be1207 59 API calls 102226->102229 102230 c12408 102228->102230 102229->102226 102231 bf2ea0 __cinit 67 API calls 102229->102231 102233 c1242a 102229->102233 102237 bd9f3a 102229->102237 102229->102246 102232 bf2ea0 __cinit 67 API calls 102230->102232 102231->102229 102232->102229 102233->102158 102234 bd39be 68 API calls 102234->102246 102235 bd53b0 441 API calls 102235->102246 102237->102246 102397 c3a2fa 89 API calls 4 library calls 102237->102397 102240 bda775 102401 c3a2fa 89 API calls 4 library calls 102240->102401 102242 c12729 102242->102158 102243 bd4230 59 API calls 102243->102246 102246->102234 102246->102235 102246->102240 102246->102243 102249 c3a2fa 89 API calls 102246->102249 102250 bda058 102246->102250 102392 be1bcc 102246->102392 102398 c27890 59 API calls 102246->102398 102399 c4ca74 441 API calls 102246->102399 102400 c4b9ee 441 API calls Mailbox 102246->102400 102402 bd5190 59 API calls Mailbox 102246->102402 102403 c49878 441 API calls Mailbox 102246->102403 102249->102246 102250->102158 102404 c3f6ea 102251->102404 102253 c3e31d 102253->102158 102255 bd4d37 84 API calls 102254->102255 102256 c3c0f3 102255->102256 102474 c33e72 102256->102474 102258 c3c0fb 102259 c3c114 102258->102259 102260 c3c0ff GetLastError 102258->102260 102259->102158 102260->102259 102501 c4fb45 102261->102501 102265 c3bb62 102264->102265 102291 c3bc28 Mailbox 102264->102291 102266 bd502b 59 API calls 102265->102266 102267 c3bb6d 102266->102267 102271 bd502b 59 API calls 102267->102271 102268 bd4d37 84 API calls 102269 c3bc60 102268->102269 102270 bd4d37 84 API calls 102269->102270 102272 c3bc72 102270->102272 102273 c3bb81 102271->102273 102596 c33b4f 102272->102596 102275 be1207 59 API calls 102273->102275 102273->102291 102276 c3bb92 102275->102276 102277 be1207 59 API calls 102276->102277 102278 c3bb9b 102277->102278 102279 bd4d37 84 API calls 102278->102279 102280 c3bba8 102279->102280 102281 bf0044 59 API calls 102280->102281 102282 c3bbbb 102281->102282 102283 be17e0 59 API calls 102282->102283 102284 c3bbcc 102283->102284 102285 c33f97 3 API calls 102284->102285 102293 c3bbf5 Mailbox 102284->102293 102287 c3bbdb 102285->102287 102286 bd502b 59 API calls 102286->102291 102288 be1a36 59 API calls 102287->102288 102287->102293 102289 c3bbec 102288->102289 102290 c33d8a 63 API calls 102289->102290 102290->102293 102291->102268 102292 c3bc30 Mailbox 102291->102292 102292->102158 102293->102286 102295 bd4d37 84 API calls 102294->102295 102296 c4ee07 102295->102296 102297 c33fb5 66 API calls 102296->102297 102298 c4ee18 102297->102298 102299 c4ee4e OpenProcess 102298->102299 102306 c4ee1d 102298->102306 102300 c4ef11 TerminateProcess 102299->102300 102301 c4ee68 GetLastError 102299->102301 102303 c4ef53 CloseHandle 102300->102303 102304 c4ef1e GetLastError 102300->102304 102302 c4ee73 102301->102302 102311 c4eedd 102301->102311 102709 c3390d 63 API calls Mailbox 102302->102709 102303->102306 102312 c4ef32 102304->102312 102306->102158 102307 c4ee81 102710 c2917c 62 API calls Mailbox 102307->102710 102309 c4ee8b 102310 c4ee8f OpenProcess 102309->102310 102315 c4eea1 102309->102315 102310->102315 102311->102300 102311->102306 102312->102303 102314 c4eedb 102314->102311 102711 c28bcc AdjustTokenPrivileges CloseHandle 102315->102711 102317 bd502b 59 API calls 102316->102317 102318 bde381 102317->102318 102319 bde3bc Sleep 102318->102319 102320 bde385 timeGetTime 102318->102320 102322 bde3b4 102319->102322 102321 bd502b 59 API calls 102320->102321 102323 bde39b 102321->102323 102322->102158 102324 bdbc70 439 API calls 102323->102324 102324->102322 102325->102158 102326->102087 102327->102093 102328->102158 102329->102094 102330->102094 102331->102094 102332->102158 102333->102158 102334->102158 102335->102158 102336->102158 102337->102158 102338->102138 102339->102138 102340->102138 102341->102138 102342->102138 102343->102138 102345 bd35e2 102344->102345 102347 bd35b0 102344->102347 102345->102207 102346 bd35d5 IsDialogMessageW 102346->102345 102346->102347 102347->102345 102347->102346 102348 c0d1a3 GetClassLongW 102347->102348 102348->102346 102348->102347 102350 bd53b0 441 API calls 102349->102350 102351 bd951f 102350->102351 102352 c11f31 102351->102352 102360 bd9527 _memmove 102351->102360 102385 bd5190 59 API calls Mailbox 102352->102385 102354 c121f0 102391 c3a2fa 89 API calls 4 library calls 102354->102391 102356 c1220e 102356->102356 102357 bd9583 102357->102218 102358 bd9944 102361 bf0f16 Mailbox 59 API calls 102358->102361 102359 bd986a 102363 c121e1 102359->102363 102364 bd987f 102359->102364 102360->102354 102360->102357 102360->102358 102362 bf0f16 59 API calls Mailbox 102360->102362 102369 bd96cf 102360->102369 102378 bd9741 102360->102378 102367 bd96e3 _memmove 102361->102367 102362->102360 102390 c4a74b 59 API calls 102363->102390 102366 bf0f16 Mailbox 59 API calls 102364->102366 102371 bd977d 102366->102371 102368 bf0f16 Mailbox 59 API calls 102367->102368 102374 bd970e 102367->102374 102367->102378 102368->102374 102369->102358 102370 bd96dc 102369->102370 102373 bf0f16 Mailbox 59 API calls 102370->102373 102371->102218 102372 c121d0 102389 c3a2fa 89 API calls 4 library calls 102372->102389 102373->102367 102374->102378 102384 bdcca0 441 API calls 102374->102384 102378->102359 102378->102371 102378->102372 102379 c121a8 102378->102379 102381 c12183 102378->102381 102386 bd8180 441 API calls 102378->102386 102388 c3a2fa 89 API calls 4 library calls 102379->102388 102387 c3a2fa 89 API calls 4 library calls 102381->102387 102383->102219 102384->102378 102385->102358 102386->102378 102387->102371 102388->102371 102389->102371 102390->102354 102391->102356 102393 be1bef _memmove 102392->102393 102394 be1bdc 102392->102394 102393->102246 102394->102393 102395 bf0f16 Mailbox 59 API calls 102394->102395 102395->102393 102396->102246 102397->102246 102398->102246 102399->102246 102400->102246 102401->102242 102402->102246 102403->102246 102405 c3f705 102404->102405 102406 c3f75f 102404->102406 102407 bf0f16 Mailbox 59 API calls 102405->102407 102466 c3fa24 59 API calls 102406->102466 102409 c3f70c 102407->102409 102410 c3f718 102409->102410 102464 be3df7 60 API calls Mailbox 102409->102464 102412 bd4d37 84 API calls 102410->102412 102417 c3f72a 102412->102417 102413 c3f838 102460 c38b3d 102413->102460 102414 c3f76c 102414->102413 102415 c3f746 102414->102415 102421 c3f7ac 102414->102421 102415->102253 102419 be3e47 67 API calls 102417->102419 102418 c3f83f 102424 c337ba 3 API calls 102418->102424 102420 c3f736 102419->102420 102420->102414 102422 c3f73a 102420->102422 102423 bd4d37 84 API calls 102421->102423 102422->102415 102465 be3f0b CloseHandle 102422->102465 102430 c3f7b3 102423->102430 102440 c3f81b Mailbox 102424->102440 102426 c3f82e 102441 c33809 102426->102441 102427 c3f7e7 102429 be162d 59 API calls 102427->102429 102432 c3f7f7 102429->102432 102430->102426 102430->102427 102431 be42cf CloseHandle 102433 c3f88d 102431->102433 102434 be1c9c 59 API calls 102432->102434 102433->102415 102467 be3f0b CloseHandle 102433->102467 102435 c3f801 102434->102435 102436 be1900 59 API calls 102435->102436 102438 c3f80f 102436->102438 102439 c33809 66 API calls 102438->102439 102439->102440 102440->102415 102440->102431 102442 c33882 102441->102442 102443 c3381c 102441->102443 102445 c337ba 3 API calls 102442->102445 102443->102442 102444 c33821 102443->102444 102446 c33876 102444->102446 102447 c3382b 102444->102447 102459 c3386a Mailbox 102445->102459 102472 c338a2 62 API calls Mailbox 102446->102472 102449 c3384b 102447->102449 102450 c33835 102447->102450 102451 be40cd 59 API calls 102449->102451 102452 be40cd 59 API calls 102450->102452 102453 c33853 102451->102453 102455 c3383d 102452->102455 102471 c3374d 61 API calls Mailbox 102453->102471 102457 be402a 61 API calls 102455->102457 102456 c33849 102468 c337eb 102456->102468 102457->102456 102459->102440 102461 c38b46 102460->102461 102462 c38b4b 102460->102462 102473 c37bdb 61 API calls 2 library calls 102461->102473 102462->102418 102464->102410 102465->102415 102466->102414 102467->102415 102469 c337ba 3 API calls 102468->102469 102470 c337fd 102469->102470 102470->102459 102471->102456 102472->102459 102473->102462 102475 be1207 59 API calls 102474->102475 102476 c33e91 102475->102476 102477 be1207 59 API calls 102476->102477 102478 c33e9a 102477->102478 102479 be1207 59 API calls 102478->102479 102480 c33ea3 102479->102480 102481 bf01af 60 API calls 102480->102481 102482 c33eae 102481->102482 102499 c34e59 GetFileAttributesW 102482->102499 102485 c33ec9 102487 bf0044 59 API calls 102485->102487 102486 be1900 59 API calls 102486->102485 102488 c33edd FindFirstFileW 102487->102488 102489 c33f69 FindClose 102488->102489 102490 c33efc 102488->102490 102495 c33f74 Mailbox 102489->102495 102490->102489 102493 c33f00 102490->102493 102491 c33f44 FindNextFileW 102491->102490 102491->102493 102492 be1c9c 59 API calls 102492->102493 102493->102490 102493->102491 102493->102492 102494 be17e0 59 API calls 102493->102494 102496 be1900 59 API calls 102493->102496 102494->102493 102495->102258 102497 c33f35 DeleteFileW 102496->102497 102497->102491 102498 c33f60 FindClose 102497->102498 102498->102495 102500 c33eb7 102499->102500 102500->102485 102500->102486 102502 c4fb6b _memset 102501->102502 102503 c4fbd2 102502->102503 102504 c4fba8 102502->102504 102506 bd502b 59 API calls 102503->102506 102510 c4fbf6 102503->102510 102505 bd502b 59 API calls 102504->102505 102507 c4fbb3 102505->102507 102509 c4fbc8 102506->102509 102507->102510 102511 bd502b 59 API calls 102507->102511 102508 c4fc30 102513 bd4d37 84 API calls 102508->102513 102515 bd502b 59 API calls 102509->102515 102510->102508 102512 bd502b 59 API calls 102510->102512 102511->102509 102512->102508 102514 c4fc54 102513->102514 102584 be436a 102514->102584 102515->102510 102517 c4fc5e 102518 c4fd21 102517->102518 102519 c4fc68 102517->102519 102520 c4fd53 GetCurrentDirectoryW 102518->102520 102522 bd4d37 84 API calls 102518->102522 102521 bd4d37 84 API calls 102519->102521 102523 bf0f16 Mailbox 59 API calls 102520->102523 102524 c4fc79 102521->102524 102525 c4fd38 102522->102525 102526 c4fd78 GetCurrentDirectoryW 102523->102526 102527 be436a 59 API calls 102524->102527 102528 be436a 59 API calls 102525->102528 102529 c4fd85 102526->102529 102530 c4fc83 102527->102530 102531 c4fd42 __wsetenvp 102528->102531 102533 c4fdbe 102529->102533 102535 bd4f98 59 API calls 102529->102535 102532 bd4d37 84 API calls 102530->102532 102531->102520 102531->102533 102534 c4fc94 102532->102534 102541 c4fe0a 102533->102541 102588 c374bf 8 API calls 102533->102588 102536 be436a 59 API calls 102534->102536 102537 c4fd9e 102535->102537 102538 c4fc9e 102536->102538 102539 bd4f98 59 API calls 102537->102539 102540 bd4d37 84 API calls 102538->102540 102542 c4fdae 102539->102542 102543 c4fcaf 102540->102543 102545 c4fe36 102541->102545 102546 c4fedc CreateProcessW 102541->102546 102547 bd4f98 59 API calls 102542->102547 102548 be436a 59 API calls 102543->102548 102591 c28cd6 76 API calls 102545->102591 102583 c4fe6f __wsetenvp 102546->102583 102547->102533 102551 c4fcb9 102548->102551 102549 c4fdd5 102589 c373ce 8 API calls 102549->102589 102554 c4fcef GetSystemDirectoryW 102551->102554 102559 bd4d37 84 API calls 102551->102559 102553 c4fe3b 102557 c4fe63 102553->102557 102558 c4fe6a 102553->102558 102556 bf0f16 Mailbox 59 API calls 102554->102556 102555 c4fdf0 102590 c37447 8 API calls 102555->102590 102561 c4fd14 GetSystemDirectoryW 102556->102561 102592 c28d11 149 API calls 4 library calls 102557->102592 102593 c28fb2 6 API calls 102558->102593 102563 c4fcd0 102559->102563 102561->102529 102566 be436a 59 API calls 102563->102566 102565 c4fe68 102565->102583 102569 c4fcda __wsetenvp 102566->102569 102567 c4ff58 CloseHandle 102570 c4ff66 102567->102570 102576 c4ff90 102567->102576 102568 c4ff1b 102572 c4ff2c GetLastError 102568->102572 102569->102529 102569->102554 102594 c37072 CloseHandle Mailbox 102570->102594 102571 c4ff96 102574 c4ff40 102571->102574 102572->102574 102595 c36e9c CloseHandle Mailbox 102574->102595 102576->102571 102580 c4ffc2 CloseHandle 102576->102580 102580->102574 102581 c4f716 102581->102158 102583->102567 102583->102568 102585 be4374 __wsetenvp 102584->102585 102586 bf0f16 Mailbox 59 API calls 102585->102586 102587 be4389 _wcscpy 102586->102587 102587->102517 102588->102549 102589->102555 102590->102541 102591->102553 102592->102565 102593->102583 102595->102581 102597 be1207 59 API calls 102596->102597 102598 c33b6c 102597->102598 102599 be1207 59 API calls 102598->102599 102600 c33b74 102599->102600 102601 be1207 59 API calls 102600->102601 102602 c33b7c 102601->102602 102603 be1207 59 API calls 102602->102603 102604 c33b84 102603->102604 102605 bf01af 60 API calls 102604->102605 102606 c33b8e 102605->102606 102607 bf01af 60 API calls 102606->102607 102608 c33b98 102607->102608 102642 c34def 102608->102642 102610 c33ba3 102611 c34e59 GetFileAttributesW 102610->102611 102612 c33bae 102611->102612 102613 c33bc0 102612->102613 102614 be1900 59 API calls 102612->102614 102615 c34e59 GetFileAttributesW 102613->102615 102614->102613 102616 c33bc8 102615->102616 102617 c33bd5 102616->102617 102618 be1900 59 API calls 102616->102618 102619 be1207 59 API calls 102617->102619 102618->102617 102620 c33bdd 102619->102620 102621 be1207 59 API calls 102620->102621 102622 c33be5 102621->102622 102623 bf0044 59 API calls 102622->102623 102624 c33bf6 FindFirstFileW 102623->102624 102625 c33d21 FindClose 102624->102625 102634 c33c19 Mailbox 102624->102634 102631 c33d2b Mailbox 102625->102631 102626 c33cf5 FindNextFileW 102626->102634 102627 be1a36 59 API calls 102627->102634 102629 be1c9c 59 API calls 102629->102634 102630 be17e0 59 API calls 102630->102634 102631->102292 102632 be1900 59 API calls 102632->102634 102633 c33f97 3 API calls 102633->102634 102634->102625 102634->102626 102634->102627 102634->102629 102634->102630 102634->102632 102634->102633 102635 c33c97 102634->102635 102636 c33d18 FindClose 102634->102636 102637 c33d64 CopyFileExW 102634->102637 102641 c33cd8 DeleteFileW 102634->102641 102653 c343ce 102634->102653 102638 be151f 61 API calls 102635->102638 102639 c33cbb MoveFileW 102635->102639 102640 c33cab DeleteFileW 102635->102640 102636->102631 102637->102634 102638->102635 102639->102634 102640->102634 102641->102634 102643 be1207 59 API calls 102642->102643 102644 c34e04 102643->102644 102645 be1207 59 API calls 102644->102645 102646 c34e0c 102645->102646 102647 bf0044 59 API calls 102646->102647 102648 c34e1b 102647->102648 102649 bf0044 59 API calls 102648->102649 102650 c34e2b 102649->102650 102651 be151f 61 API calls 102650->102651 102652 c34e3b Mailbox 102651->102652 102652->102610 102654 c343ea 102653->102654 102655 c343ef 102654->102655 102656 c343fd 102654->102656 102658 be1c9c 59 API calls 102655->102658 102657 be1207 59 API calls 102656->102657 102659 c34405 102657->102659 102706 c343f8 Mailbox 102658->102706 102660 be1207 59 API calls 102659->102660 102661 c3440d 102660->102661 102662 be1207 59 API calls 102661->102662 102663 c34418 102662->102663 102664 be1207 59 API calls 102663->102664 102665 c34420 102664->102665 102666 be1207 59 API calls 102665->102666 102667 c34428 102666->102667 102668 be1207 59 API calls 102667->102668 102669 c34430 102668->102669 102670 be1207 59 API calls 102669->102670 102671 c34438 102670->102671 102672 be1207 59 API calls 102671->102672 102673 c34440 102672->102673 102674 bf0044 59 API calls 102673->102674 102675 c34457 102674->102675 102676 bf0044 59 API calls 102675->102676 102677 c34470 102676->102677 102678 be1609 59 API calls 102677->102678 102679 c3447c 102678->102679 102680 c3448f 102679->102680 102681 be1981 59 API calls 102679->102681 102682 be1609 59 API calls 102680->102682 102681->102680 102683 c34498 102682->102683 102684 c344a8 102683->102684 102685 be1981 59 API calls 102683->102685 102686 be1c9c 59 API calls 102684->102686 102685->102684 102687 c344b4 102686->102687 102688 be17e0 59 API calls 102687->102688 102689 c344c0 102688->102689 102707 c34580 59 API calls 102689->102707 102691 c344cf 102708 c34580 59 API calls 102691->102708 102693 c344e2 102694 be1609 59 API calls 102693->102694 102695 c344ec 102694->102695 102696 c34503 102695->102696 102697 c344f1 102695->102697 102699 be1609 59 API calls 102696->102699 102698 be1900 59 API calls 102697->102698 102700 c344fe 102698->102700 102701 c3450c 102699->102701 102702 c3452a 102701->102702 102705 be1900 59 API calls 102701->102705 102705->102700 102706->102634 102707->102691 102708->102693 102709->102307 102710->102309 102711->102314 102713 bd3e11 102712->102713 102714 bd3c43 102712->102714 102713->102182 102715 be1207 59 API calls 102714->102715 102718 bd3c54 102714->102718 102716 bd3e73 102715->102716 102717 bf2ea0 __cinit 67 API calls 102716->102717 102717->102718 102718->102182 102719->102195 102720->102195 102721 c10128 102722 c1012a 102721->102722 102725 c34b85 SHGetFolderPathW 102722->102725 102726 be1821 59 API calls 102725->102726 102727 c10133 102726->102727 102728 bd1016 102733 be5ce7 102728->102733 102731 bf2ea0 __cinit 67 API calls 102732 bd1025 102731->102732 102734 bf0f16 Mailbox 59 API calls 102733->102734 102735 be5cef 102734->102735 102736 bd101b 102735->102736 102740 be5f39 102735->102740 102736->102731 102741 be5cfb 102740->102741 102742 be5f42 102740->102742 102744 be5d13 102741->102744 102743 bf2ea0 __cinit 67 API calls 102742->102743 102743->102741 102745 be1207 59 API calls 102744->102745 102746 be5d2b GetVersionExW 102745->102746 102747 be1821 59 API calls 102746->102747 102748 be5d6e 102747->102748 102749 be1981 59 API calls 102748->102749 102752 be5d9b 102748->102752 102750 be5d8f 102749->102750 102751 be133d 59 API calls 102750->102751 102751->102752 102753 be5e00 GetCurrentProcess IsWow64Process 102752->102753 102755 c21018 102752->102755 102754 be5e19 102753->102754 102756 be5e2f 102754->102756 102757 be5e98 GetSystemInfo 102754->102757 102768 be55f0 102756->102768 102758 be5e65 102757->102758 102758->102736 102761 be5e8c GetSystemInfo 102763 be5e56 102761->102763 102762 be5e41 102764 be55f0 2 API calls 102762->102764 102763->102758 102765 be5e5c FreeLibrary 102763->102765 102766 be5e49 GetNativeSystemInfo 102764->102766 102765->102758 102766->102763 102769 be5619 102768->102769 102770 be55f9 LoadLibraryA 102768->102770 102769->102761 102769->102762 102770->102769 102771 be560a GetProcAddress 102770->102771 102771->102769 104068 bd1066 104073 bdaaaa 104068->104073 104070 bd106c 104071 bf2ea0 __cinit 67 API calls 104070->104071 104072 bd1076 104071->104072 104074 bdaacb 104073->104074 104106 bf0216 104074->104106 104078 bdab12 104079 be1207 59 API calls 104078->104079 104080 bdab1c 104079->104080 104081 be1207 59 API calls 104080->104081 104082 bdab26 104081->104082 104083 be1207 59 API calls 104082->104083 104084 bdab30 104083->104084 104085 be1207 59 API calls 104084->104085 104086 bdab6e 104085->104086 104087 be1207 59 API calls 104086->104087 104088 bdac39 104087->104088 104116 bf04b3 104088->104116 104092 bdac6b 104093 be1207 59 API calls 104092->104093 104094 bdac75 104093->104094 104144 befd56 104094->104144 104096 bdacbc 104097 bdaccc GetStdHandle 104096->104097 104098 bdad18 104097->104098 104099 c12e69 104097->104099 104100 bdad20 OleInitialize 104098->104100 104099->104098 104101 c12e72 104099->104101 104100->104070 104151 c36f60 64 API calls Mailbox 104101->104151 104103 c12e79 104152 c3762f CreateThread 104103->104152 104105 c12e85 CloseHandle 104105->104100 104153 bf02ef 104106->104153 104109 bf02ef 59 API calls 104110 bf0258 104109->104110 104111 be1207 59 API calls 104110->104111 104112 bf0264 104111->104112 104113 be1821 59 API calls 104112->104113 104114 bdaad1 104113->104114 104115 bf06e6 6 API calls 104114->104115 104115->104078 104117 be1207 59 API calls 104116->104117 104118 bf04c3 104117->104118 104119 be1207 59 API calls 104118->104119 104120 bf04cb 104119->104120 104160 be10c3 104120->104160 104123 be10c3 59 API calls 104124 bf04db 104123->104124 104125 be1207 59 API calls 104124->104125 104126 bf04e6 104125->104126 104127 bf0f16 Mailbox 59 API calls 104126->104127 104128 bdac43 104127->104128 104129 befe77 104128->104129 104130 befe85 104129->104130 104131 be1207 59 API calls 104130->104131 104132 befe90 104131->104132 104133 be1207 59 API calls 104132->104133 104134 befe9b 104133->104134 104135 be1207 59 API calls 104134->104135 104136 befea6 104135->104136 104137 be1207 59 API calls 104136->104137 104138 befeb1 104137->104138 104139 be10c3 59 API calls 104138->104139 104140 befebc 104139->104140 104141 bf0f16 Mailbox 59 API calls 104140->104141 104142 befec3 RegisterWindowMessageW 104141->104142 104142->104092 104145 c25ff1 104144->104145 104146 befd66 104144->104146 104163 c39f97 59 API calls 104145->104163 104148 bf0f16 Mailbox 59 API calls 104146->104148 104150 befd6e 104148->104150 104149 c25ffc 104150->104096 104151->104103 104152->104105 104164 c37615 65 API calls 104152->104164 104154 be1207 59 API calls 104153->104154 104155 bf02fa 104154->104155 104156 be1207 59 API calls 104155->104156 104157 bf0302 104156->104157 104158 be1207 59 API calls 104157->104158 104159 bf024e 104158->104159 104159->104109 104161 be1207 59 API calls 104160->104161 104162 be10cb 104161->104162 104162->104123 104163->104149 102772 bf7db3 102773 bf7dbf __tzset_nolock 102772->102773 102809 bf9f68 GetStartupInfoW 102773->102809 102776 bf7dc4 102811 bf8cdc GetProcessHeap 102776->102811 102777 bf7e1c 102778 bf7e27 102777->102778 102894 bf7f03 58 API calls 3 library calls 102777->102894 102812 bf9c46 102778->102812 102781 bf7e2d 102782 bf7e38 __RTC_Initialize 102781->102782 102895 bf7f03 58 API calls 3 library calls 102781->102895 102833 bfd732 102782->102833 102785 bf7e47 102786 bf7e53 GetCommandLineW 102785->102786 102896 bf7f03 58 API calls 3 library calls 102785->102896 102852 c05083 GetEnvironmentStringsW 102786->102852 102789 bf7e52 102789->102786 102792 bf7e6d 102793 bf7e78 102792->102793 102897 bf3217 58 API calls 3 library calls 102792->102897 102862 c04eb8 102793->102862 102796 bf7e7e 102797 bf7e89 102796->102797 102898 bf3217 58 API calls 3 library calls 102796->102898 102876 bf3251 102797->102876 102800 bf7e91 102801 bf7e9c __wwincmdln 102800->102801 102899 bf3217 58 API calls 3 library calls 102800->102899 102882 be5f8b 102801->102882 102804 bf7eb0 102805 bf7ebf 102804->102805 102900 bf34ba 58 API calls _doexit 102804->102900 102901 bf3242 58 API calls _doexit 102805->102901 102808 bf7ec4 __tzset_nolock 102810 bf9f7e 102809->102810 102810->102776 102811->102777 102902 bf32e9 36 API calls 2 library calls 102812->102902 102814 bf9c4b 102903 bf9e9c InitializeCriticalSectionAndSpinCount __ioinit 102814->102903 102816 bf9c50 102817 bf9c54 102816->102817 102905 bf9eea TlsAlloc 102816->102905 102904 bf9cbc 61 API calls 2 library calls 102817->102904 102820 bf9c59 102820->102781 102821 bf9c66 102821->102817 102822 bf9c71 102821->102822 102906 bf8935 102822->102906 102825 bf9cb3 102914 bf9cbc 61 API calls 2 library calls 102825->102914 102828 bf9c92 102828->102825 102830 bf9c98 102828->102830 102829 bf9cb8 102829->102781 102913 bf9b93 58 API calls 4 library calls 102830->102913 102832 bf9ca0 GetCurrentThreadId 102832->102781 102834 bfd73e __tzset_nolock 102833->102834 102835 bf9d6b __lock 58 API calls 102834->102835 102836 bfd745 102835->102836 102837 bf8935 __calloc_crt 58 API calls 102836->102837 102838 bfd756 102837->102838 102839 bfd7c1 GetStartupInfoW 102838->102839 102840 bfd761 __tzset_nolock @_EH4_CallFilterFunc@8 102838->102840 102846 bfd7d6 102839->102846 102849 bfd905 102839->102849 102840->102785 102841 bfd9cd 102928 bfd9dd LeaveCriticalSection _doexit 102841->102928 102843 bf8935 __calloc_crt 58 API calls 102843->102846 102844 bfd952 GetStdHandle 102844->102849 102845 bfd965 GetFileType 102845->102849 102846->102843 102848 bfd824 102846->102848 102846->102849 102847 bfd858 GetFileType 102847->102848 102848->102847 102848->102849 102926 bf9f8b InitializeCriticalSectionAndSpinCount 102848->102926 102849->102841 102849->102844 102849->102845 102927 bf9f8b InitializeCriticalSectionAndSpinCount 102849->102927 102853 c05094 102852->102853 102854 bf7e63 102852->102854 102929 bf897d 58 API calls 2 library calls 102853->102929 102858 c04c7b GetModuleFileNameW 102854->102858 102856 c050ba _memmove 102857 c050d0 FreeEnvironmentStringsW 102856->102857 102857->102854 102859 c04caf _wparse_cmdline 102858->102859 102861 c04cef _wparse_cmdline 102859->102861 102930 bf897d 58 API calls 2 library calls 102859->102930 102861->102792 102863 c04ed1 __wsetenvp 102862->102863 102867 c04ec9 102862->102867 102864 bf8935 __calloc_crt 58 API calls 102863->102864 102872 c04efa __wsetenvp 102864->102872 102865 c04f51 102866 bf2eb5 _free 58 API calls 102865->102866 102866->102867 102867->102796 102868 bf8935 __calloc_crt 58 API calls 102868->102872 102869 c04f76 102870 bf2eb5 _free 58 API calls 102869->102870 102870->102867 102872->102865 102872->102867 102872->102868 102872->102869 102873 c04f8d 102872->102873 102931 c04767 58 API calls 2 library calls 102872->102931 102932 bf8f26 IsProcessorFeaturePresent 102873->102932 102875 c04f99 102875->102796 102877 bf325d __IsNonwritableInCurrentImage 102876->102877 102955 bfa631 102877->102955 102879 bf327b __initterm_e 102880 bf2ea0 __cinit 67 API calls 102879->102880 102881 bf329a __cinit __IsNonwritableInCurrentImage 102879->102881 102880->102881 102881->102800 102883 be6044 102882->102883 102884 be5fa5 102882->102884 102883->102804 102885 be5fdf IsThemeActive 102884->102885 102958 bf34ce 102885->102958 102889 be600b 102970 be5f00 SystemParametersInfoW SystemParametersInfoW 102889->102970 102891 be6017 102971 be5240 102891->102971 102894->102778 102895->102782 102896->102789 102900->102805 102901->102808 102902->102814 102903->102816 102904->102820 102905->102821 102909 bf893c 102906->102909 102908 bf8977 102908->102825 102912 bf9f46 TlsSetValue 102908->102912 102909->102908 102911 bf895a 102909->102911 102915 c05356 102909->102915 102911->102908 102911->102909 102923 bfa292 Sleep 102911->102923 102912->102828 102913->102832 102914->102829 102916 c05361 102915->102916 102921 c0537c 102915->102921 102917 c0536d 102916->102917 102916->102921 102924 bf8c88 58 API calls __getptd_noexit 102917->102924 102919 c0538c HeapAlloc 102920 c05372 102919->102920 102919->102921 102920->102909 102921->102919 102921->102920 102925 bf3503 DecodePointer 102921->102925 102923->102911 102924->102920 102925->102921 102926->102848 102927->102849 102928->102840 102929->102856 102930->102861 102931->102872 102933 bf8f31 102932->102933 102938 bf8db9 102933->102938 102937 bf8f4c 102937->102875 102939 bf8dd3 _memset __call_reportfault 102938->102939 102940 bf8df3 IsDebuggerPresent 102939->102940 102946 bfa2b5 SetUnhandledExceptionFilter UnhandledExceptionFilter 102940->102946 102942 bf8eb7 __call_reportfault 102947 bfc756 102942->102947 102944 bf8eda 102945 bfa2a0 GetCurrentProcess TerminateProcess 102944->102945 102945->102937 102946->102942 102948 bfc75e 102947->102948 102949 bfc760 IsProcessorFeaturePresent 102947->102949 102948->102944 102951 c05a6a 102949->102951 102954 c05a19 5 API calls 2 library calls 102951->102954 102953 c05b4d 102953->102944 102954->102953 102956 bfa634 EncodePointer 102955->102956 102956->102956 102957 bfa64e 102956->102957 102957->102879 102959 bf9d6b __lock 58 API calls 102958->102959 102960 bf34d9 DecodePointer EncodePointer 102959->102960 103023 bf9ed5 LeaveCriticalSection 102960->103023 102962 be6004 102963 bf3536 102962->102963 102964 bf355a 102963->102964 102965 bf3540 102963->102965 102964->102889 102965->102964 103024 bf8c88 58 API calls __getptd_noexit 102965->103024 102967 bf354a 103025 bf8f16 9 API calls __fptostr 102967->103025 102969 bf3555 102969->102889 102970->102891 102972 be524d __ftell_nolock 102971->102972 102973 be1207 59 API calls 102972->102973 102974 be5258 GetCurrentDirectoryW 102973->102974 103026 be4ec8 102974->103026 103023->102962 103024->102967 103025->102969 103027 be1207 59 API calls 103026->103027 103028 be4ede 103027->103028 103136 be5420 103028->103136 103030 be4efc 103031 be19e1 59 API calls 103030->103031 103032 be4f10 103031->103032 103033 be1c9c 59 API calls 103032->103033 103034 be4f1b 103033->103034 103035 bd477a 59 API calls 103034->103035 103036 be4f27 103035->103036 103037 be1a36 59 API calls 103036->103037 103038 be4f34 103037->103038 103039 bd39be 68 API calls 103038->103039 103040 be4f44 Mailbox 103039->103040 103041 be1a36 59 API calls 103040->103041 103042 be4f68 103041->103042 103043 bd39be 68 API calls 103042->103043 103044 be4f77 Mailbox 103043->103044 103045 be1207 59 API calls 103044->103045 103046 be4f94 103045->103046 103150 be55bc 103046->103150 103049 bf305f _W_store_winword 60 API calls 103050 be4fae 103049->103050 103051 c209d4 103050->103051 103052 be4fb8 103050->103052 103053 be55bc 59 API calls 103051->103053 103054 bf305f _W_store_winword 60 API calls 103052->103054 103055 c209e8 103053->103055 103056 be4fc3 103054->103056 103059 be55bc 59 API calls 103055->103059 103056->103055 103057 be4fcd 103056->103057 103058 bf305f _W_store_winword 60 API calls 103057->103058 103060 be4fd8 103058->103060 103061 c20a04 103059->103061 103060->103061 103062 be4fe2 103060->103062 103063 befffa 61 API calls 103061->103063 103064 bf305f _W_store_winword 60 API calls 103062->103064 103065 c20a27 103063->103065 103066 be4fed 103064->103066 103067 be55bc 59 API calls 103065->103067 103068 be4ff7 103066->103068 103069 c20a50 103066->103069 103070 c20a33 103067->103070 103071 be501b 103068->103071 103074 be1c9c 59 API calls 103068->103074 103072 be55bc 59 API calls 103069->103072 103073 be1c9c 59 API calls 103070->103073 103078 bd47be 59 API calls 103071->103078 103075 c20a6e 103072->103075 103076 c20a41 103073->103076 103077 be500e 103074->103077 103079 be1c9c 59 API calls 103075->103079 103080 be55bc 59 API calls 103076->103080 103081 be55bc 59 API calls 103077->103081 103082 be502a 103078->103082 103083 c20a7c 103079->103083 103080->103069 103081->103071 103085 bd4540 59 API calls 103082->103085 103084 be55bc 59 API calls 103083->103084 103087 be5038 103085->103087 103137 be542d __ftell_nolock 103136->103137 103138 be1821 59 API calls 103137->103138 103143 be5590 Mailbox 103137->103143 103140 be545f 103138->103140 103139 be1609 59 API calls 103139->103140 103140->103139 103148 be5495 Mailbox 103140->103148 103141 be1609 59 API calls 103141->103148 103142 be5563 103142->103143 103144 be1a36 59 API calls 103142->103144 103143->103030 103145 be5584 103144->103145 103147 be4c94 59 API calls 103145->103147 103146 be1a36 59 API calls 103146->103148 103147->103143 103148->103141 103148->103142 103148->103143 103148->103146 103149 be4c94 59 API calls 103148->103149 103149->103148 103151 be55df 103150->103151 103152 be55c6 103150->103152 103154 be1821 59 API calls 103151->103154 103153 be1c9c 59 API calls 103152->103153 103155 be4fa0 103153->103155 103154->103155 103155->103049 104165 bd6981 104166 bd373a 59 API calls 104165->104166 104167 bd6997 104166->104167 104172 bd7b3f 104167->104172 104169 bd69bf 104170 bd584d 104169->104170 104184 c3a2fa 89 API calls 4 library calls 104169->104184 104173 be162d 59 API calls 104172->104173 104174 bd7b64 _wcscmp 104173->104174 104175 bd7b98 Mailbox 104174->104175 104176 be1a36 59 API calls 104174->104176 104175->104169 104177 c0fedd 104176->104177 104178 be17e0 59 API calls 104177->104178 104179 c0fee8 104178->104179 104185 bd3938 68 API calls 104179->104185 104181 c0fef9 104183 c0fefd Mailbox 104181->104183 104186 bd523c 59 API calls 104181->104186 104183->104169 104184->104170 104185->104181 104186->104183 104187 be4d83 104188 be4dba 104187->104188 104189 be4dd8 104188->104189 104190 be4e37 104188->104190 104226 be4e35 104188->104226 104193 be4ead PostQuitMessage 104189->104193 104194 be4de5 104189->104194 104191 c20942 104190->104191 104192 be4e3d 104190->104192 104242 bdc460 10 API calls Mailbox 104191->104242 104196 be4e65 SetTimer RegisterWindowMessageW 104192->104196 104197 be4e42 104192->104197 104229 be4e28 104193->104229 104198 c209b5 104194->104198 104199 be4df0 104194->104199 104195 be4e1a DefWindowProcW 104195->104229 104203 be4e8e CreatePopupMenu 104196->104203 104196->104229 104201 c208e5 104197->104201 104202 be4e49 KillTimer 104197->104202 104245 c32b3a 97 API calls _memset 104198->104245 104204 be4df8 104199->104204 104205 be4eb7 104199->104205 104208 c208ea 104201->104208 104209 c2091e MoveWindow 104201->104209 104210 be5ac3 Shell_NotifyIconW 104202->104210 104203->104229 104211 c2099a 104204->104211 104212 be4e03 104204->104212 104232 be5b29 104205->104232 104207 c20969 104243 bdc483 441 API calls Mailbox 104207->104243 104216 c208ee 104208->104216 104217 c2090d SetFocus 104208->104217 104209->104229 104218 be4e5c 104210->104218 104211->104195 104244 c28637 59 API calls Mailbox 104211->104244 104219 be4e9b 104212->104219 104224 be4e0e 104212->104224 104213 c209c7 104213->104195 104213->104229 104220 c208f7 104216->104220 104216->104224 104217->104229 104239 bd34e4 DeleteObject DestroyWindow Mailbox 104218->104239 104240 be5bd7 107 API calls _memset 104219->104240 104241 bdc460 10 API calls Mailbox 104220->104241 104224->104195 104228 be5ac3 Shell_NotifyIconW 104224->104228 104226->104195 104227 be4eab 104227->104229 104230 c2098e 104228->104230 104231 be59d3 94 API calls 104230->104231 104231->104226 104233 be5bc2 104232->104233 104234 be5b40 _memset 104232->104234 104233->104229 104235 be56f8 87 API calls 104234->104235 104237 be5b67 104235->104237 104236 be5bab KillTimer SetTimer 104236->104233 104237->104236 104238 c20cee Shell_NotifyIconW 104237->104238 104238->104236 104239->104229 104240->104227 104241->104229 104242->104207 104243->104224 104244->104226 104245->104213

                                                      Control-flow Graph

                                                      APIs
                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00BE526C
                                                      • IsDebuggerPresent.KERNEL32 ref: 00BE527E
                                                      • GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 00BE52E6
                                                        • Part of subcall function 00BE1821: _memmove.LIBCMT ref: 00BE185B
                                                        • Part of subcall function 00BDBBC6: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00BDBC07
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00BE5366
                                                      • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 00C20AAE
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00C20AE6
                                                      • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00C85230), ref: 00C20B69
                                                      • ShellExecuteW.SHELL32(00000000), ref: 00C20B70
                                                        • Part of subcall function 00BE514C: GetSysColorBrush.USER32(0000000F), ref: 00BE5156
                                                        • Part of subcall function 00BE514C: LoadCursorW.USER32(00000000,00007F00), ref: 00BE5165
                                                        • Part of subcall function 00BE514C: LoadIconW.USER32(00000063), ref: 00BE517C
                                                        • Part of subcall function 00BE514C: LoadIconW.USER32(000000A4), ref: 00BE518E
                                                        • Part of subcall function 00BE514C: LoadIconW.USER32(000000A2), ref: 00BE51A0
                                                        • Part of subcall function 00BE514C: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00BE51C6
                                                        • Part of subcall function 00BE514C: RegisterClassExW.USER32(?), ref: 00BE521C
                                                        • Part of subcall function 00BE50DB: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00BE5109
                                                        • Part of subcall function 00BE50DB: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00BE512A
                                                        • Part of subcall function 00BE50DB: ShowWindow.USER32(00000000), ref: 00BE513E
                                                        • Part of subcall function 00BE50DB: ShowWindow.USER32(00000000), ref: 00BE5147
                                                        • Part of subcall function 00BE59D3: _memset.LIBCMT ref: 00BE59F9
                                                        • Part of subcall function 00BE59D3: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00BE5A9E
                                                      Strings
                                                      • runas, xrefs: 00C20B64
                                                      • AutoIt, xrefs: 00C20AA3
                                                      • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 00C20AA8
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                      • String ID: AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                                      • API String ID: 529118366-2030392706
                                                      • Opcode ID: 6cb854bf95bd52007d6cb404a2445814a5b5f69d343bfafd80a9d169910f9c1b
                                                      • Instruction ID: 942dba81b24bb61caad4556127db0d45027e879fc65647f3db6f4b270b8241da
                                                      • Opcode Fuzzy Hash: 6cb854bf95bd52007d6cb404a2445814a5b5f69d343bfafd80a9d169910f9c1b
                                                      • Instruction Fuzzy Hash: E0510670904688EACF21EBB6DC49FEE7BF8AF04784F2401FAF552621A2CBB45504C724

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00BF01AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00BE2A58,?,00008000), ref: 00BF01CF
                                                        • Part of subcall function 00C34E59: GetFileAttributesW.KERNEL32(?,00C33A6B), ref: 00C34E5A
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00C33C03
                                                      • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00C33CAB
                                                      • MoveFileW.KERNEL32(?,?), ref: 00C33CBE
                                                      • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00C33CDB
                                                      • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00C33CFD
                                                      • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00C33D19
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                      • String ID: \*.*
                                                      • API String ID: 4002782344-1173974218
                                                      • Opcode ID: 70316444af191ff89f7b925f884ea3f1fd206dcafe70faa76443fab892a18927
                                                      • Instruction ID: 18c4c8acfa503290d2d0cad172616df0cf443007887195ecc25e003a905042dc
                                                      • Opcode Fuzzy Hash: 70316444af191ff89f7b925f884ea3f1fd206dcafe70faa76443fab892a18927
                                                      • Instruction Fuzzy Hash: 5B51803181118DAACF15EBA5DE529EDB7B9AF10301F3046A5E412B7192EF316F09DB60

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1157 be5d13-be5d73 call be1207 GetVersionExW call be1821 1162 be5e78-be5e7a 1157->1162 1163 be5d79 1157->1163 1164 c20f29-c20f35 1162->1164 1165 be5d7c-be5d81 1163->1165 1166 c20f36-c20f3a 1164->1166 1167 be5e7f-be5e80 1165->1167 1168 be5d87 1165->1168 1170 c20f3c 1166->1170 1171 c20f3d-c20f49 1166->1171 1169 be5d88-be5dbf call be1981 call be133d 1167->1169 1168->1169 1180 c21018-c2101b 1169->1180 1181 be5dc5-be5dc6 1169->1181 1170->1171 1171->1166 1172 c20f4b-c20f50 1171->1172 1172->1165 1174 c20f56-c20f5d 1172->1174 1174->1164 1176 c20f5f 1174->1176 1179 c20f64-c20f6a 1176->1179 1182 be5e00-be5e17 GetCurrentProcess IsWow64Process 1179->1182 1183 c21034-c21038 1180->1183 1184 c2101d 1180->1184 1185 be5dcc-be5dcf 1181->1185 1186 c20f6f-c20f7a 1181->1186 1191 be5e1c-be5e2d 1182->1191 1192 be5e19 1182->1192 1193 c21023-c2102c 1183->1193 1194 c2103a-c21043 1183->1194 1189 c21020 1184->1189 1185->1182 1190 be5dd1-be5def 1185->1190 1187 c20f97-c20f99 1186->1187 1188 c20f7c-c20f82 1186->1188 1198 c20f9b-c20fa7 1187->1198 1199 c20fbc-c20fbf 1187->1199 1195 c20f84-c20f87 1188->1195 1196 c20f8c-c20f92 1188->1196 1189->1193 1190->1182 1197 be5df1-be5df7 1190->1197 1201 be5e2f-be5e3f call be55f0 1191->1201 1202 be5e98-be5ea2 GetSystemInfo 1191->1202 1192->1191 1193->1183 1194->1189 1200 c21045-c21048 1194->1200 1195->1182 1196->1182 1197->1179 1203 be5dfd 1197->1203 1204 c20fb1-c20fb7 1198->1204 1205 c20fa9-c20fac 1198->1205 1207 c20fc1-c20fd0 1199->1207 1208 c20fe5-c20fe8 1199->1208 1200->1193 1214 be5e8c-be5e96 GetSystemInfo 1201->1214 1215 be5e41-be5e4e call be55f0 1201->1215 1206 be5e65-be5e75 1202->1206 1203->1182 1204->1182 1205->1182 1210 c20fd2-c20fd5 1207->1210 1211 c20fda-c20fe0 1207->1211 1208->1182 1213 c20fee-c21003 1208->1213 1210->1182 1211->1182 1216 c21005-c21008 1213->1216 1217 c2100d-c21013 1213->1217 1218 be5e56-be5e5a 1214->1218 1222 be5e85-be5e8a 1215->1222 1223 be5e50-be5e54 GetNativeSystemInfo 1215->1223 1216->1182 1217->1182 1218->1206 1220 be5e5c-be5e5f FreeLibrary 1218->1220 1220->1206 1222->1223 1223->1218
                                                      APIs
                                                      • GetVersionExW.KERNEL32(?), ref: 00BE5D40
                                                        • Part of subcall function 00BE1821: _memmove.LIBCMT ref: 00BE185B
                                                      • GetCurrentProcess.KERNEL32(?,00C60A18,00000000,00000000,?), ref: 00BE5E07
                                                      • IsWow64Process.KERNEL32(00000000), ref: 00BE5E0E
                                                      • GetNativeSystemInfo.KERNEL32(00000000), ref: 00BE5E54
                                                      • FreeLibrary.KERNEL32(00000000), ref: 00BE5E5F
                                                      • GetSystemInfo.KERNEL32(00000000), ref: 00BE5E90
                                                      • GetSystemInfo.KERNEL32(00000000), ref: 00BE5E9C
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                      • String ID:
                                                      • API String ID: 1986165174-0
                                                      • Opcode ID: 3fb63f63ee38d3bfec08224e42186d746893cbf42d88fd692e830419479790df
                                                      • Instruction ID: 1a82d0ccbbef77b84fb62dd097e9d3c33f5e5de923b6789be24780497115e830
                                                      • Opcode Fuzzy Hash: 3fb63f63ee38d3bfec08224e42186d746893cbf42d88fd692e830419479790df
                                                      • Instruction Fuzzy Hash: 0A91F831549BC0DEC731CB7995905ABFFE5AF3A304B984A9ED0D793A02D330A648C769

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1224 c33e72-c33eb9 call be1207 * 3 call bf01af call c34e59 1235 c33ebb-c33ec4 call be1900 1224->1235 1236 c33ec9-c33efa call bf0044 FindFirstFileW 1224->1236 1235->1236 1240 c33f69-c33f70 FindClose 1236->1240 1241 c33efc-c33efe 1236->1241 1242 c33f74-c33f96 call be1cb6 * 3 1240->1242 1241->1240 1243 c33f00-c33f05 1241->1243 1245 c33f07-c33f42 call be1c9c call be17e0 call be1900 DeleteFileW 1243->1245 1246 c33f44-c33f56 FindNextFileW 1243->1246 1245->1246 1259 c33f60-c33f67 FindClose 1245->1259 1246->1241 1247 c33f58-c33f5e 1246->1247 1247->1241 1259->1242
                                                      APIs
                                                        • Part of subcall function 00BF01AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00BE2A58,?,00008000), ref: 00BF01CF
                                                        • Part of subcall function 00C34E59: GetFileAttributesW.KERNEL32(?,00C33A6B), ref: 00C34E5A
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00C33EE9
                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 00C33F39
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C33F4A
                                                      • FindClose.KERNEL32(00000000), ref: 00C33F61
                                                      • FindClose.KERNEL32(00000000), ref: 00C33F6A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                      • String ID: \*.*
                                                      • API String ID: 2649000838-1173974218
                                                      • Opcode ID: 481411e3bd4c01ffff64ad7967cc481e5cadf60ca54cb36b7238a89d06c02b44
                                                      • Instruction ID: ffd94776fcf3689342504aed2ed98360fb4cbb4134805d852ce6d093bfa7006a
                                                      • Opcode Fuzzy Hash: 481411e3bd4c01ffff64ad7967cc481e5cadf60ca54cb36b7238a89d06c02b44
                                                      • Instruction Fuzzy Hash: 03318F710183859BC300EF68CC959AFB7E8BE95304F544E9DF4E692192EB70DA09CB66
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00C33FDA
                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 00C33FE8
                                                      • Process32NextW.KERNEL32(00000000,?), ref: 00C34008
                                                      • CloseHandle.KERNEL32(00000000), ref: 00C340B2
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                      • String ID:
                                                      • API String ID: 420147892-0
                                                      • Opcode ID: 9567a3ef7a2d77cd8523381f99d25645168510230df60cfcc722a1774cc086a7
                                                      • Instruction ID: b1ca78ac87cbadf21d25f3848e346e5978b85b553cfcd05d0c9bada31191adaa
                                                      • Opcode Fuzzy Hash: 9567a3ef7a2d77cd8523381f99d25645168510230df60cfcc722a1774cc086a7
                                                      • Instruction Fuzzy Hash: 033186711083419FD318EF55C881BAFBBE8EF95350F200D2DF696C61A1EB71AA49CB52
                                                      APIs
                                                        • Part of subcall function 00BE3740: CharUpperBuffW.USER32(?,00C961DC,00000000,?,00000000,00C961DC,?,00BD53A5,?,?,?,?), ref: 00BE375D
                                                      • _memmove.LIBCMT ref: 00BDB68A
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpper_memmove
                                                      • String ID:
                                                      • API String ID: 2819905725-0
                                                      • Opcode ID: 7c8a4a74fe15e37516cb731fd441e1f89859f370e58bf2d5490e4eae38be6c65
                                                      • Instruction ID: 1dcbf4a03430d95fcde6ff2457ae7c8383ea107952769487c8b847446c9d6602
                                                      • Opcode Fuzzy Hash: 7c8a4a74fe15e37516cb731fd441e1f89859f370e58bf2d5490e4eae38be6c65
                                                      • Instruction Fuzzy Hash: 82A23770608741DFD720DF14C480B6AFBE1FB89304F15899EE89A9B361E771E985CB92
                                                      APIs
                                                      • GetFileAttributesW.KERNEL32(?,00C1FC06), ref: 00C347C7
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00C347D8
                                                      • FindClose.KERNEL32(00000000), ref: 00C347E8
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: FileFind$AttributesCloseFirst
                                                      • String ID:
                                                      • API String ID: 48322524-0
                                                      • Opcode ID: 90002c5fad7d1df494d2faffb7d76952374bd456fcfdbeee64a9b9b05bbc8527
                                                      • Instruction ID: 87b77264bfc0adef2b3a2a4a2b6f2c3fda230f5788872cebd2083a08ae57038b
                                                      • Opcode Fuzzy Hash: 90002c5fad7d1df494d2faffb7d76952374bd456fcfdbeee64a9b9b05bbc8527
                                                      • Instruction Fuzzy Hash: 1EE0DF31820611AB82246739EC4D9EE379C9E07339F200B15F932D21E0EBB0AE80C696
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 633a9dc1599a1de037d1147881a3220308a6bb045f8f48ab12f97e267583a944
                                                      • Instruction ID: b5bb132d3ed5cc4a8414bd853cec5b52164dca0d94ba854dac821bbb3bab9e44
                                                      • Opcode Fuzzy Hash: 633a9dc1599a1de037d1147881a3220308a6bb045f8f48ab12f97e267583a944
                                                      • Instruction Fuzzy Hash: CA229A74A0420ADFDB24DF54C490AAEF7F0FF09300F1481AAE956AB351E735AD85DB91
                                                      APIs
                                                      • timeGetTime.WINMM ref: 00BDBF57
                                                        • Part of subcall function 00BD52B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00BD52E6
                                                      • Sleep.KERNEL32(0000000A,?,?), ref: 00C135E5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessagePeekSleepTimetime
                                                      • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$CALL
                                                      • API String ID: 1792118007-922114024
                                                      • Opcode ID: f386342fe351a186f9ab8a388d01954b748440ed13e962c7502da0d18fe9517d
                                                      • Instruction ID: cbbf8d80aaea5536512eb3a7035ccc20cf07d51029d450bae3cf0225b8f69f61
                                                      • Opcode Fuzzy Hash: f386342fe351a186f9ab8a388d01954b748440ed13e962c7502da0d18fe9517d
                                                      • Instruction Fuzzy Hash: 57C2AE70608381DBD728DF24C884BAAFBE5FF85304F14495EE49A973A1D771E984DB82

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00BD3444
                                                      • RegisterClassExW.USER32(00000030), ref: 00BD346E
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00BD347F
                                                      • InitCommonControlsEx.COMCTL32(?), ref: 00BD349C
                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00BD34AC
                                                      • LoadIconW.USER32(000000A9), ref: 00BD34C2
                                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00BD34D1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                      • API String ID: 2914291525-1005189915
                                                      • Opcode ID: a869db054bd04d331969992ed04fee243205199351f45ac624a4b10a314eeec7
                                                      • Instruction ID: a897452dae2bfc1cc4747273f36c7e775c8cf94af4b27641226778cf607313a6
                                                      • Opcode Fuzzy Hash: a869db054bd04d331969992ed04fee243205199351f45ac624a4b10a314eeec7
                                                      • Instruction Fuzzy Hash: D23105B1840309EFEB508FA4DC89BDEBBF0FB09310F20455AE590E62A0D7B95581CF95

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00BD3444
                                                      • RegisterClassExW.USER32(00000030), ref: 00BD346E
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00BD347F
                                                      • InitCommonControlsEx.COMCTL32(?), ref: 00BD349C
                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00BD34AC
                                                      • LoadIconW.USER32(000000A9), ref: 00BD34C2
                                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00BD34D1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                      • API String ID: 2914291525-1005189915
                                                      • Opcode ID: 2d4454945a534ac9afdbe5cc435da42a3b67fc5d53ba6ea0e5bd22e8496ba5f2
                                                      • Instruction ID: 3cf07b73bddd75343fc940ecaeed096ac28ab98bc1a87be674d0521340d0b66a
                                                      • Opcode Fuzzy Hash: 2d4454945a534ac9afdbe5cc435da42a3b67fc5d53ba6ea0e5bd22e8496ba5f2
                                                      • Instruction Fuzzy Hash: 7221CEB1911218EFEB109FA5E889BDEBBF4FB08710F20451AFA11B62E0D7B255448F95

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00BEFFFA: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00BE3094), ref: 00BF0018
                                                        • Part of subcall function 00BF07EC: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00BE309F), ref: 00BF080E
                                                      • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00BE30E2
                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00C2013A
                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00C2017B
                                                      • RegCloseKey.ADVAPI32(?), ref: 00C201B9
                                                      • _wcscat.LIBCMT ref: 00C20212
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                      • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                      • API String ID: 2673923337-2727554177
                                                      • Opcode ID: 3656c496acb7765f6759e5d8f51ab23f57df395026f12f74a557c3ae9e81232e
                                                      • Instruction ID: 300bc07571b0acaf2daf3700d4f7adb71fd7474c51609e5ac288fd8edbe0d1cd
                                                      • Opcode Fuzzy Hash: 3656c496acb7765f6759e5d8f51ab23f57df395026f12f74a557c3ae9e81232e
                                                      • Instruction Fuzzy Hash: 12717C7142A741DEC714EF2AEC85A6FBBE8FF54340B600A6EF455C32A1EB709948CB51

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00BE5156
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00BE5165
                                                      • LoadIconW.USER32(00000063), ref: 00BE517C
                                                      • LoadIconW.USER32(000000A4), ref: 00BE518E
                                                      • LoadIconW.USER32(000000A2), ref: 00BE51A0
                                                      • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00BE51C6
                                                      • RegisterClassExW.USER32(?), ref: 00BE521C
                                                        • Part of subcall function 00BD3411: GetSysColorBrush.USER32(0000000F), ref: 00BD3444
                                                        • Part of subcall function 00BD3411: RegisterClassExW.USER32(00000030), ref: 00BD346E
                                                        • Part of subcall function 00BD3411: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00BD347F
                                                        • Part of subcall function 00BD3411: InitCommonControlsEx.COMCTL32(?), ref: 00BD349C
                                                        • Part of subcall function 00BD3411: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00BD34AC
                                                        • Part of subcall function 00BD3411: LoadIconW.USER32(000000A9), ref: 00BD34C2
                                                        • Part of subcall function 00BD3411: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00BD34D1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                      • String ID: #$0$AutoIt v3
                                                      • API String ID: 423443420-4155596026
                                                      • Opcode ID: 2dfa530618348d7abce3a187c0a5013a10c4931c7449c2371ad1cd9f1bfe3878
                                                      • Instruction ID: d990bec69a7dec2bf9a2ba232528cfaadf1289f78656fca7225def468e92cf67
                                                      • Opcode Fuzzy Hash: 2dfa530618348d7abce3a187c0a5013a10c4931c7449c2371ad1cd9f1bfe3878
                                                      • Instruction Fuzzy Hash: 44216D71D00708AFEB10DFA5EC49B9EBBF4FB08714F10416AE504A62E0D7BA6954DF84

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 715 c45be2-c45c19 call bd4dc0 718 c45c39-c45c4b WSAStartup 715->718 719 c45c1b-c45c28 call bd502b 715->719 721 c45c62-c45ca0 call be40cd call bd4d37 call be402a inet_addr gethostbyname 718->721 722 c45c4d-c45c5d call c26f18 718->722 719->718 726 c45c2a-c45c35 call bd502b 719->726 736 c45cb1-c45cc1 call c26f18 721->736 737 c45ca2-c45caf IcmpCreateFile 721->737 731 c45dbb-c45dc3 722->731 726->718 742 c45db2-c45db6 call be1cb6 736->742 737->736 738 c45cc6-c45cf7 call bf0f16 call be433f 737->738 747 c45cf9-c45d18 IcmpSendEcho 738->747 748 c45d1a-c45d2e IcmpSendEcho 738->748 742->731 749 c45d32-c45d34 747->749 748->749 750 c45d36-c45d3b 749->750 751 c45d67-c45d69 749->751 752 c45d3d-c45d42 750->752 753 c45d7f-c45d91 call bd4dc0 750->753 754 c45d6b-c45d77 call c26f18 751->754 755 c45d44-c45d49 752->755 756 c45d79-c45d7d 752->756 765 c45d97 753->765 766 c45d93-c45d95 753->766 764 c45d99-c45dad IcmpCloseHandle WSACleanup call be45ae 754->764 755->751 759 c45d4b-c45d50 755->759 756->754 762 c45d52-c45d57 759->762 763 c45d5f-c45d65 759->763 762->756 768 c45d59-c45d5d 762->768 763->754 764->742 765->764 766->764 768->754
                                                      APIs
                                                      • WSAStartup.WS2_32(00000101,?), ref: 00C45C43
                                                      • inet_addr.WSOCK32(?,?,?), ref: 00C45C88
                                                      • gethostbyname.WS2_32(?), ref: 00C45C94
                                                      • IcmpCreateFile.IPHLPAPI ref: 00C45CA2
                                                      • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00C45D12
                                                      • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00C45D28
                                                      • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00C45D9D
                                                      • WSACleanup.WSOCK32 ref: 00C45DA3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                      • String ID: Ping
                                                      • API String ID: 1028309954-2246546115
                                                      • Opcode ID: c02cd1ce294b97efd59e6fd6891543228f84c0d8811b1bf681a63688e17b807d
                                                      • Instruction ID: ec27b1c77f5829d94096e249f2ee68298dfed3b559545d3df3f4fec1223db122
                                                      • Opcode Fuzzy Hash: c02cd1ce294b97efd59e6fd6891543228f84c0d8811b1bf681a63688e17b807d
                                                      • Instruction Fuzzy Hash: 39518C71A047009FD721EF25DD89B2ABBE0FF48710F14496AF566AB2E2DB70ED018B41

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 769 be4d83-be4dd1 771 be4dd3-be4dd6 769->771 772 be4e31-be4e33 769->772 773 be4dd8-be4ddf 771->773 774 be4e37 771->774 772->771 775 be4e35 772->775 778 be4ead-be4eb5 PostQuitMessage 773->778 779 be4de5-be4dea 773->779 776 c20942-c20970 call bdc460 call bdc483 774->776 777 be4e3d-be4e40 774->777 780 be4e1a-be4e22 DefWindowProcW 775->780 816 c20975-c2097c 776->816 781 be4e65-be4e8c SetTimer RegisterWindowMessageW 777->781 782 be4e42-be4e43 777->782 787 be4e61-be4e63 778->787 783 c209b5-c209c9 call c32b3a 779->783 784 be4df0-be4df2 779->784 786 be4e28-be4e2e 780->786 781->787 790 be4e8e-be4e99 CreatePopupMenu 781->790 788 c208e5-c208e8 782->788 789 be4e49-be4e5c KillTimer call be5ac3 call bd34e4 782->789 783->787 809 c209cf 783->809 791 be4df8-be4dfd 784->791 792 be4eb7-be4ec1 call be5b29 784->792 787->786 795 c208ea-c208ec 788->795 796 c2091e-c2093d MoveWindow 788->796 789->787 790->787 798 c2099a-c209a1 791->798 799 be4e03-be4e08 791->799 811 be4ec6 792->811 803 c208ee-c208f1 795->803 804 c2090d-c20919 SetFocus 795->804 796->787 798->780 806 c209a7-c209b0 call c28637 798->806 807 be4e0e-be4e14 799->807 808 be4e9b-be4eab call be5bd7 799->808 803->807 812 c208f7-c20908 call bdc460 803->812 804->787 806->780 807->780 807->816 808->787 809->780 811->787 812->787 816->780 820 c20982-c20995 call be5ac3 call be59d3 816->820 820->780
                                                      APIs
                                                      • DefWindowProcW.USER32(?,?,?,?), ref: 00BE4E22
                                                      • KillTimer.USER32(?,00000001), ref: 00BE4E4C
                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00BE4E6F
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00BE4E7A
                                                      • CreatePopupMenu.USER32 ref: 00BE4E8E
                                                      • PostQuitMessage.USER32(00000000), ref: 00BE4EAF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                      • String ID: TaskbarCreated
                                                      • API String ID: 129472671-2362178303
                                                      • Opcode ID: 7e0530e7a2e4b277c3455973fa08b8de13bf810ff17d069cf2a91516e30b12af
                                                      • Instruction ID: 440c6dc1ddaf6f7af57d974ced0c566c0a3ecc69cb3071b7752a3f423f352baa
                                                      • Opcode Fuzzy Hash: 7e0530e7a2e4b277c3455973fa08b8de13bf810ff17d069cf2a91516e30b12af
                                                      • Instruction Fuzzy Hash: 48415C71200189ABDF296F26DC4DB7F76D5FB41300F1401EAF503A26E2DBB0AC509761

                                                      Control-flow Graph

                                                      APIs
                                                      • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00C20BDB
                                                        • Part of subcall function 00BE1821: _memmove.LIBCMT ref: 00BE185B
                                                      • _memset.LIBCMT ref: 00BE5787
                                                      • _wcscpy.LIBCMT ref: 00BE57DB
                                                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00BE57EB
                                                      • __swprintf.LIBCMT ref: 00C20C51
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: IconLoadNotifyShell_String__swprintf_memmove_memset_wcscpy
                                                      • String ID: Line %d: $AutoIt - $E&E&
                                                      • API String ID: 230667853-941963392
                                                      • Opcode ID: 7a5cabed5e8814122dbb089b593d529040387f8348d6c379fb9e4b597831d19b
                                                      • Instruction ID: 353883a2c76bad329488decef89c8626e17c9f8461644721c97c307a80bc06a0
                                                      • Opcode Fuzzy Hash: 7a5cabed5e8814122dbb089b593d529040387f8348d6c379fb9e4b597831d19b
                                                      • Instruction Fuzzy Hash: 1941B271008744AAC321EB65DC85FEF77ECAF44354F200A5EF195921E2EF74AA49CB92

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 960 c4fb45-c4fba6 call bf2f40 963 c4fbd2-c4fbd6 960->963 964 c4fba8-c4fbbb call bd502b 960->964 965 c4fc1d-c4fc23 963->965 966 c4fbd8-c4fbe8 call bd502b 963->966 976 c4fbbd-c4fbd0 call bd502b 964->976 977 c4fc08 964->977 970 c4fc25-c4fc28 965->970 971 c4fc38-c4fc3e 965->971 981 c4fbeb-c4fc04 call bd502b 966->981 972 c4fc2b-c4fc30 call bd502b 970->972 973 c4fc40 971->973 974 c4fc48-c4fc62 call bd4d37 call be436a 971->974 972->971 973->974 993 c4fd21-c4fd29 974->993 994 c4fc68-c4fcc1 call bd4d37 call be436a call bd4d37 call be436a call bd4d37 call be436a 974->994 976->981 982 c4fc0b-c4fc0f 977->982 981->965 992 c4fc06 981->992 987 c4fc11-c4fc17 982->987 988 c4fc19-c4fc1b 982->988 987->972 988->965 988->971 992->982 995 c4fd53-c4fd81 GetCurrentDirectoryW call bf0f16 GetCurrentDirectoryW 993->995 996 c4fd2b-c4fd46 call bd4d37 call be436a 993->996 1041 c4fcc3-c4fcde call bd4d37 call be436a 994->1041 1042 c4fcef-c4fd1f GetSystemDirectoryW call bf0f16 GetSystemDirectoryW 994->1042 1005 c4fd85 995->1005 996->995 1013 c4fd48-c4fd51 call bf2d5c 996->1013 1008 c4fd89-c4fd8d 1005->1008 1010 c4fdbe-c4fdce call c36e02 1008->1010 1011 c4fd8f-c4fdb9 call bd4f98 * 3 1008->1011 1024 c4fdd0-c4fe1b call c374bf call c373ce call c37447 1010->1024 1025 c4fe2a 1010->1025 1011->1010 1013->995 1013->1010 1026 c4fe2c-c4fe30 1024->1026 1056 c4fe1d-c4fe28 1024->1056 1025->1026 1030 c4fe36-c4fe61 call c28cd6 1026->1030 1031 c4fedc-c4ff03 CreateProcessW 1026->1031 1046 c4fe63-c4fe68 call c28d11 1030->1046 1047 c4fe6a call c28fb2 1030->1047 1038 c4ff06-c4ff19 call bf0f8c * 2 1031->1038 1061 c4ff58-c4ff64 CloseHandle 1038->1061 1062 c4ff1b-c4ff53 call c26f18 GetLastError call befcd9 call bd4dc0 1038->1062 1041->1042 1068 c4fce0-c4fce9 call bf2d5c 1041->1068 1042->1005 1060 c4fe6f-c4fe81 call bf2d5c 1046->1060 1047->1060 1056->1026 1075 c4fe83-c4fe88 1060->1075 1076 c4fe8a-c4fe9a call bf2d5c 1060->1076 1066 c4ff66-c4ff8b call c37072 call c376ba call c50027 1061->1066 1067 c4ff90-c4ff94 1061->1067 1078 c4ffd9-c4ffea call c36e9c 1062->1078 1066->1067 1070 c4ff96-c4ffa0 1067->1070 1071 c4ffa2-c4ffac 1067->1071 1068->1008 1068->1042 1070->1078 1079 c4ffb4-c4ffd3 call bd4dc0 CloseHandle 1071->1079 1080 c4ffae 1071->1080 1075->1075 1075->1076 1090 c4fea3-c4feb3 call bf2d5c 1076->1090 1091 c4fe9c-c4fea1 1076->1091 1079->1078 1080->1079 1099 c4feb5-c4feba 1090->1099 1100 c4febc-c4feda call bf0f8c * 3 1090->1100 1091->1090 1091->1091 1099->1099 1099->1100 1100->1038
                                                      APIs
                                                      • _memset.LIBCMT ref: 00C4FB66
                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00C4FCF9
                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00C4FD1D
                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00C4FD5D
                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00C4FD7F
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00C4FEFB
                                                      • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00C4FF2D
                                                      • CloseHandle.KERNEL32(?), ref: 00C4FF5C
                                                      • CloseHandle.KERNEL32(?), ref: 00C4FFD3
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                      • String ID:
                                                      • API String ID: 4090791747-0
                                                      • Opcode ID: 3989191f8738edf69fc322524e6b8c7448f37ef3fd437447ad5ac8e0ceab18a2
                                                      • Instruction ID: 981ed2fd3828e9b6c73da76f6cabc35c853d44b39f6b9e8c71b46ed6e3126128
                                                      • Opcode Fuzzy Hash: 3989191f8738edf69fc322524e6b8c7448f37ef3fd437447ad5ac8e0ceab18a2
                                                      • Instruction Fuzzy Hash: DCE1BE316043059FC724EF25C891B6EBBE1BF85310F1485ADF8999B2A2DB31ED46CB52

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1107 c4ede4-c4ee13 call bd4d37 call c33fb5 1111 c4ee18-c4ee1b 1107->1111 1112 c4ee44-c4ee48 1111->1112 1113 c4ee1d-c4ee3f call bd4dc0 call c26f18 1111->1113 1115 c4ef5c-c4ef6d call bd4dc0 1112->1115 1116 c4ee4e-c4ee62 OpenProcess 1112->1116 1129 c4ef6f-c4ef77 1113->1129 1115->1129 1117 c4ef11-c4ef1c TerminateProcess 1116->1117 1118 c4ee68-c4ee71 GetLastError 1116->1118 1124 c4ef53-c4ef5a CloseHandle 1117->1124 1125 c4ef1e-c4ef4c GetLastError call befcd9 call c26f18 call bd4dc0 1117->1125 1121 c4ee73-c4ee8d call c3390d call c2917c 1118->1121 1122 c4eedd-c4ef06 call befcd9 call c26f18 call bd4dc0 1118->1122 1141 c4eea1-c4eecb call befcd9 call c26f18 call bd4dc0 1121->1141 1142 c4ee8f-c4ee9f OpenProcess 1121->1142 1149 c4ef0d-c4ef0f 1122->1149 1124->1129 1125->1124 1146 c4eed2-c4eedb call c28bcc 1141->1146 1142->1146 1146->1149 1149->1117 1149->1129
                                                      APIs
                                                        • Part of subcall function 00C33FB5: CreateToolhelp32Snapshot.KERNEL32 ref: 00C33FDA
                                                        • Part of subcall function 00C33FB5: Process32FirstW.KERNEL32(00000000,?), ref: 00C33FE8
                                                        • Part of subcall function 00C33FB5: CloseHandle.KERNEL32(00000000), ref: 00C340B2
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00C4EE55
                                                      • GetLastError.KERNEL32 ref: 00C4EE68
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00C4EE97
                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 00C4EF14
                                                      • GetLastError.KERNEL32(00000000), ref: 00C4EF1F
                                                      • CloseHandle.KERNEL32(00000000), ref: 00C4EF54
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                      • String ID: SeDebugPrivilege
                                                      • API String ID: 2533919879-2896544425
                                                      • Opcode ID: 4a01c4164233073e4ab5a3cf1cf52079557364dd4f5ae12ff468a8b12f21f2bf
                                                      • Instruction ID: 423f044ec5681c18d206a6ff7441179a4e3f102784421e3dcacf1de114f78e17
                                                      • Opcode Fuzzy Hash: 4a01c4164233073e4ab5a3cf1cf52079557364dd4f5ae12ff468a8b12f21f2bf
                                                      • Instruction Fuzzy Hash: FE41EB312002019FEB25EF64DC95F6EB7A1BF44310F1484A9F9025B3D2DBB5AD08CB92

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1260 be50db-be514b CreateWindowExW * 2 ShowWindow * 2
                                                      APIs
                                                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00BE5109
                                                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00BE512A
                                                      • ShowWindow.USER32(00000000), ref: 00BE513E
                                                      • ShowWindow.USER32(00000000), ref: 00BE5147
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Window$CreateShow
                                                      • String ID: AutoIt v3$edit
                                                      • API String ID: 1584632944-3779509399
                                                      • Opcode ID: 5d9c12160f95b0266b3e25bfcbd276d390442d6ad800ac98a3b67694ca025338
                                                      • Instruction ID: 50500f7992efe23d711e644e20f974a8cb1b22bdaaf73c16a72b90313d4af005
                                                      • Opcode Fuzzy Hash: 5d9c12160f95b0266b3e25bfcbd276d390442d6ad800ac98a3b67694ca025338
                                                      • Instruction Fuzzy Hash: 11F0D471641694BEEA311B27AC4CF2B6E7DE7C6F60F11012AB900A21F1C6A62851DAB0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1261 c39983-c39a08 call be4a8c call c39b5e 1266 c39a12-c39ac9 call be4ab2 * 4 call be4a8c call bf586c * 2 call be4ab2 call c39531 call c38d7b 1261->1266 1267 c39a0a 1261->1267 1290 c39ae0-c39ae4 1266->1290 1291 c39acb-c39adb call bf2eb5 * 2 1266->1291 1268 c39a0c-c39a0d 1267->1268 1270 c39b55-c39b5b 1268->1270 1293 c39ae6-c39b3e call c38f2e call bf2eb5 1290->1293 1294 c39b45-c39b4b call bf2eb5 1290->1294 1291->1268 1304 c39b43 1293->1304 1303 c39b4d-c39b53 1294->1303 1303->1270 1304->1303
                                                      APIs
                                                        • Part of subcall function 00BE4A8C: _fseek.LIBCMT ref: 00BE4AA4
                                                        • Part of subcall function 00C39B5E: _wcscmp.LIBCMT ref: 00C39C4E
                                                        • Part of subcall function 00C39B5E: _wcscmp.LIBCMT ref: 00C39C61
                                                      • _free.LIBCMT ref: 00C39ACC
                                                      • _free.LIBCMT ref: 00C39AD3
                                                      • _free.LIBCMT ref: 00C39B3E
                                                        • Part of subcall function 00BF2EB5: RtlFreeHeap.NTDLL(00000000,00000000,?,00BF9B84,00000000,00BF8C8D,00BF58F3), ref: 00BF2EC9
                                                        • Part of subcall function 00BF2EB5: GetLastError.KERNEL32(00000000,?,00BF9B84,00000000,00BF8C8D,00BF58F3), ref: 00BF2EDB
                                                      • _free.LIBCMT ref: 00C39B46
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                      • String ID: >>>AUTOIT SCRIPT<<<
                                                      • API String ID: 1552873950-2806939583
                                                      • Opcode ID: ecafd9310dd983bbeb8adcd2252de880fbd7cdbd4eade2512aabe00627e8cc70
                                                      • Instruction ID: 6da2aa3bebdc17562cb42a7eda6b0dbdd1bd4555710a123639d1fb035e858a99
                                                      • Opcode Fuzzy Hash: ecafd9310dd983bbeb8adcd2252de880fbd7cdbd4eade2512aabe00627e8cc70
                                                      • Instruction Fuzzy Hash: FF5149B1D14258ABDF24DF65DC81AAEBBB9FF48304F1001AEB609A3241DB715E848F58
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                      • String ID:
                                                      • API String ID: 1559183368-0
                                                      • Opcode ID: 6144165ff69bcfd719b70aa37aa99b766954ae34ab2424f86f42b6890169cbb7
                                                      • Instruction ID: b3beefcd7839398e26d3f6a67575a2817ac1e91e17bae4fdb093a8e2249ca9b6
                                                      • Opcode Fuzzy Hash: 6144165ff69bcfd719b70aa37aa99b766954ae34ab2424f86f42b6890169cbb7
                                                      • Instruction Fuzzy Hash: 8151A170A00A0DEBDF349F69C88067EB7E6EF50320F2486A9EB35972D0D7709D588B40
                                                      APIs
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00BD52E6
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00BD534A
                                                      • TranslateMessage.USER32(?), ref: 00BD5356
                                                      • DispatchMessageW.USER32(?), ref: 00BD5360
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Message$Peek$DispatchTranslate
                                                      • String ID:
                                                      • API String ID: 1795658109-0
                                                      • Opcode ID: ced721ca5b6734a327e5c9fabb7fffe23452c6b884869e38804f552e90fe3d9d
                                                      • Instruction ID: e2c390b768e479e74724542d73cb6aa182b44270995bd884b4bf72ef5d202019
                                                      • Opcode Fuzzy Hash: ced721ca5b6734a327e5c9fabb7fffe23452c6b884869e38804f552e90fe3d9d
                                                      • Instruction Fuzzy Hash: 0031CB70504B059BEB30CBA4DC88FBEB7E89B11354F2400ABE423973D1E7B4A989D755
                                                      APIs
                                                      • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00BD1275,SwapMouseButtons,00000004,?), ref: 00BD12A8
                                                      • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00BD1275,SwapMouseButtons,00000004,?), ref: 00BD12C9
                                                      • RegCloseKey.KERNEL32(00000000,?,?,?,80000001,80000001,?,00BD1275,SwapMouseButtons,00000004,?), ref: 00BD12EB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID: Control Panel\Mouse
                                                      • API String ID: 3677997916-824357125
                                                      • Opcode ID: 2f42124e944f387a34ec3114134af01ec61602f365a4eeecaa94b356c8270bb9
                                                      • Instruction ID: da5dbecb14f8ddf33d3b672c2700fa23aee707485c5ae63ffeb0d8b36dba527f
                                                      • Opcode Fuzzy Hash: 2f42124e944f387a34ec3114134af01ec61602f365a4eeecaa94b356c8270bb9
                                                      • Instruction Fuzzy Hash: FD115E71515208BFDB208FA9DC84EAFB7FCEF04750F1049AAF805E7210E2719E4097A4
                                                      APIs
                                                      • GetFileAttributesW.KERNEL32(?,00C62C4C), ref: 00C33DC4
                                                      • GetLastError.KERNEL32 ref: 00C33DD3
                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00C33DE2
                                                      • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00C62C4C), ref: 00C33E3F
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectory$AttributesErrorFileLast
                                                      • String ID:
                                                      • API String ID: 2267087916-0
                                                      • Opcode ID: dfb2583ef9b075782ade3e2d93d5cc8fa6f559a0893afdc1020d171c2b07de91
                                                      • Instruction ID: 555d3a04d0924b79a3c435a76e53756c2782eb4287bfc8f75a4e0528de8ceee2
                                                      • Opcode Fuzzy Hash: dfb2583ef9b075782ade3e2d93d5cc8fa6f559a0893afdc1020d171c2b07de91
                                                      • Instruction Fuzzy Hash: D021B0705182419FC710EF29C8819AFB7E4FE59764F204A5DF4A9C72A2DB30DA4ACB52
                                                      APIs
                                                      • _memset.LIBCMT ref: 00BE5B58
                                                        • Part of subcall function 00BE56F8: _memset.LIBCMT ref: 00BE5787
                                                        • Part of subcall function 00BE56F8: _wcscpy.LIBCMT ref: 00BE57DB
                                                        • Part of subcall function 00BE56F8: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00BE57EB
                                                      • KillTimer.USER32(?,00000001,?,?), ref: 00BE5BAD
                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00BE5BBC
                                                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00C20CFC
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                      • String ID:
                                                      • API String ID: 1378193009-0
                                                      • Opcode ID: 9d0683573905788f2cf09426023db2043aa22954759e933bf659d32b4a78d34f
                                                      • Instruction ID: 3e2bd4b3fc1f7c01eae9bab90a935311fb34db1a8494437fd2ee0f5c0162e1ae
                                                      • Opcode Fuzzy Hash: 9d0683573905788f2cf09426023db2043aa22954759e933bf659d32b4a78d34f
                                                      • Instruction Fuzzy Hash: CC21CCB05047949FE7728B35DC95BEBBBECAB01308F1405CEE69E56182C7742984CB51
                                                      APIs
                                                        • Part of subcall function 00BE49C2: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,00BE27AF,?,00000001), ref: 00BE49F4
                                                      • _free.LIBCMT ref: 00C1FA84
                                                      • _free.LIBCMT ref: 00C1FACB
                                                        • Part of subcall function 00BE29BE: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00BE2ADF
                                                      Strings
                                                      • Bad directive syntax error, xrefs: 00C1FAB3
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _free$CurrentDirectoryLibraryLoad
                                                      • String ID: Bad directive syntax error
                                                      • API String ID: 2861923089-2118420937
                                                      • Opcode ID: 9851ceedb24e29550b7bc62cc7f28de069d25cf9548de87e7cd41c3ad285e578
                                                      • Instruction ID: 2dd61ab54978e4ed0828031363abf25798b7d9bff87ccccbeea06aed6aec9f7a
                                                      • Opcode Fuzzy Hash: 9851ceedb24e29550b7bc62cc7f28de069d25cf9548de87e7cd41c3ad285e578
                                                      • Instruction Fuzzy Hash: A7918E71910259AFCF14EFA5C8919EEB7B4FF06310F14447EF816AB2A1DB309A46EB50
                                                      APIs
                                                        • Part of subcall function 00BE4AB2: __fread_nolock.LIBCMT ref: 00BE4AD0
                                                      • _wcscmp.LIBCMT ref: 00C39C4E
                                                      • _wcscmp.LIBCMT ref: 00C39C61
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _wcscmp$__fread_nolock
                                                      • String ID: FILE
                                                      • API String ID: 4029003684-3121273764
                                                      • Opcode ID: b0af1d806486c0ff34f59926bc4e0dbd6d722a0cd4062291ac0926bda3ac5bee
                                                      • Instruction ID: f0555e920a1661ed3a85e180975d6b0f2cea0e220cd35124ff999c6c34e12744
                                                      • Opcode Fuzzy Hash: b0af1d806486c0ff34f59926bc4e0dbd6d722a0cd4062291ac0926bda3ac5bee
                                                      • Instruction Fuzzy Hash: 6F41CB31A402597ADF21ABA5DC45FEFBBFDDF45710F0004B9FA00A7280D7B19A448755
                                                      APIs
                                                      • _memset.LIBCMT ref: 00C202AB
                                                      • GetOpenFileNameW.COMDLG32(?), ref: 00C202F5
                                                        • Part of subcall function 00BF01AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00BE2A58,?,00008000), ref: 00BF01CF
                                                        • Part of subcall function 00BF08F0: GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 00BF090F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Name$Path$FileFullLongOpen_memset
                                                      • String ID: X
                                                      • API String ID: 3777226403-3081909835
                                                      • Opcode ID: 2f7eb9a801f73b5ee46df51279041d5cce232fe79741e54080ff1d7f934bc965
                                                      • Instruction ID: abd453765c0b84e4ba8a13297b6ca49d1aea4dbe3d296a38a6d4b1b37c0bab38
                                                      • Opcode Fuzzy Hash: 2f7eb9a801f73b5ee46df51279041d5cce232fe79741e54080ff1d7f934bc965
                                                      • Instruction Fuzzy Hash: 5D21A170A10298ABCF41EF94C845BEE7BF89F48304F10409AE505A7281DBB45A88CF91
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8663076cf3c1b2a7de32bb2779fc81107e9701abb4d4cbe4b8f3452fa3ebfa7f
                                                      • Instruction ID: 028c88744b07f32af94394c76d5f495dd067cdd15027231ab154ee7a9391d6fe
                                                      • Opcode Fuzzy Hash: 8663076cf3c1b2a7de32bb2779fc81107e9701abb4d4cbe4b8f3452fa3ebfa7f
                                                      • Instruction Fuzzy Hash: ABF128706083019FC714EF29C484A6ABBE5FF88314F14896EF8AA9B351D771E945CF92
                                                      APIs
                                                        • Part of subcall function 00BF06E6: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00BF0717
                                                        • Part of subcall function 00BF06E6: MapVirtualKeyW.USER32(00000010,00000000), ref: 00BF071F
                                                        • Part of subcall function 00BF06E6: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00BF072A
                                                        • Part of subcall function 00BF06E6: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00BF0735
                                                        • Part of subcall function 00BF06E6: MapVirtualKeyW.USER32(00000011,00000000), ref: 00BF073D
                                                        • Part of subcall function 00BF06E6: MapVirtualKeyW.USER32(00000012,00000000), ref: 00BF0745
                                                        • Part of subcall function 00BEFE77: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00BDAC6B), ref: 00BEFED2
                                                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00BDAD08
                                                      • OleInitialize.OLE32(00000000), ref: 00BDAD85
                                                      • CloseHandle.KERNEL32(00000000), ref: 00C12E86
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                      • String ID:
                                                      • API String ID: 1986988660-0
                                                      • Opcode ID: 1e5169910a12f3b504068008cdc6cb3baf07cb3ae6ab848e8973146fa146d5b1
                                                      • Instruction ID: 93b1448702415686ace14a9816fa4c502d1cc8d9fe6cb37a84e63ae711298d41
                                                      • Opcode Fuzzy Hash: 1e5169910a12f3b504068008cdc6cb3baf07cb3ae6ab848e8973146fa146d5b1
                                                      • Instruction Fuzzy Hash: CE8198B09002809E8B94DFBAE99D72D7BE5FB58748720866BE019C73F2EB7185048F55
                                                      APIs
                                                      • _memset.LIBCMT ref: 00BE59F9
                                                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00BE5A9E
                                                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00BE5ABB
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell_$_memset
                                                      • String ID:
                                                      • API String ID: 1505330794-0
                                                      • Opcode ID: 9a2a249602333261dd8eeff03c05aa23ff062d3f03ace756910a8fcd90ea1fa8
                                                      • Instruction ID: d8d404a6bb826df741585bd6e70730490b539290665aceae292734071ada1ed3
                                                      • Opcode Fuzzy Hash: 9a2a249602333261dd8eeff03c05aa23ff062d3f03ace756910a8fcd90ea1fa8
                                                      • Instruction Fuzzy Hash: 8F3173B0505B418FD730DF25D88979BBBF8FB48308F000A7EE59A87291D7756944CB52
                                                      APIs
                                                      • __FF_MSGBANNER.LIBCMT ref: 00BF5883
                                                        • Part of subcall function 00BFA2CB: __NMSG_WRITE.LIBCMT ref: 00BFA2F2
                                                        • Part of subcall function 00BFA2CB: __NMSG_WRITE.LIBCMT ref: 00BFA2FC
                                                      • __NMSG_WRITE.LIBCMT ref: 00BF588A
                                                        • Part of subcall function 00BFA328: GetModuleFileNameW.KERNEL32(00000000,00C943BA,00000104,00000004,00000001,00BF0F33), ref: 00BFA3BA
                                                        • Part of subcall function 00BFA328: ___crtMessageBoxW.LIBCMT ref: 00BFA468
                                                        • Part of subcall function 00BF3201: ___crtCorExitProcess.LIBCMT ref: 00BF3207
                                                        • Part of subcall function 00BF3201: ExitProcess.KERNEL32 ref: 00BF3210
                                                        • Part of subcall function 00BF8C88: __getptd_noexit.LIBCMT ref: 00BF8C88
                                                      • RtlAllocateHeap.NTDLL(01140000,00000000,00000001,?,00000004,?,?,00BF0F33,?), ref: 00BF58AF
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                      • String ID:
                                                      • API String ID: 1372826849-0
                                                      • Opcode ID: e1c5f9ba104dff079ef34bbcf37aeb01787cc0ad4e93b8b94dea63a064bdf862
                                                      • Instruction ID: 4ed6a10893eea503ba8d13c826cb40c5f3e31d4e27adca69e49447d81e6265d0
                                                      • Opcode Fuzzy Hash: e1c5f9ba104dff079ef34bbcf37aeb01787cc0ad4e93b8b94dea63a064bdf862
                                                      • Instruction Fuzzy Hash: 2301F171340B0EABD6342B68EC42B3E63D8DF827A1F2001B6F701AB182DE709C0943B0
                                                      APIs
                                                      • _free.LIBCMT ref: 00C39143
                                                        • Part of subcall function 00BF2EB5: RtlFreeHeap.NTDLL(00000000,00000000,?,00BF9B84,00000000,00BF8C8D,00BF58F3), ref: 00BF2EC9
                                                        • Part of subcall function 00BF2EB5: GetLastError.KERNEL32(00000000,?,00BF9B84,00000000,00BF8C8D,00BF58F3), ref: 00BF2EDB
                                                      • _free.LIBCMT ref: 00C39154
                                                      • _free.LIBCMT ref: 00C39166
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 144f5af94d943480d36d389951f06cd61afa83af8249d10b620ede2dc82f263b
                                                      • Instruction ID: d17c31c063797504c0930c59a8e58ce5cd693daaf62a09ea78f080ec2b4f773d
                                                      • Opcode Fuzzy Hash: 144f5af94d943480d36d389951f06cd61afa83af8249d10b620ede2dc82f263b
                                                      • Instruction Fuzzy Hash: B7E012B5A1560242DA2466786944AA723EC9F48751B24045DBA1AE7243CE74E9458164
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: CALL
                                                      • API String ID: 0-4196123274
                                                      • Opcode ID: a871c04733e2a65f740ac0362c1690cbffa0baafba670ae1b13386e4ba36d0bd
                                                      • Instruction ID: 68c8743f501eeaad272ed54a5b748c84e615b5dc2c51612c6505cf9777b7f0ec
                                                      • Opcode Fuzzy Hash: a871c04733e2a65f740ac0362c1690cbffa0baafba670ae1b13386e4ba36d0bd
                                                      • Instruction Fuzzy Hash: CC323674508241DFDB24DF14C494A6AFBE1FF84304F1489AEE88A9B362E735ED45DB82
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID: EA06
                                                      • API String ID: 4104443479-3962188686
                                                      • Opcode ID: a1a6f4adadd26ae11877fcb9a9021860e32124f15f72ce8bc8a9c766104bae6b
                                                      • Instruction ID: 02f60d50acc9183ca3cb4d1d3895f68e7014bca64bec27cb13343ee99aff2705
                                                      • Opcode Fuzzy Hash: a1a6f4adadd26ae11877fcb9a9021860e32124f15f72ce8bc8a9c766104bae6b
                                                      • Instruction Fuzzy Hash: 82416926A041E89FDF219B6598917BF7FE5CB45310F6840F5E882FB287C7209E84D7A1
                                                      APIs
                                                      • _strcat.LIBCMT ref: 00C4DFD4
                                                        • Part of subcall function 00BD4D37: __itow.LIBCMT ref: 00BD4D62
                                                        • Part of subcall function 00BD4D37: __swprintf.LIBCMT ref: 00BD4DAC
                                                      • _wcscpy.LIBCMT ref: 00C4E063
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: __itow__swprintf_strcat_wcscpy
                                                      • String ID:
                                                      • API String ID: 1012013722-0
                                                      • Opcode ID: d536131c554a44495d32d8c0660b2817ed2bad08196fa3d5544beef2cca58df2
                                                      • Instruction ID: 265348cee0963877bec31621d6f1a1fef89a8b0ac19f52fe5ed800d7e08632ac
                                                      • Opcode Fuzzy Hash: d536131c554a44495d32d8c0660b2817ed2bad08196fa3d5544beef2cca58df2
                                                      • Instruction Fuzzy Hash: 6B911835A00504DFCB28EF18C5959ADB7F5FF59310B5584AAE81A9F362EB30ED05CB81
                                                      APIs
                                                      • IsThemeActive.UXTHEME ref: 00BE5FEF
                                                        • Part of subcall function 00BF34CE: __lock.LIBCMT ref: 00BF34D4
                                                        • Part of subcall function 00BF34CE: DecodePointer.KERNEL32(00000001,?,00BE6004,00C28675), ref: 00BF34E0
                                                        • Part of subcall function 00BF34CE: EncodePointer.KERNEL32(?,?,00BE6004,00C28675), ref: 00BF34EB
                                                        • Part of subcall function 00BE5F00: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00BE5F18
                                                        • Part of subcall function 00BE5F00: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00BE5F2D
                                                        • Part of subcall function 00BE5240: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00BE526C
                                                        • Part of subcall function 00BE5240: IsDebuggerPresent.KERNEL32 ref: 00BE527E
                                                        • Part of subcall function 00BE5240: GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 00BE52E6
                                                        • Part of subcall function 00BE5240: SetCurrentDirectoryW.KERNEL32(?), ref: 00BE5366
                                                      • SystemParametersInfoW.USER32(00002001,00000000,?,00000002), ref: 00BE602F
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                      • String ID:
                                                      • API String ID: 1438897964-0
                                                      • Opcode ID: 00adf5b97169dbc913a568218eb0aa2eb87c150bf94bc0fc357c3d30f3054a2a
                                                      • Instruction ID: 7b03e7de0c35704342361895534d5c013dddd3b9267ff3498818661aaf5a5ce7
                                                      • Opcode Fuzzy Hash: 00adf5b97169dbc913a568218eb0aa2eb87c150bf94bc0fc357c3d30f3054a2a
                                                      • Instruction Fuzzy Hash: BD116A719183419BC710DF6AEC49A0EFBE8EF98750F00465BF044972A2DBB0A948CB92
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,00000080,00000000,00000000,?,?,00BE3E72,?,?,?,00000000), ref: 00BE4327
                                                      • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,00000000,?,?,00BE3E72,?,?,?,00000000), ref: 00C20697
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: 185722ab098acf41a3dac88831b43f0c3c084b4cbde8cd899887ce6b0d9ac3c2
                                                      • Instruction ID: 28d99dbc5d8352a7853f264e69bc33f3f282f46bdb8621e4d49f9b3ee9bd8637
                                                      • Opcode Fuzzy Hash: 185722ab098acf41a3dac88831b43f0c3c084b4cbde8cd899887ce6b0d9ac3c2
                                                      • Instruction Fuzzy Hash: F201B570244348BEF3301E25CC8AF6A7ADCEB06769F20C359FAE56A1E0C7B45C458B18
                                                      APIs
                                                        • Part of subcall function 00BF586C: __FF_MSGBANNER.LIBCMT ref: 00BF5883
                                                        • Part of subcall function 00BF586C: __NMSG_WRITE.LIBCMT ref: 00BF588A
                                                        • Part of subcall function 00BF586C: RtlAllocateHeap.NTDLL(01140000,00000000,00000001,?,00000004,?,?,00BF0F33,?), ref: 00BF58AF
                                                      • std::exception::exception.LIBCMT ref: 00BF0F4C
                                                      • __CxxThrowException@8.LIBCMT ref: 00BF0F61
                                                        • Part of subcall function 00BF86FB: RaiseException.KERNEL32(?,?,?,00C8AE78,?,?,?,?,?,00BF0F66,?,00C8AE78,?,00000001), ref: 00BF8750
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                      • String ID:
                                                      • API String ID: 3902256705-0
                                                      • Opcode ID: 0d1371ffbe81a5504be4bd9e4a2ca14db154c4706e0d72c11e150bd654fdaad6
                                                      • Instruction ID: ec59daf910bbd92d826a58ca71728f5a010fb566f3273f66560e871b5fc990b1
                                                      • Opcode Fuzzy Hash: 0d1371ffbe81a5504be4bd9e4a2ca14db154c4706e0d72c11e150bd654fdaad6
                                                      • Instruction Fuzzy Hash: 03F0A47151820D66DF30BA58DC019FE7BE8DF01350F5004A6FE1497192EF718B58C2D5
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: __lock_file_memset
                                                      • String ID:
                                                      • API String ID: 26237723-0
                                                      • Opcode ID: c6eb0621c2c456596263f4f712ab6961b5af37988382eafe2d5c8952dc4ab174
                                                      • Instruction ID: f8a3dc1d399d4d13f0e012fd7b83f61550ee6a225bc7a8fc920a0d7c635f5dbc
                                                      • Opcode Fuzzy Hash: c6eb0621c2c456596263f4f712ab6961b5af37988382eafe2d5c8952dc4ab174
                                                      • Instruction Fuzzy Hash: 41015E71800A0CEACF22BF658C014AE7BE1EF50320B144295BB245B151D7718A29DBA1
                                                      APIs
                                                        • Part of subcall function 00BF8C88: __getptd_noexit.LIBCMT ref: 00BF8C88
                                                      • __lock_file.LIBCMT ref: 00BF553B
                                                        • Part of subcall function 00BF6D6E: __lock.LIBCMT ref: 00BF6D91
                                                      • __fclose_nolock.LIBCMT ref: 00BF5546
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                      • String ID:
                                                      • API String ID: 2800547568-0
                                                      • Opcode ID: 3c5eca2dbc11bcdd10b1ca07c8dfd0a7e42a6e800116065d22ca1a149a45de11
                                                      • Instruction ID: 270b9c5d6b305f3c3dbf2d38cbbcf8f8ba2afdb40386906328b26c1531570586
                                                      • Opcode Fuzzy Hash: 3c5eca2dbc11bcdd10b1ca07c8dfd0a7e42a6e800116065d22ca1a149a45de11
                                                      • Instruction Fuzzy Hash: B5F0F031901B0C9ADB20AB65880277E67E2AF10330F148289E724AB1C1CF7C8E099B51
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: SleepTimetime
                                                      • String ID:
                                                      • API String ID: 346578373-0
                                                      • Opcode ID: f2df3922ed4ab4f4d936cfc9dcf0e84f1c8286cba77c7653490c103b23234bda
                                                      • Instruction ID: ff89400491a0e0368f208673841861079b2af4b042802bd3bc5f004ef3c45135
                                                      • Opcode Fuzzy Hash: f2df3922ed4ab4f4d936cfc9dcf0e84f1c8286cba77c7653490c103b23234bda
                                                      • Instruction Fuzzy Hash: D3F05E302406069FC360AB69D445B6AF7E4EB45360F00006AE42AC7351EB60A800CB91
                                                      APIs
                                                      • __lock_file.LIBCMT ref: 00BF5DE4
                                                      • __ftell_nolock.LIBCMT ref: 00BF5DEF
                                                        • Part of subcall function 00BF8C88: __getptd_noexit.LIBCMT ref: 00BF8C88
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: __ftell_nolock__getptd_noexit__lock_file
                                                      • String ID:
                                                      • API String ID: 2999321469-0
                                                      • Opcode ID: 0dc03f16781abcb2a88e2e8e06fefd19b3b9caa292cf2c595747410ec67bfae7
                                                      • Instruction ID: d095b9267b057eb8dcce9909ee50e380d9767be5a788fe5f6dabc21a981fd85c
                                                      • Opcode Fuzzy Hash: 0dc03f16781abcb2a88e2e8e06fefd19b3b9caa292cf2c595747410ec67bfae7
                                                      • Instruction Fuzzy Hash: CBF0A731901A0D9ADB20BB74480277E66D0AF01330F114295F210AB1C1CF784E495655
                                                      APIs
                                                      • _memset.LIBCMT ref: 00BE5AEF
                                                      • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00BE5B1F
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell__memset
                                                      • String ID:
                                                      • API String ID: 928536360-0
                                                      • Opcode ID: 084079c1a727da0df32dcf9a6dafb0c80843c70444be5cef5ceb7ba6b525ca5a
                                                      • Instruction ID: d75bc4c8bc48d6c07bb9bf426680d82a2df721cd8da6da26190043859bff039c
                                                      • Opcode Fuzzy Hash: 084079c1a727da0df32dcf9a6dafb0c80843c70444be5cef5ceb7ba6b525ca5a
                                                      • Instruction Fuzzy Hash: C7F037719043589FDBA29F64DC497AA77BC970130CF0001EAEA48962D6DBB54B88CF55
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleSleep
                                                      • String ID:
                                                      • API String ID: 252777609-0
                                                      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                      • Instruction ID: 0c2e450d7086487d6053be9bdf0dfb75e9746df58feece79fd97e1754c0ab1e1
                                                      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                      • Instruction Fuzzy Hash: D131D678A10109DBCB18EF58C4C0969F7E6FB49300B6486E5EA0ACB666D730EDC5CBC0
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: LoadString$__swprintf
                                                      • String ID:
                                                      • API String ID: 207118244-0
                                                      • Opcode ID: 09f4a2a615e9922cf8c89ca622cecf5dcdcfec618c693997c1e55866ef4dd71b
                                                      • Instruction ID: ab6bf5af51d99cf2fd815ba48a2299abf193035a4d7d4a0f987a5819adfdeeb0
                                                      • Opcode Fuzzy Hash: 09f4a2a615e9922cf8c89ca622cecf5dcdcfec618c693997c1e55866ef4dd71b
                                                      • Instruction Fuzzy Hash: A9B16E35A01109DFCB14EF95D891DFEB7B5FF48710F20815AF926AB2A1EB31AA41CB50
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7c03eda3b5c9ef91a577066b92123074178f762d49d6b7b75f837565a4a164f2
                                                      • Instruction ID: c92015fccb76d722d197a8e44e8f662e4e87f63be230060c9debe6a544189af6
                                                      • Opcode Fuzzy Hash: 7c03eda3b5c9ef91a577066b92123074178f762d49d6b7b75f837565a4a164f2
                                                      • Instruction Fuzzy Hash: AE61DE746002069FDB10DF60C890ABAF7E5EF49310F1580AEED168B391E779ED90DB91
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1dc95ee3ff37f0ae993f09d99398a42158cfab0e2fc933451872ebda849f41c1
                                                      • Instruction ID: 9ce57f20053808348cde53ecde95eac229d97851b9814371f520cea5dc672989
                                                      • Opcode Fuzzy Hash: 1dc95ee3ff37f0ae993f09d99398a42158cfab0e2fc933451872ebda849f41c1
                                                      • Instruction Fuzzy Hash: E751B330600604AFCF14EF68C995EAEB7E5AF45310F1485E9F856AB392DB30EE01DB90
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID:
                                                      • API String ID: 4104443479-0
                                                      • Opcode ID: 6d56029a1d4209a93ccb965244c023c537d6182e3f29dc5323de0a4681017de4
                                                      • Instruction ID: 858c19a1c0878cfcdd49b84d1d862660cf1a46ba22b52fd05b4235fd65a958f8
                                                      • Opcode Fuzzy Hash: 6d56029a1d4209a93ccb965244c023c537d6182e3f29dc5323de0a4681017de4
                                                      • Instruction Fuzzy Hash: A731A175604642DFC724EF1AD494A31F7F0FF08710B54C5A9E98A8B7A5D730E941CB90
                                                      APIs
                                                      • SetFilePointerEx.KERNEL32(00000000,?,00000001,00000000,00000000,00000000,00000000,00000000), ref: 00BE41B2
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: FilePointer
                                                      • String ID:
                                                      • API String ID: 973152223-0
                                                      • Opcode ID: 068b419afdd316c0ac201aa82a3135e237311fd40f535fa60a71028d11f8a079
                                                      • Instruction ID: 223cecc53e6397e3223b6b902e600de89ae53dfa344261b08b580f5ada3fde21
                                                      • Opcode Fuzzy Hash: 068b419afdd316c0ac201aa82a3135e237311fd40f535fa60a71028d11f8a079
                                                      • Instruction Fuzzy Hash: 11316D71A00695AFCF18CF2EC88065DBBF1FF54310F158659E919A3710D770B9A4CB91
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ClearVariant
                                                      • String ID:
                                                      • API String ID: 1473721057-0
                                                      • Opcode ID: f33f7112c783c019535631767d5efbd0231c52ce8edd48d113815a862be537a5
                                                      • Instruction ID: 6c2563c2debe9bddab3cc89a500b4164d3e4f8c7bbe2dbe3110b0a358b9b270f
                                                      • Opcode Fuzzy Hash: f33f7112c783c019535631767d5efbd0231c52ce8edd48d113815a862be537a5
                                                      • Instruction Fuzzy Hash: AA4105745083518FDB24DF14C484B1AFBE1BF45308F1988ADE8999B362D371E885CB92
                                                      APIs
                                                        • Part of subcall function 00BE4B29: FreeLibrary.KERNEL32(00000000,?), ref: 00BE4B63
                                                        • Part of subcall function 00BF53AB: __wfsopen.LIBCMT ref: 00BF53B6
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,00BE27AF,?,00000001), ref: 00BE49F4
                                                        • Part of subcall function 00BE4ADE: FreeLibrary.KERNEL32(00000000), ref: 00BE4B18
                                                        • Part of subcall function 00BE48B0: _memmove.LIBCMT ref: 00BE48FA
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Library$Free$Load__wfsopen_memmove
                                                      • String ID:
                                                      • API String ID: 1396898556-0
                                                      • Opcode ID: 7478155373f1246825f46758d1bd71940d6859e517c4aa117e30c69cbc701bff
                                                      • Instruction ID: e41ebe9725bf8339de472ba54fcd9c514e1dbe778ac6c57cd51ccc49107b24ad
                                                      • Opcode Fuzzy Hash: 7478155373f1246825f46758d1bd71940d6859e517c4aa117e30c69cbc701bff
                                                      • Instruction Fuzzy Hash: DE11E731650249ABCF20FB71CC52FAE77E9DF40711F20447DF541A6182EFB09A01A798
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID:
                                                      • API String ID: 4104443479-0
                                                      • Opcode ID: ed768318928ad9db74eb72ab79bc14ac0b3ac671dc733207cff94445e1afad0c
                                                      • Instruction ID: 3bf76b8cd2162c7b92df268d45a348667e8e975dff1470fd27ca75f2349c1377
                                                      • Opcode Fuzzy Hash: ed768318928ad9db74eb72ab79bc14ac0b3ac671dc733207cff94445e1afad0c
                                                      • Instruction Fuzzy Hash: 27113A76604605DFC724DF2DD481926B7E9FF48314B20886EE58ACB361E732E841CB50
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ClearVariant
                                                      • String ID:
                                                      • API String ID: 1473721057-0
                                                      • Opcode ID: aa750016fef5e847d702303214cfede48be5bc9c96d41ed5888f189befab0904
                                                      • Instruction ID: b800e22b01c64313942159b98659973c8b64d60c860c23bab1f9b48182b423aa
                                                      • Opcode Fuzzy Hash: aa750016fef5e847d702303214cfede48be5bc9c96d41ed5888f189befab0904
                                                      • Instruction Fuzzy Hash: 572114B4508301DFDB24DF54C484B5ABBE1BF85304F0589ADF98A5B762D731E849CB92
                                                      APIs
                                                      • ReadFile.KERNEL32(00000000,?,00010000,00000000,00000000,00000000,00000000,00010000,?,00BE3CF8,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00BE4276
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: FileRead
                                                      • String ID:
                                                      • API String ID: 2738559852-0
                                                      • Opcode ID: 5a65f52fd78621cdfbb62684e981188c9394801424bfa263d28557e731169acf
                                                      • Instruction ID: 600b5067838948a1db565b80fdcd5ea90b92d50f440b25a69755a323af61b2e2
                                                      • Opcode Fuzzy Hash: 5a65f52fd78621cdfbb62684e981188c9394801424bfa263d28557e731169acf
                                                      • Instruction Fuzzy Hash: 33114831210B419FD730CF56C880B66B7F9EF88710F10C96EEAAA86A50D7B0F845CB60
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID:
                                                      • API String ID: 4104443479-0
                                                      • Opcode ID: dd033a4b5f62ccebfd9eaf5dbbb8866036393a442bcaa3bfcd9f8478fa996b83
                                                      • Instruction ID: c5a6914e7724da62f57e11b52895a9f91b52af6eb60b11119f9a3b96f273a0e3
                                                      • Opcode Fuzzy Hash: dd033a4b5f62ccebfd9eaf5dbbb8866036393a442bcaa3bfcd9f8478fa996b83
                                                      • Instruction Fuzzy Hash: 3201DB732117056ED7245F29DC02A77B7D4DB44790F108979F62ACB1D1DB71E4448750
                                                      APIs
                                                        • Part of subcall function 00BF0F16: std::exception::exception.LIBCMT ref: 00BF0F4C
                                                        • Part of subcall function 00BF0F16: __CxxThrowException@8.LIBCMT ref: 00BF0F61
                                                      • _memset.LIBCMT ref: 00C37B21
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Exception@8Throw_memsetstd::exception::exception
                                                      • String ID:
                                                      • API String ID: 525207782-0
                                                      • Opcode ID: e42b1121e6369a617172214c458a3cdaa519a43f438b417090ec007e3c826baf
                                                      • Instruction ID: e81f388d83a02f6a0ab53936414fb6e85fc3a49c61648b0b1774b8df03bc067e
                                                      • Opcode Fuzzy Hash: e42b1121e6369a617172214c458a3cdaa519a43f438b417090ec007e3c826baf
                                                      • Instruction Fuzzy Hash: 190119742142049FD325EF5CD441F12BBF1AF59310F24C49AF6888B3A2DB72E8008F90
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _fseek
                                                      • String ID:
                                                      • API String ID: 2937370855-0
                                                      • Opcode ID: 0a4098fbca966de150df0e901f011b960a22b5df12848eeca8f12985b6aae40b
                                                      • Instruction ID: 58b97c3c63223da579a42efc126d85adc2d1eadda40aae70b9e9d50dca05e143
                                                      • Opcode Fuzzy Hash: 0a4098fbca966de150df0e901f011b960a22b5df12848eeca8f12985b6aae40b
                                                      • Instruction Fuzzy Hash: 63F085B6400208BFCF148F85EC40CEBBBB9EB85320F1040A8FA045A211D372EA25DBA0
                                                      APIs
                                                      • FreeLibrary.KERNEL32(?,?,?,00BE27AF,?,00000001), ref: 00BE4A63
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID:
                                                      • API String ID: 3664257935-0
                                                      • Opcode ID: 168221f427002cfd82398f6d13058c6446c53118a8456d4a15765baee94b9aa2
                                                      • Instruction ID: 2bd7c122cb509ba5f741c2bc442968371401429c09bf7a548663862c8f6a928b
                                                      • Opcode Fuzzy Hash: 168221f427002cfd82398f6d13058c6446c53118a8456d4a15765baee94b9aa2
                                                      • Instruction Fuzzy Hash: 43F01571145751CFCB349F66E89082ABBF4EF14326320A9BEE6D683610C7719884DF44
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: __fread_nolock
                                                      • String ID:
                                                      • API String ID: 2638373210-0
                                                      • Opcode ID: c46de0973e4316ba83ebc5d8e55475f12f35eb36bfefe38a98de0559b640b685
                                                      • Instruction ID: ca35105b008fa91992e2fca5029e9817b726cfaeeb75a622d02216f7b7e02a2b
                                                      • Opcode Fuzzy Hash: c46de0973e4316ba83ebc5d8e55475f12f35eb36bfefe38a98de0559b640b685
                                                      • Instruction Fuzzy Hash: B2F0F87250020DFFDF05DF90C941EAABBB9FB14314F208599F9148B251D336DA61AB91
                                                      APIs
                                                      • GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 00BF090F
                                                        • Part of subcall function 00BE1821: _memmove.LIBCMT ref: 00BE185B
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: LongNamePath_memmove
                                                      • String ID:
                                                      • API String ID: 2514874351-0
                                                      • Opcode ID: b4ab3647f5821b11b153755598b221537cd0115f93eca04966fa0cc1e1994819
                                                      • Instruction ID: 836840a31720ffdffd446837e75403cb9e99b5cd52d358fd23e914fdd140ab1c
                                                      • Opcode Fuzzy Hash: b4ab3647f5821b11b153755598b221537cd0115f93eca04966fa0cc1e1994819
                                                      • Instruction Fuzzy Hash: 21E08632A001285BC721D6999C05FEEB7DDDB88791F1401B6FD09D7354DA605C818691
                                                      APIs
                                                      • SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?), ref: 00C34B9E
                                                        • Part of subcall function 00BE1821: _memmove.LIBCMT ref: 00BE185B
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: FolderPath_memmove
                                                      • String ID:
                                                      • API String ID: 3334745507-0
                                                      • Opcode ID: f527950baf8348831c34600d21909504bb32891ae56ef13939b7d9d090365ac2
                                                      • Instruction ID: 517c71545962d719ab29338e6cd9d067f209768fe39b69da73309d51991af691
                                                      • Opcode Fuzzy Hash: f527950baf8348831c34600d21909504bb32891ae56ef13939b7d9d090365ac2
                                                      • Instruction Fuzzy Hash: BBD05EB190032C2BDB70E6A99C0DEBB7BACD744220F000AE1BC5CD3101EE749D4586E0
                                                      APIs
                                                        • Part of subcall function 00C336B9: SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000001,00000000,00000000,00C337C6,00000000,00000000,?,00C2055B,00C86590,00000002,?,?), ref: 00C33737
                                                      • WriteFile.KERNEL32(00000000,?,?,?,00000000,00000000,00000000,?,00C2055B,00C86590,00000002,?,?,?,00000000), ref: 00C337D4
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: File$PointerWrite
                                                      • String ID:
                                                      • API String ID: 539440098-0
                                                      • Opcode ID: e69380a12260aeb6190e6e2ecc512e3e52edd7df676599a265659853650da83e
                                                      • Instruction ID: 19cf6dcc813d8dcd1cb1c12e7748b5dc38329e30c6a9eaa35a642309af74caaa
                                                      • Opcode Fuzzy Hash: e69380a12260aeb6190e6e2ecc512e3e52edd7df676599a265659853650da83e
                                                      • Instruction Fuzzy Hash: CEE0B636410218BFDB20AF95D805B9AB7FDEB05320F104A5AFD4096151DBB2AE24ABE5
                                                      APIs
                                                      • CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00C33CEA,?,?,?), ref: 00C33D7A
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CopyFile
                                                      • String ID:
                                                      • API String ID: 1304948518-0
                                                      • Opcode ID: 8cd1ece7a5618aa3b42bb8797663fa93696acea93f8ab04465af6f8abf71ce43
                                                      • Instruction ID: 730cad3fc67d5f04fa23595e2200f886f00ecdab366910b66fcefd61da5e148a
                                                      • Opcode Fuzzy Hash: 8cd1ece7a5618aa3b42bb8797663fa93696acea93f8ab04465af6f8abf71ce43
                                                      • Instruction Fuzzy Hash: 19D0A7315E020CBBEF60DFA0CC06F69B7ACEB01706F2002E4F604E90E0DAB269149795
                                                      APIs
                                                      • SetFilePointerEx.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,?,00C20666,00000000,00000000,00000000), ref: 00BE42BF
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: FilePointer
                                                      • String ID:
                                                      • API String ID: 973152223-0
                                                      • Opcode ID: a8cf55f8e09858c82eb0d3fe097fdac145a774e96406a48cf49b5a080301bbd6
                                                      • Instruction ID: 0ccd220b4348d28bb45fdbbe3977ae6b2d57b07c8265687bec60d627a828282e
                                                      • Opcode Fuzzy Hash: a8cf55f8e09858c82eb0d3fe097fdac145a774e96406a48cf49b5a080301bbd6
                                                      • Instruction Fuzzy Hash: 50D0C97464020CBFEB10CB81DC46FAEBBBCEB05710F200294FE04A6290E6F27E508B95
                                                      APIs
                                                      • GetFileAttributesW.KERNEL32(?,00C33A6B), ref: 00C34E5A
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: 010df5da13c0d64bf16a87b1febbc5b3e1c64e7b5a3b7fd970a1f147b8a892f6
                                                      • Instruction ID: e8906dc8155650f9a6054095b5336bab61804a4251029a2bf2ecb6d15a8dbbb4
                                                      • Opcode Fuzzy Hash: 010df5da13c0d64bf16a87b1febbc5b3e1c64e7b5a3b7fd970a1f147b8a892f6
                                                      • Instruction Fuzzy Hash: 62B09224020610469D6C0A79590829E73406A837A9FE81B80D874958E2827DAD4BA610
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: __wfsopen
                                                      • String ID:
                                                      • API String ID: 197181222-0
                                                      • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                      • Instruction ID: 481c989826762bb5c063d122f85f5f9eb069b7b0b512ba6af17f4f44622cdc68
                                                      • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                      • Instruction Fuzzy Hash: A0B0927644020C77CE112A86EC02A593F999B406A8F408060FB0C19162A6B3A6649689
                                                      APIs
                                                      • GetLastError.KERNEL32(00000002,00000000), ref: 00C3D6AF
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast
                                                      • String ID:
                                                      • API String ID: 1452528299-0
                                                      • Opcode ID: 88cfbe05bf3a237b16342b5b2b857f642d55e4430039ba50857b374b7aeacb8e
                                                      • Instruction ID: 9cee5575dd48da7c433360c858021239f4fc31d58c3c5b1845d234520969d1be
                                                      • Opcode Fuzzy Hash: 88cfbe05bf3a237b16342b5b2b857f642d55e4430039ba50857b374b7aeacb8e
                                                      • Instruction Fuzzy Hash: DF7191302143428FC714EF29D491A6EB7E1EF89314F14496DF5A68B3A2DB30EE49CB52
                                                      APIs
                                                        • Part of subcall function 00C33E72: FindFirstFileW.KERNEL32(?,?), ref: 00C33EE9
                                                        • Part of subcall function 00C33E72: DeleteFileW.KERNEL32(?,?,?,?), ref: 00C33F39
                                                        • Part of subcall function 00C33E72: FindNextFileW.KERNEL32(00000000,00000010), ref: 00C33F4A
                                                        • Part of subcall function 00C33E72: FindClose.KERNEL32(00000000), ref: 00C33F61
                                                      • GetLastError.KERNEL32 ref: 00C3C0FF
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: FileFind$CloseDeleteErrorFirstLastNext
                                                      • String ID:
                                                      • API String ID: 2191629493-0
                                                      • Opcode ID: 6069332c15cf9682c325540633ca62067977ee805d7979dfb0471ae9ad06835d
                                                      • Instruction ID: 207b674aaf5a727ea07fede00023f792f9f7c3969976b8b6d4fb0a6867362771
                                                      • Opcode Fuzzy Hash: 6069332c15cf9682c325540633ca62067977ee805d7979dfb0471ae9ad06835d
                                                      • Instruction Fuzzy Hash: 10F0A0362106148FCB14EF59D854F6EB7E5EF88320F1484AAF90A9B352CB74BD01CB90
                                                      APIs
                                                      • CloseHandle.KERNEL32(?,?,00000000,00C12EBB), ref: 00BE42EF
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CloseHandle
                                                      • String ID:
                                                      • API String ID: 2962429428-0
                                                      • Opcode ID: a13cecdf7caf6742772528f9127c7f9f7a60f0fed9a0069b898090b687847369
                                                      • Instruction ID: 296f28168ddd6a2759c9875bc94d063a5431325e3904abc30fb1dd819c245d97
                                                      • Opcode Fuzzy Hash: a13cecdf7caf6742772528f9127c7f9f7a60f0fed9a0069b898090b687847369
                                                      • Instruction Fuzzy Hash: 1AE09275410B41CFC3324F1BE804426FBE4FFE13613214A6EE1E692660D3B0589A8B50
                                                      APIs
                                                        • Part of subcall function 00BD29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BD29F3
                                                      • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00C5CF5A
                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00C5CFB8
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00C5CFF9
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00C5D023
                                                      • SendMessageW.USER32 ref: 00C5D04C
                                                      • _wcsncpy.LIBCMT ref: 00C5D0B8
                                                      • GetKeyState.USER32(00000011), ref: 00C5D0D9
                                                      • GetKeyState.USER32(00000009), ref: 00C5D0E6
                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00C5D0FC
                                                      • GetKeyState.USER32(00000010), ref: 00C5D106
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00C5D12F
                                                      • SendMessageW.USER32 ref: 00C5D156
                                                      • SendMessageW.USER32(?,00001030,?,00C5B735), ref: 00C5D25A
                                                      • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00C5D270
                                                      • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00C5D283
                                                      • SetCapture.USER32(?), ref: 00C5D28C
                                                      • ClientToScreen.USER32(?,?), ref: 00C5D2F1
                                                      • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00C5D2FE
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00C5D318
                                                      • ReleaseCapture.USER32 ref: 00C5D323
                                                      • GetCursorPos.USER32(?), ref: 00C5D35D
                                                      • ScreenToClient.USER32(?,?), ref: 00C5D36A
                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 00C5D3C6
                                                      • SendMessageW.USER32 ref: 00C5D3F4
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00C5D431
                                                      • SendMessageW.USER32 ref: 00C5D460
                                                      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00C5D481
                                                      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00C5D490
                                                      • GetCursorPos.USER32(?), ref: 00C5D4B0
                                                      • ScreenToClient.USER32(?,?), ref: 00C5D4BD
                                                      • GetParent.USER32(?), ref: 00C5D4DD
                                                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 00C5D546
                                                      • SendMessageW.USER32 ref: 00C5D577
                                                      • ClientToScreen.USER32(?,?), ref: 00C5D5D5
                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00C5D605
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00C5D62F
                                                      • SendMessageW.USER32 ref: 00C5D652
                                                      • ClientToScreen.USER32(?,?), ref: 00C5D6A4
                                                      • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00C5D6D8
                                                        • Part of subcall function 00BD29AB: GetWindowLongW.USER32(?,000000EB), ref: 00BD29BC
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00C5D774
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                      • String ID: @GUI_DRAGID$F
                                                      • API String ID: 3977979337-4164748364
                                                      • Opcode ID: d326981a6e3e9ff309c5807f23e45b1f19941bbfd9fe18cca924ef6f77a8dee8
                                                      • Instruction ID: a0af94b33362cd7b36515b030806234f7fa0665fc786dcfb13da0fc9afe70f16
                                                      • Opcode Fuzzy Hash: d326981a6e3e9ff309c5807f23e45b1f19941bbfd9fe18cca924ef6f77a8dee8
                                                      • Instruction Fuzzy Hash: 3642C2381043409FDB20CF64C888F6ABBE5FF48351F144A19FA6A972E1D771E998CB95
                                                      APIs
                                                        • Part of subcall function 00C2917C: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00C291C6
                                                        • Part of subcall function 00C2917C: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00C291F3
                                                        • Part of subcall function 00C2917C: GetLastError.KERNEL32 ref: 00C29200
                                                      • _memset.LIBCMT ref: 00C28D54
                                                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00C28DA6
                                                      • CloseHandle.KERNEL32(?), ref: 00C28DB7
                                                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00C28DCE
                                                      • GetProcessWindowStation.USER32 ref: 00C28DE7
                                                      • SetProcessWindowStation.USER32(00000000), ref: 00C28DF1
                                                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00C28E0B
                                                        • Part of subcall function 00C28BCC: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00C28D0A), ref: 00C28BE1
                                                        • Part of subcall function 00C28BCC: CloseHandle.KERNEL32(?,?,00C28D0A), ref: 00C28BF3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                      • String ID: $default$winsta0
                                                      • API String ID: 2063423040-1027155976
                                                      • Opcode ID: e0d687106f6b6ad4444a0bdc7a77161f539f0996504f4fa1cece625f226c9ee2
                                                      • Instruction ID: e112579267a2e2c68c0625d63a33ede099d6c0a03151141564e75373b246e6cb
                                                      • Opcode Fuzzy Hash: e0d687106f6b6ad4444a0bdc7a77161f539f0996504f4fa1cece625f226c9ee2
                                                      • Instruction Fuzzy Hash: E0818C71801219AFDF11DFA4ED45BEE7BB9EF04304F144159F921B26A1DBB18E58DB20
                                                      APIs
                                                      • OpenClipboard.USER32(00C60980), ref: 00C44440
                                                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 00C4444E
                                                      • GetClipboardData.USER32(0000000D), ref: 00C44456
                                                      • CloseClipboard.USER32 ref: 00C44462
                                                      • GlobalLock.KERNEL32(00000000), ref: 00C4447E
                                                      • CloseClipboard.USER32 ref: 00C44488
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00C4449D
                                                      • IsClipboardFormatAvailable.USER32(00000001), ref: 00C444AA
                                                      • GetClipboardData.USER32(00000001), ref: 00C444B2
                                                      • GlobalLock.KERNEL32(00000000), ref: 00C444BF
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00C444F3
                                                      • CloseClipboard.USER32 ref: 00C44603
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                      • String ID:
                                                      • API String ID: 3222323430-0
                                                      • Opcode ID: d6bc0374c6fd7ca74775e595954eb31f572cd5296496505738880e4d19c628a4
                                                      • Instruction ID: d14f96f085150718d35cbcba1e442c4100f9b2be24593206ff90795a991ab793
                                                      • Opcode Fuzzy Hash: d6bc0374c6fd7ca74775e595954eb31f572cd5296496505738880e4d19c628a4
                                                      • Instruction Fuzzy Hash: 2C51EF31204201ABD714EF65DC8AF6F73A8BF84B41F200829F956E22E1DFB0D905CB22
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00C3CC3D
                                                      • FindClose.KERNEL32(00000000), ref: 00C3CC91
                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00C3CCB6
                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00C3CCCD
                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00C3CCF4
                                                      • __swprintf.LIBCMT ref: 00C3CD40
                                                      • __swprintf.LIBCMT ref: 00C3CD83
                                                        • Part of subcall function 00BE1A36: _memmove.LIBCMT ref: 00BE1A77
                                                      • __swprintf.LIBCMT ref: 00C3CDD7
                                                        • Part of subcall function 00BF37FA: __woutput_l.LIBCMT ref: 00BF3853
                                                      • __swprintf.LIBCMT ref: 00C3CE25
                                                        • Part of subcall function 00BF37FA: __flsbuf.LIBCMT ref: 00BF3875
                                                        • Part of subcall function 00BF37FA: __flsbuf.LIBCMT ref: 00BF388D
                                                      • __swprintf.LIBCMT ref: 00C3CE74
                                                      • __swprintf.LIBCMT ref: 00C3CEC3
                                                      • __swprintf.LIBCMT ref: 00C3CF12
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                      • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                      • API String ID: 3953360268-2428617273
                                                      • Opcode ID: e68c5c31c85136a2cf219b1833af7a38127d11d8ba2d954cadcc6caacb3c2c78
                                                      • Instruction ID: 52380bdb32270b6ed58854a0dcb5035052d7e3e9a1eea71997901419f933adf0
                                                      • Opcode Fuzzy Hash: e68c5c31c85136a2cf219b1833af7a38127d11d8ba2d954cadcc6caacb3c2c78
                                                      • Instruction Fuzzy Hash: BBA12DB1404244ABC710EFA5D986EAFB7ECEF94704F40496AF595D7291EB30DE08CB62
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 00C3F466
                                                      • _wcscmp.LIBCMT ref: 00C3F47B
                                                      • _wcscmp.LIBCMT ref: 00C3F492
                                                      • GetFileAttributesW.KERNEL32(?), ref: 00C3F4A4
                                                      • SetFileAttributesW.KERNEL32(?,?), ref: 00C3F4BE
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00C3F4D6
                                                      • FindClose.KERNEL32(00000000), ref: 00C3F4E1
                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00C3F4FD
                                                      • _wcscmp.LIBCMT ref: 00C3F524
                                                      • _wcscmp.LIBCMT ref: 00C3F53B
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00C3F54D
                                                      • SetCurrentDirectoryW.KERNEL32(00C898F8), ref: 00C3F56B
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C3F575
                                                      • FindClose.KERNEL32(00000000), ref: 00C3F582
                                                      • FindClose.KERNEL32(00000000), ref: 00C3F594
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                      • String ID: *.*
                                                      • API String ID: 1803514871-438819550
                                                      • Opcode ID: 7dc644032e94932c383e21b0490cc50eb1cf91e3117cf36b592c14337465270d
                                                      • Instruction ID: a26e9679596269e4f7a67c2874510a65c3e6ca24c55c1f62be96b7229ef27877
                                                      • Opcode Fuzzy Hash: 7dc644032e94932c383e21b0490cc50eb1cf91e3117cf36b592c14337465270d
                                                      • Instruction Fuzzy Hash: AB31A23190021D7ADB20EFA5DC49BEF77ACAF09320F1409B9F925E3190EB74DA458B64
                                                      APIs
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C50D7B
                                                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,00C60980,00000000,?,00000000,?,?), ref: 00C50DE9
                                                      • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00C50E31
                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00C50EBA
                                                      • RegCloseKey.ADVAPI32(?), ref: 00C511DA
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00C511E7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Close$ConnectCreateRegistryValue
                                                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                      • API String ID: 536824911-966354055
                                                      • Opcode ID: 3c52036ebefdabeb648dea72d39973d821390cd1144997a4c2c07e08f9a59544
                                                      • Instruction ID: a8abdb928e35b006c6a4c999130776497ee84edc30c8d75e15e30b64cb1d7885
                                                      • Opcode Fuzzy Hash: 3c52036ebefdabeb648dea72d39973d821390cd1144997a4c2c07e08f9a59544
                                                      • Instruction Fuzzy Hash: F0028D75200A019FCB14EF25C845E2AB7E5FF88314F1489ADF95A9B3A2DB30ED45CB85
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 00C3F5C3
                                                      • _wcscmp.LIBCMT ref: 00C3F5D8
                                                      • _wcscmp.LIBCMT ref: 00C3F5EF
                                                        • Part of subcall function 00C346E2: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00C346FD
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00C3F61E
                                                      • FindClose.KERNEL32(00000000), ref: 00C3F629
                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00C3F645
                                                      • _wcscmp.LIBCMT ref: 00C3F66C
                                                      • _wcscmp.LIBCMT ref: 00C3F683
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00C3F695
                                                      • SetCurrentDirectoryW.KERNEL32(00C898F8), ref: 00C3F6B3
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C3F6BD
                                                      • FindClose.KERNEL32(00000000), ref: 00C3F6CA
                                                      • FindClose.KERNEL32(00000000), ref: 00C3F6DC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                      • String ID: *.*
                                                      • API String ID: 1824444939-438819550
                                                      • Opcode ID: c61cee3f5b822e8f73f01f76299548406a27556c3b95f4a81b473e4785412769
                                                      • Instruction ID: 11b69abad89940f903e0bee258177c312bce0be7e50b52951d1a81836bb85c4d
                                                      • Opcode Fuzzy Hash: c61cee3f5b822e8f73f01f76299548406a27556c3b95f4a81b473e4785412769
                                                      • Instruction Fuzzy Hash: 6B31FA3190021E7ADF20AF61DC5AAEE77BCDF45324F1005B9F915E31A0DB718F458A64
                                                      APIs
                                                      • GetLocalTime.KERNEL32(?), ref: 00C3E18C
                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00C3E19C
                                                      • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00C3E1A8
                                                      • __wsplitpath.LIBCMT ref: 00C3E206
                                                      • _wcscat.LIBCMT ref: 00C3E21E
                                                      • _wcscat.LIBCMT ref: 00C3E230
                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00C3E245
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00C3E259
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00C3E28B
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00C3E2AC
                                                      • _wcscpy.LIBCMT ref: 00C3E2B8
                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00C3E2F7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                      • String ID: *.*
                                                      • API String ID: 3566783562-438819550
                                                      • Opcode ID: b673b22c62fd7e43edd10a2c2606e9f11f20f29e7d6c139c87052c496ed9fbfa
                                                      • Instruction ID: 730133ac0925c8ab7416e40646fe7ede9d40e92ba739f32fa0bc0eaa80e2d1e0
                                                      • Opcode Fuzzy Hash: b673b22c62fd7e43edd10a2c2606e9f11f20f29e7d6c139c87052c496ed9fbfa
                                                      • Instruction Fuzzy Hash: 7E618B725146059FC710EF60C884AAFB3E9FF88310F04896EF999D7251EB31EA45CB92
                                                      APIs
                                                        • Part of subcall function 00C28C03: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00C28C1F
                                                        • Part of subcall function 00C28C03: GetLastError.KERNEL32(?,00C286E3,?,?,?), ref: 00C28C29
                                                        • Part of subcall function 00C28C03: GetProcessHeap.KERNEL32(00000008,?,?,00C286E3,?,?,?), ref: 00C28C38
                                                        • Part of subcall function 00C28C03: HeapAlloc.KERNEL32(00000000,?,00C286E3,?,?,?), ref: 00C28C3F
                                                        • Part of subcall function 00C28C03: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00C28C56
                                                        • Part of subcall function 00C28CA0: GetProcessHeap.KERNEL32(00000008,00C286F9,00000000,00000000,?,00C286F9,?), ref: 00C28CAC
                                                        • Part of subcall function 00C28CA0: HeapAlloc.KERNEL32(00000000,?,00C286F9,?), ref: 00C28CB3
                                                        • Part of subcall function 00C28CA0: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00C286F9,?), ref: 00C28CC4
                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00C28714
                                                      • _memset.LIBCMT ref: 00C28729
                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00C28748
                                                      • GetLengthSid.ADVAPI32(?), ref: 00C28759
                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00C28796
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00C287B2
                                                      • GetLengthSid.ADVAPI32(?), ref: 00C287CF
                                                      • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00C287DE
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00C287E5
                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00C28806
                                                      • CopySid.ADVAPI32(00000000), ref: 00C2880D
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00C2883E
                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00C28864
                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00C28878
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                      • String ID:
                                                      • API String ID: 3996160137-0
                                                      • Opcode ID: 74cdeb3b98e26c92032634908e6a1508884d4d83095d57cb8ef1d59b9b72f3c9
                                                      • Instruction ID: 89acba04b8b53647ca1fa03a0fa74c4c4277c09e29397d608b7f9335e4718361
                                                      • Opcode Fuzzy Hash: 74cdeb3b98e26c92032634908e6a1508884d4d83095d57cb8ef1d59b9b72f3c9
                                                      • Instruction Fuzzy Hash: A3615871901229AFDF14DFA5EC44FAEBB79FF04304F548129F825A7290DB759A09CB60
                                                      APIs
                                                        • Part of subcall function 00C51242: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C501D5,?,?), ref: 00C51259
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C508D4
                                                        • Part of subcall function 00BD4D37: __itow.LIBCMT ref: 00BD4D62
                                                        • Part of subcall function 00BD4D37: __swprintf.LIBCMT ref: 00BD4DAC
                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00C50973
                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00C50A0B
                                                      • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00C50C4A
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00C50C57
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                      • String ID:
                                                      • API String ID: 1240663315-0
                                                      • Opcode ID: b56a1076c245fc407efaa98b61821175f072d99464ed236a4d0bba29aafeed5e
                                                      • Instruction ID: 3faf14f5ae3f9aa019cb8c2896d1008063a3b03a4b89812969d316e50a01b6ca
                                                      • Opcode Fuzzy Hash: b56a1076c245fc407efaa98b61821175f072d99464ed236a4d0bba29aafeed5e
                                                      • Instruction Fuzzy Hash: ABE16C34204210AFCB14DF29C895E2BBBE5EF89314B1489ADF85ADB262D731ED45CB52
                                                      APIs
                                                      • __swprintf.LIBCMT ref: 00C342BE
                                                      • __swprintf.LIBCMT ref: 00C342CB
                                                        • Part of subcall function 00BF37FA: __woutput_l.LIBCMT ref: 00BF3853
                                                      • FindResourceW.KERNEL32(?,?,0000000E), ref: 00C342F5
                                                      • LoadResource.KERNEL32(?,00000000), ref: 00C34301
                                                      • LockResource.KERNEL32(00000000), ref: 00C3430E
                                                      • FindResourceW.KERNEL32(?,?,00000003), ref: 00C3432E
                                                      • LoadResource.KERNEL32(?,00000000), ref: 00C34340
                                                      • SizeofResource.KERNEL32(?,00000000), ref: 00C3434F
                                                      • LockResource.KERNEL32(?), ref: 00C3435B
                                                      • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00C343BC
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                      • String ID:
                                                      • API String ID: 1433390588-0
                                                      • Opcode ID: 2b3fe5301d4daeb7c2cb5b2a307b1e00751eba6809acdf0eaaa2c9e529e20f29
                                                      • Instruction ID: b2e6a7a4bdf0cb69ebe4e7ee94a9af12ad9ce3ca96c2945059eaa9325a95b77b
                                                      • Opcode Fuzzy Hash: 2b3fe5301d4daeb7c2cb5b2a307b1e00751eba6809acdf0eaaa2c9e529e20f29
                                                      • Instruction Fuzzy Hash: C231AD7161120AABCB599F61DC98FBF7BACEF04301F10441AFA16E3160D770EA11CBA0
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                      • String ID:
                                                      • API String ID: 1737998785-0
                                                      • Opcode ID: 312d97c18f0b4489872e72e0a6bd85b624bc5e191837bc71a0f2c5107f8846c9
                                                      • Instruction ID: 6f2f74338a0c36f7323602ba1d05ded2804353c6944986a043a369ea0f6a6657
                                                      • Opcode Fuzzy Hash: 312d97c18f0b4489872e72e0a6bd85b624bc5e191837bc71a0f2c5107f8846c9
                                                      • Instruction Fuzzy Hash: 7121C4352016109FDB25AF65EC09B6E77A9FF45720F218056F906AB2A1DBB0ED01CB94
                                                      APIs
                                                        • Part of subcall function 00BE1A36: _memmove.LIBCMT ref: 00BE1A77
                                                      • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00C3F8F0
                                                      • FindClose.KERNEL32(00000000), ref: 00C3FA03
                                                        • Part of subcall function 00BD52B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00BD52E6
                                                      • Sleep.KERNEL32(0000000A), ref: 00C3F920
                                                      • _wcscmp.LIBCMT ref: 00C3F934
                                                      • _wcscmp.LIBCMT ref: 00C3F94F
                                                      • FindNextFileW.KERNEL32(?,?), ref: 00C3F9ED
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Find$File_wcscmp$CloseFirstMessageNextPeekSleep_memmove
                                                      • String ID: *.*
                                                      • API String ID: 2185952417-438819550
                                                      • Opcode ID: 85fa73f3dcac38bcc068a11df3abc39a1312d87c3cded0411d1de79a75981b2d
                                                      • Instruction ID: 26255ad179007371e6076043e5f3d42fb12433a06fd88c3050e069bb2ebd1410
                                                      • Opcode Fuzzy Hash: 85fa73f3dcac38bcc068a11df3abc39a1312d87c3cded0411d1de79a75981b2d
                                                      • Instruction Fuzzy Hash: 3F418E71D1021AAFCF14DF64CC45BEEBBB4FF15314F2449AAE825A3291EB309A45CB90
                                                      APIs
                                                        • Part of subcall function 00C2917C: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00C291C6
                                                        • Part of subcall function 00C2917C: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00C291F3
                                                        • Part of subcall function 00C2917C: GetLastError.KERNEL32 ref: 00C29200
                                                      • ExitWindowsEx.USER32(?,00000000), ref: 00C35621
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                      • String ID: $@$SeShutdownPrivilege
                                                      • API String ID: 2234035333-194228
                                                      • Opcode ID: 4bc9e32378e157ade325b1d0e42f12933ed7d5f00cf972b6d0678b0ab3b001b7
                                                      • Instruction ID: 162f246ca1936224bf809edb35bf26955ee8f46871365080fd85fdb3fbdb6e16
                                                      • Opcode Fuzzy Hash: 4bc9e32378e157ade325b1d0e42f12933ed7d5f00cf972b6d0678b0ab3b001b7
                                                      • Instruction Fuzzy Hash: C10126716B4A116BFB38666A9C4BFFF727CEB04741F640824FC27E22E2DAE05D009595
                                                      APIs
                                                      • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00C4678C
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00C4679B
                                                      • bind.WSOCK32(00000000,?,00000010), ref: 00C467B7
                                                      • listen.WSOCK32(00000000,00000005), ref: 00C467C6
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00C467E0
                                                      • closesocket.WSOCK32(00000000,00000000), ref: 00C467F4
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$bindclosesocketlistensocket
                                                      • String ID:
                                                      • API String ID: 1279440585-0
                                                      • Opcode ID: 38b6d5a82f8d1184b693ac828f0206443581f875a1643461f4ad31f782103aef
                                                      • Instruction ID: 313177196d842c941a202d904f68899be1f73d1fc250aef68c140a1ac506e3eb
                                                      • Opcode Fuzzy Hash: 38b6d5a82f8d1184b693ac828f0206443581f875a1643461f4ad31f782103aef
                                                      • Instruction Fuzzy Hash: 6F21D0342006049FCB20EF64D985B6EB7F9FF49324F208599E826A73D1CB70AD01CBA1
                                                      APIs
                                                        • Part of subcall function 00BD29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BD29F3
                                                      • DefDlgProcW.USER32(?,?,?,?,?), ref: 00BD1DD6
                                                      • GetSysColor.USER32(0000000F), ref: 00BD1E2A
                                                      • SetBkColor.GDI32(?,00000000), ref: 00BD1E3D
                                                        • Part of subcall function 00BD166C: DefDlgProcW.USER32(?,00000020,?), ref: 00BD16B4
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ColorProc$LongWindow
                                                      • String ID:
                                                      • API String ID: 3744519093-0
                                                      • Opcode ID: 0dec2733dc0bb1b6d260a976b98c15c9bdffe10818c954dfa53f79107a0cd306
                                                      • Instruction ID: 453c475b30c9d28fa35529c734de0238961aba74c25cb40cacb4d1793e1110c5
                                                      • Opcode Fuzzy Hash: 0dec2733dc0bb1b6d260a976b98c15c9bdffe10818c954dfa53f79107a0cd306
                                                      • Instruction Fuzzy Hash: 97A13574105604BFEA28EB6E9C89E7FB5DEDF41302B1409ABF842D53D1EB209E41D276
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00C3C196
                                                      • _wcscmp.LIBCMT ref: 00C3C1C6
                                                      • _wcscmp.LIBCMT ref: 00C3C1DB
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 00C3C1EC
                                                      • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00C3C21C
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Find$File_wcscmp$CloseFirstNext
                                                      • String ID:
                                                      • API String ID: 2387731787-0
                                                      • Opcode ID: 12df73f70e26568ea3bc4994b24ef48a7c2a22b7f3467e1fd8754252584b4a9b
                                                      • Instruction ID: 9adf60a4c6de8aadee1173ab30c9c70b36629ffa5258f9014829e1525a68b2db
                                                      • Opcode Fuzzy Hash: 12df73f70e26568ea3bc4994b24ef48a7c2a22b7f3467e1fd8754252584b4a9b
                                                      • Instruction Fuzzy Hash: C8518A356146029FD714DFA8D8D0AAEB3E8FF49320F10466DF966973A1DB31AD04CB91
                                                      APIs
                                                        • Part of subcall function 00C4823D: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00C48268
                                                      • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00C46C4E
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00C46C77
                                                      • bind.WSOCK32(00000000,?,00000010), ref: 00C46CB0
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00C46CBD
                                                      • closesocket.WSOCK32(00000000,00000000), ref: 00C46CD1
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                      • String ID:
                                                      • API String ID: 99427753-0
                                                      • Opcode ID: babacac6435741dfe9782988548043b7d262cbf641244befb20387576a155c70
                                                      • Instruction ID: 802071eae82040e0634f12913e45239ff2091c11e1b0d84c09203dbcb92416dd
                                                      • Opcode Fuzzy Hash: babacac6435741dfe9782988548043b7d262cbf641244befb20387576a155c70
                                                      • Instruction Fuzzy Hash: B641D6757006106FDB20AF649C86F6EB3E9EF49710F04859DF956AB3D2DB709D008BA1
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                      • String ID:
                                                      • API String ID: 292994002-0
                                                      • Opcode ID: 2743054fd31e17df02b7b7db59c8bd52747d6e02372fc33099ea84e987716058
                                                      • Instruction ID: 7cd203742744c8d1410874453a2fb4308e80e0267302e8f790f2a1132eb877cb
                                                      • Opcode Fuzzy Hash: 2743054fd31e17df02b7b7db59c8bd52747d6e02372fc33099ea84e987716058
                                                      • Instruction Fuzzy Hash: 0A11C439700A119FE7215F27DC54B2FBB99FF48762B104429FC56E7241DB70ED418AA8
                                                      APIs
                                                      • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00C41CBA,00000000), ref: 00C42891
                                                      • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00C428C8
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Internet$AvailableDataFileQueryRead
                                                      • String ID:
                                                      • API String ID: 599397726-0
                                                      • Opcode ID: c00cc495f2ca8e3ed44ccd26df27ff1bfbf914e15c56b629c24c584a8d4a291c
                                                      • Instruction ID: b0ca9952e0f317fb1c13e5ab76273947f5b8c0bf49461723547d48fa14e617b2
                                                      • Opcode Fuzzy Hash: c00cc495f2ca8e3ed44ccd26df27ff1bfbf914e15c56b629c24c584a8d4a291c
                                                      • Instruction Fuzzy Hash: 9641B472904209BFEB20DA55CC86FBFB7FCFB40724F50406EF611A7181EAB19E459A64
                                                      APIs
                                                        • Part of subcall function 00BF0F16: std::exception::exception.LIBCMT ref: 00BF0F4C
                                                        • Part of subcall function 00BF0F16: __CxxThrowException@8.LIBCMT ref: 00BF0F61
                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00C291C6
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00C291F3
                                                      • GetLastError.KERNEL32 ref: 00C29200
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                      • String ID:
                                                      • API String ID: 1922334811-0
                                                      • Opcode ID: bcb9b2a06d81737450cb528efbca2887f1956b1b32bb18ba8b13c4152665b798
                                                      • Instruction ID: e5b9941e0a38c9d163abe88e7e628a7f3f41d379133ebeda7cab7fecebb0b021
                                                      • Opcode Fuzzy Hash: bcb9b2a06d81737450cb528efbca2887f1956b1b32bb18ba8b13c4152665b798
                                                      • Instruction Fuzzy Hash: B711BFB141820AAFD728AF55EC89E6FB7F8EB44711B20856EE45593611EB70AC00CB60
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00C340DE
                                                      • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00C3411F
                                                      • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00C3412A
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CloseControlCreateDeviceFileHandle
                                                      • String ID:
                                                      • API String ID: 33631002-0
                                                      • Opcode ID: 2590c1c2bbfb19160959a3e7fec0fa4b1d6b67c830617a874e688c8578464e74
                                                      • Instruction ID: 97db38cbb5266326878d316355c8ac2ab87402673b94a5ca1ee91f0c34c74c0a
                                                      • Opcode Fuzzy Hash: 2590c1c2bbfb19160959a3e7fec0fa4b1d6b67c830617a874e688c8578464e74
                                                      • Instruction Fuzzy Hash: 52115275E01228BFDB248F959C44FAFBFBCEB45B60F104155F914F7290D6715A018BA1
                                                      APIs
                                                      • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00C34DB2
                                                      • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00C34DC9
                                                      • FreeSid.ADVAPI32(?), ref: 00C34DD9
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: AllocateCheckFreeInitializeMembershipToken
                                                      • String ID:
                                                      • API String ID: 3429775523-0
                                                      • Opcode ID: ef03849e06d4309fef3967489c2b7be55840a02a72f5da9a8ea633513478db05
                                                      • Instruction ID: bc6827fa896fa5939125fb95db3621e482439a85ce57b29289e9e56c38a99fcc
                                                      • Opcode Fuzzy Hash: ef03849e06d4309fef3967489c2b7be55840a02a72f5da9a8ea633513478db05
                                                      • Instruction Fuzzy Hash: 63F03C7591120CBFDB04DFE0DD89BAEB7B8EB08201F104469E501E2180D7706A448B50
                                                      APIs
                                                      • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 00C350DB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: mouse_event
                                                      • String ID: DOWN
                                                      • API String ID: 2434400541-711622031
                                                      • Opcode ID: 6abe26da1ada37093e1b5f9457a1c7f82abeeb0299a6b5b8248288948518db26
                                                      • Instruction ID: 979632767e644c3c3d0507f147482b8e17003f2312cab89edd3f5b191e7b4c27
                                                      • Opcode Fuzzy Hash: 6abe26da1ada37093e1b5f9457a1c7f82abeeb0299a6b5b8248288948518db26
                                                      • Instruction Fuzzy Hash: F6E08C322ACF2138F9A821247C06FBB03CC8B13734B201257F914AA0D2EDC62D8656AD
                                                      APIs
                                                      • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00C3196D
                                                      • keybd_event.USER32(?,75A4C0D0,?,00000000), ref: 00C31980
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: InputSendkeybd_event
                                                      • String ID:
                                                      • API String ID: 3536248340-0
                                                      • Opcode ID: 32100f1a8210131d2f3c4c4005aef540a31ae375f18a0c4ca84d85d10d15ad84
                                                      • Instruction ID: be89b7278c8ef77bbde2126549e02af0c91b28f7e59ca40645feb7929187a366
                                                      • Opcode Fuzzy Hash: 32100f1a8210131d2f3c4c4005aef540a31ae375f18a0c4ca84d85d10d15ad84
                                                      • Instruction Fuzzy Hash: E0F0497191420DAFDB10CF95C805BFEBBB4EF04315F10804AFD55A6291C3798615DF94
                                                      APIs
                                                      • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,00C4991A,?,00C6098C,?), ref: 00C3A547
                                                      • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,?,?,00C4991A,?,00C6098C,?), ref: 00C3A559
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ErrorFormatLastMessage
                                                      • String ID:
                                                      • API String ID: 3479602957-0
                                                      • Opcode ID: 9b921ee8b247bf53f55575c0f963c8129d9a9315696b4629e791d87aa42f68db
                                                      • Instruction ID: e085fe4642cbbba5b9d0700da2805af01b255032b50a063fd39428cc0df59c08
                                                      • Opcode Fuzzy Hash: 9b921ee8b247bf53f55575c0f963c8129d9a9315696b4629e791d87aa42f68db
                                                      • Instruction Fuzzy Hash: 0FF0E23111022DABDB20AFA8CC48FEA77ACBF08361F008165F919D2180D6709A00CBA1
                                                      APIs
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00C28D0A), ref: 00C28BE1
                                                      • CloseHandle.KERNEL32(?,?,00C28D0A), ref: 00C28BF3
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: AdjustCloseHandlePrivilegesToken
                                                      • String ID:
                                                      • API String ID: 81990902-0
                                                      • Opcode ID: a63cd60bde214fff7ce1165451f2da0600df3a63e78017e5e50dc7a9dff71608
                                                      • Instruction ID: 3ff1d89dd1fd2f5f45706ba8854f3a10c916e0d5b06a8508e83945245b09928f
                                                      • Opcode Fuzzy Hash: a63cd60bde214fff7ce1165451f2da0600df3a63e78017e5e50dc7a9dff71608
                                                      • Instruction Fuzzy Hash: F8E08C72028610AFE7362B21FC09FB77BE9EF00311B20892DF59681431CBB2AC90DB50
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00BF8EB7,?,?,?,00000001), ref: 00BFA2BA
                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00BFA2C3
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: b2ce42b11ecbb7520a5108834ee34bec068e5a23a31d7048e2707a2f4a0fcc64
                                                      • Instruction ID: 17dcd3377d2822a504bf7cc654973fbd6950eb6cb1a9aec4ac5ca671e5ae7273
                                                      • Opcode Fuzzy Hash: b2ce42b11ecbb7520a5108834ee34bec068e5a23a31d7048e2707a2f4a0fcc64
                                                      • Instruction Fuzzy Hash: 9CB09231064608ABCA502B92EC09B8E3F68EB44A63F104020F60D54270EBE254508A91
                                                      APIs
                                                      • BlockInput.USER32(00000001), ref: 00C443D4
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: BlockInput
                                                      • String ID:
                                                      • API String ID: 3456056419-0
                                                      • Opcode ID: 0bbe6c517c1d24e462c8e3ef06ff798427e30b52c6e8ccdc11a74216f6e32c37
                                                      • Instruction ID: 59e9e52f376602d27a2a5086682f0b301172ef2535cade94c91a6a930105690b
                                                      • Opcode Fuzzy Hash: 0bbe6c517c1d24e462c8e3ef06ff798427e30b52c6e8ccdc11a74216f6e32c37
                                                      • Instruction Fuzzy Hash: 58E04F752002059FD710EF5AE805B9BF7E8AFA8760F108466FD49D7361DAB0EC518B90
                                                      APIs
                                                      • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00C28D8A), ref: 00C2916C
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: LogonUser
                                                      • String ID:
                                                      • API String ID: 1244722697-0
                                                      • Opcode ID: 95d5d0d69985a510f2ae1ab39fd899e91ac66154085d4b3f26a701bd3d3b10d7
                                                      • Instruction ID: f63666281da4acf089e5d97508f75c2eac51b8b322d01fe9f2dd0606bb0722b4
                                                      • Opcode Fuzzy Hash: 95d5d0d69985a510f2ae1ab39fd899e91ac66154085d4b3f26a701bd3d3b10d7
                                                      • Instruction Fuzzy Hash: E2D05E3226050EBBEF018EA4DD01FAF3B69EB04B01F408111FE15D50A0C775D835AB60
                                                      APIs
                                                      • GetUserNameW.ADVAPI32(?,?), ref: 00C10664
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: NameUser
                                                      • String ID:
                                                      • API String ID: 2645101109-0
                                                      • Opcode ID: 6a376ee32c61c9d19ff212a4e5ab9ed77e9826dbc924c29f90b30ab8b6088f50
                                                      • Instruction ID: e9a2f8b6634eb06f945d3b40e0cbcbb9ab8f47eb1d426771d7f8808c6781b9de
                                                      • Opcode Fuzzy Hash: 6a376ee32c61c9d19ff212a4e5ab9ed77e9826dbc924c29f90b30ab8b6088f50
                                                      • Instruction Fuzzy Hash: 3CC04CF1800119DBCB15DB91DA98EEF77BCAB04305F20045AE101F2140D7749B44CE71
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00BFA28A
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: 96c4afd2ea1e243768060ac065d5bd4fb6136bb343399466e63dac7521c6ff51
                                                      • Instruction ID: 6edea7b9a8a2ca1832c0a88f355d747296a1063f4fbd128dceab2c928e3efeb3
                                                      • Opcode Fuzzy Hash: 96c4afd2ea1e243768060ac065d5bd4fb6136bb343399466e63dac7521c6ff51
                                                      • Instruction Fuzzy Hash: C8A0243001010CF7CF001F43FC0454D7F5CD7001517004030F40C00131D773541045C0
                                                      APIs
                                                      • DeleteObject.GDI32(00000000), ref: 00C47D0D
                                                      • DeleteObject.GDI32(00000000), ref: 00C47D1F
                                                      • DestroyWindow.USER32 ref: 00C47D2D
                                                      • GetDesktopWindow.USER32 ref: 00C47D47
                                                      • GetWindowRect.USER32(00000000), ref: 00C47D4E
                                                      • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00C47E8F
                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00C47E9F
                                                      • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C47EE7
                                                      • GetClientRect.USER32(00000000,?), ref: 00C47EF3
                                                      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00C47F2D
                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C47F4F
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C47F62
                                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C47F6D
                                                      • GlobalLock.KERNEL32(00000000), ref: 00C47F76
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C47F85
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00C47F8E
                                                      • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C47F95
                                                      • GlobalFree.KERNEL32(00000000), ref: 00C47FA0
                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C47FB2
                                                      • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00C63C7C,00000000), ref: 00C47FC8
                                                      • GlobalFree.KERNEL32(00000000), ref: 00C47FD8
                                                      • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00C47FFE
                                                      • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00C4801D
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C4803F
                                                      • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C4822C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                      • String ID: $AutoIt v3$DISPLAY$static
                                                      • API String ID: 2211948467-2373415609
                                                      • Opcode ID: 1fb829ddf3be7ade3e79c786d71faedea53463356b798b033ff35f7887327fec
                                                      • Instruction ID: baa5176ac6726de80525ef7eb092d2667ff4de1d169d9cfe35f53b233ab64fcd
                                                      • Opcode Fuzzy Hash: 1fb829ddf3be7ade3e79c786d71faedea53463356b798b033ff35f7887327fec
                                                      • Instruction Fuzzy Hash: 2D025A71900519AFDB24DFA5CD89FAEBBB9FF48310F108159F915AB2A1DB70AD01CB60
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?,00C60980), ref: 00C53A2D
                                                      • IsWindowVisible.USER32(?), ref: 00C53A51
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpperVisibleWindow
                                                      • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                      • API String ID: 4105515805-45149045
                                                      • Opcode ID: 2bbb4bfb3bc4ef31c11f620201de930008077ba570e4b862413091ad96299600
                                                      • Instruction ID: ee079c773ffab8fad605dea2d02b0c28eb6131a321cb6ef5add9d4b3520bce0b
                                                      • Opcode Fuzzy Hash: 2bbb4bfb3bc4ef31c11f620201de930008077ba570e4b862413091ad96299600
                                                      • Instruction Fuzzy Hash: DFD1C2382142408BCB04FF10C452A6AB7E5EF84385F144559FC565B3A3DB71EE8ECB5A
                                                      APIs
                                                      • SetTextColor.GDI32(?,00000000), ref: 00C5AA1D
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00C5AA4E
                                                      • GetSysColor.USER32(0000000F), ref: 00C5AA5A
                                                      • SetBkColor.GDI32(?,000000FF), ref: 00C5AA74
                                                      • SelectObject.GDI32(?,00000000), ref: 00C5AA83
                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 00C5AAAE
                                                      • GetSysColor.USER32(00000010), ref: 00C5AAB6
                                                      • CreateSolidBrush.GDI32(00000000), ref: 00C5AABD
                                                      • FrameRect.USER32(?,?,00000000), ref: 00C5AACC
                                                      • DeleteObject.GDI32(00000000), ref: 00C5AAD3
                                                      • InflateRect.USER32(?,000000FE,000000FE), ref: 00C5AB1E
                                                      • FillRect.USER32(?,?,00000000), ref: 00C5AB50
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00C5AB7B
                                                        • Part of subcall function 00C5ACB7: GetSysColor.USER32(00000012), ref: 00C5ACF0
                                                        • Part of subcall function 00C5ACB7: SetTextColor.GDI32(?,?), ref: 00C5ACF4
                                                        • Part of subcall function 00C5ACB7: GetSysColorBrush.USER32(0000000F), ref: 00C5AD0A
                                                        • Part of subcall function 00C5ACB7: GetSysColor.USER32(0000000F), ref: 00C5AD15
                                                        • Part of subcall function 00C5ACB7: GetSysColor.USER32(00000011), ref: 00C5AD32
                                                        • Part of subcall function 00C5ACB7: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00C5AD40
                                                        • Part of subcall function 00C5ACB7: SelectObject.GDI32(?,00000000), ref: 00C5AD51
                                                        • Part of subcall function 00C5ACB7: SetBkColor.GDI32(?,00000000), ref: 00C5AD5A
                                                        • Part of subcall function 00C5ACB7: SelectObject.GDI32(?,?), ref: 00C5AD67
                                                        • Part of subcall function 00C5ACB7: InflateRect.USER32(?,000000FF,000000FF), ref: 00C5AD86
                                                        • Part of subcall function 00C5ACB7: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00C5AD9D
                                                        • Part of subcall function 00C5ACB7: GetWindowLongW.USER32(00000000,000000F0), ref: 00C5ADB2
                                                        • Part of subcall function 00C5ACB7: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00C5ADDA
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                      • String ID:
                                                      • API String ID: 3521893082-0
                                                      • Opcode ID: cbee7961b44658ead31726d79adeb8d3aa219a770a08b43bf5843c6c4384aeea
                                                      • Instruction ID: 7eee2b9344d8e90a86a23ff783e237c0511d260776cbcee6e5d006941bd70c0c
                                                      • Opcode Fuzzy Hash: cbee7961b44658ead31726d79adeb8d3aa219a770a08b43bf5843c6c4384aeea
                                                      • Instruction Fuzzy Hash: DD917F71008305AFC7219F66DC08B6F7BA9FF49321F204B19F962A61A1D7B1D984CF96
                                                      APIs
                                                      • DestroyWindow.USER32(?,?,?), ref: 00BD3072
                                                      • DeleteObject.GDI32(00000000), ref: 00BD30B8
                                                      • DeleteObject.GDI32(00000000), ref: 00BD30C3
                                                      • DestroyIcon.USER32(00000000,?,?,?), ref: 00BD30CE
                                                      • DestroyWindow.USER32(00000000,?,?,?), ref: 00BD30D9
                                                      • SendMessageW.USER32(?,00001308,?,00000000), ref: 00C0C6AC
                                                      • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00C0C6E5
                                                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00C0CB0E
                                                        • Part of subcall function 00BD1F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00BD2412,?,00000000,?,?,?,?,00BD1AA7,00000000,?), ref: 00BD1F76
                                                      • SendMessageW.USER32(?,00001053), ref: 00C0CB4B
                                                      • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00C0CB62
                                                      • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00C0CB78
                                                      • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00C0CB83
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                      • String ID: 0
                                                      • API String ID: 464785882-4108050209
                                                      • Opcode ID: 0449a0db337f4639fe59cc4b23cee8918f6a5995d0a2ad5f0d7cab9d910fb0d7
                                                      • Instruction ID: 8e16c8cde8e17b78acd09b427c80f879bc716c80840d916c973e345f5f494176
                                                      • Opcode Fuzzy Hash: 0449a0db337f4639fe59cc4b23cee8918f6a5995d0a2ad5f0d7cab9d910fb0d7
                                                      • Instruction Fuzzy Hash: 6F127C70604201EFDB25CF24C8C4BAAB7E5BF44700F1486AAF965DB2A2D771EA41DF91
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: __wcsnicmp$Exception@8Throwstd::exception::exception
                                                      • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                      • API String ID: 2660009612-1645009161
                                                      • Opcode ID: 7afc8f23b0448cbbfe019067c2d52d8591eacd4ec5708ec37795b23e13720f31
                                                      • Instruction ID: bd079c9e72710f7d65706224306bab40fc2708757be253650582919babb301ea
                                                      • Opcode Fuzzy Hash: 7afc8f23b0448cbbfe019067c2d52d8591eacd4ec5708ec37795b23e13720f31
                                                      • Instruction Fuzzy Hash: 45A19131A04249BBCB24AF62CC92EBE77F9AF45700F1440B8F9156B292DBB0DE55D750
                                                      APIs
                                                      • DestroyWindow.USER32(00000000), ref: 00C4798D
                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00C47A4C
                                                      • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00C47A8A
                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00C47A9C
                                                      • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00C47AE2
                                                      • GetClientRect.USER32(00000000,?), ref: 00C47AEE
                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00C47B32
                                                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00C47B41
                                                      • GetStockObject.GDI32(00000011), ref: 00C47B51
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00C47B55
                                                      • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00C47B65
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00C47B6E
                                                      • DeleteDC.GDI32(00000000), ref: 00C47B77
                                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00C47BA3
                                                      • SendMessageW.USER32(00000030,00000000,00000001), ref: 00C47BBA
                                                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00C47BF5
                                                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00C47C09
                                                      • SendMessageW.USER32(00000404,00000001,00000000), ref: 00C47C1A
                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00C47C4A
                                                      • GetStockObject.GDI32(00000011), ref: 00C47C55
                                                      • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00C47C60
                                                      • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00C47C6A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                      • API String ID: 2910397461-517079104
                                                      • Opcode ID: 8c9da95b61c88040cc3e6c0b3910b9ca5bda966fa71a2b4edbd361fba3ccabeb
                                                      • Instruction ID: 98621f3bd08e26ea82548b97387a52d3c8b44be79af707253237040d24a23e8a
                                                      • Opcode Fuzzy Hash: 8c9da95b61c88040cc3e6c0b3910b9ca5bda966fa71a2b4edbd361fba3ccabeb
                                                      • Instruction Fuzzy Hash: 39A18171A00619BFEB24DBA5DD4AFAF7BB9EB44710F104255FA15A72E0D7B0AD00CB60
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 00C3B1CE
                                                      • GetDriveTypeW.KERNEL32(?,00C62C4C,?,\\.\,00C60980), ref: 00C3B2AB
                                                      • SetErrorMode.KERNEL32(00000000,00C62C4C,?,\\.\,00C60980), ref: 00C3B409
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$DriveType
                                                      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                      • API String ID: 2907320926-4222207086
                                                      • Opcode ID: f71662626e164710c9f6463c2be3f5f1dea5650843886965efc2b64e30f47381
                                                      • Instruction ID: 7ad36b6295e19d82de354e4b1f60a2f74e059753bfd50fe9e15cab30906261da
                                                      • Opcode Fuzzy Hash: f71662626e164710c9f6463c2be3f5f1dea5650843886965efc2b64e30f47381
                                                      • Instruction Fuzzy Hash: F6513434260214EBCB54EB16D8A2CBEB3A1FB00704F24456AF616B72A0DFB19E01EB45
                                                      APIs
                                                      • GetSysColor.USER32(00000012), ref: 00C5ACF0
                                                      • SetTextColor.GDI32(?,?), ref: 00C5ACF4
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00C5AD0A
                                                      • GetSysColor.USER32(0000000F), ref: 00C5AD15
                                                      • CreateSolidBrush.GDI32(?), ref: 00C5AD1A
                                                      • GetSysColor.USER32(00000011), ref: 00C5AD32
                                                      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00C5AD40
                                                      • SelectObject.GDI32(?,00000000), ref: 00C5AD51
                                                      • SetBkColor.GDI32(?,00000000), ref: 00C5AD5A
                                                      • SelectObject.GDI32(?,?), ref: 00C5AD67
                                                      • InflateRect.USER32(?,000000FF,000000FF), ref: 00C5AD86
                                                      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00C5AD9D
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00C5ADB2
                                                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00C5ADDA
                                                      • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00C5AE01
                                                      • InflateRect.USER32(?,000000FD,000000FD), ref: 00C5AE1F
                                                      • DrawFocusRect.USER32(?,?), ref: 00C5AE2A
                                                      • GetSysColor.USER32(00000011), ref: 00C5AE38
                                                      • SetTextColor.GDI32(?,00000000), ref: 00C5AE40
                                                      • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00C5AE54
                                                      • SelectObject.GDI32(?,00C5A9E7), ref: 00C5AE6B
                                                      • DeleteObject.GDI32(?), ref: 00C5AE76
                                                      • SelectObject.GDI32(?,?), ref: 00C5AE7C
                                                      • DeleteObject.GDI32(?), ref: 00C5AE81
                                                      • SetTextColor.GDI32(?,?), ref: 00C5AE87
                                                      • SetBkColor.GDI32(?,?), ref: 00C5AE91
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                      • String ID:
                                                      • API String ID: 1996641542-0
                                                      • Opcode ID: 3cc91d7d616e397c2ca3a7d1f4f730d0c31a2ac29daf152d410e77b464da96d7
                                                      • Instruction ID: 8f77db7e2b7257c0409acdb3cf094b0f207d80effd580475c822ef200f1a003f
                                                      • Opcode Fuzzy Hash: 3cc91d7d616e397c2ca3a7d1f4f730d0c31a2ac29daf152d410e77b464da96d7
                                                      • Instruction Fuzzy Hash: BC512D75901208AFDB219FA6DC48FAF7B79EF08321F204615F915BB2A1D7B19A40DF90
                                                      APIs
                                                      • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00C58EAE
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00C58EBF
                                                      • CharNextW.USER32(0000014E), ref: 00C58EEE
                                                      • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00C58F2F
                                                      • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00C58F45
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00C58F56
                                                      • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00C58F73
                                                      • SetWindowTextW.USER32(?,0000014E), ref: 00C58FC5
                                                      • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00C58FDB
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00C5900C
                                                      • _memset.LIBCMT ref: 00C59031
                                                      • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00C5907A
                                                      • _memset.LIBCMT ref: 00C590D9
                                                      • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00C59103
                                                      • SendMessageW.USER32(?,00001074,?,00000001), ref: 00C5915B
                                                      • SendMessageW.USER32(?,0000133D,?,?), ref: 00C59208
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00C5922A
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00C59274
                                                      • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00C592A1
                                                      • DrawMenuBar.USER32(?), ref: 00C592B0
                                                      • SetWindowTextW.USER32(?,0000014E), ref: 00C592D8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                      • String ID: 0
                                                      • API String ID: 1073566785-4108050209
                                                      • Opcode ID: ff0cc61daa83c1eeac2767f0d9cb7e9a82504bcbbeee30c6a044659895ca6bcb
                                                      • Instruction ID: 5754e85d1c7750dc2f583538869f8c2bc3d683570c2a138c5b96380748991769
                                                      • Opcode Fuzzy Hash: ff0cc61daa83c1eeac2767f0d9cb7e9a82504bcbbeee30c6a044659895ca6bcb
                                                      • Instruction Fuzzy Hash: 2EE19278900219EFDF209F91CC85AEE7BB8FF05711F108195FD25A6191DBB08A89DF64
                                                      APIs
                                                      • GetCursorPos.USER32(?), ref: 00C54DCF
                                                      • GetDesktopWindow.USER32 ref: 00C54DE4
                                                      • GetWindowRect.USER32(00000000), ref: 00C54DEB
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00C54E4D
                                                      • DestroyWindow.USER32(?), ref: 00C54E79
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00C54EA2
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00C54EC0
                                                      • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00C54EE6
                                                      • SendMessageW.USER32(?,00000421,?,?), ref: 00C54EFB
                                                      • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00C54F0E
                                                      • IsWindowVisible.USER32(?), ref: 00C54F2E
                                                      • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00C54F49
                                                      • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00C54F5D
                                                      • GetWindowRect.USER32(?,?), ref: 00C54F75
                                                      • MonitorFromPoint.USER32(?,?,00000002), ref: 00C54F9B
                                                      • GetMonitorInfoW.USER32(00000000,?), ref: 00C54FB5
                                                      • CopyRect.USER32(?,?), ref: 00C54FCC
                                                      • SendMessageW.USER32(?,00000412,00000000), ref: 00C55037
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                      • String ID: ($0$tooltips_class32
                                                      • API String ID: 698492251-4156429822
                                                      • Opcode ID: d070b960873cb410a313a2aedaccbbb89201f452aa65e663a01e7c3454242f0b
                                                      • Instruction ID: f657ea7881b488dcece08454f3273e0439e5d491829e8f3bf8dbede6edb3a0d1
                                                      • Opcode Fuzzy Hash: d070b960873cb410a313a2aedaccbbb89201f452aa65e663a01e7c3454242f0b
                                                      • Instruction Fuzzy Hash: D9B18B70604740AFDB14DF25C845B6FFBE4BF84304F008A19F999AB291D7B1E989CB96
                                                      APIs
                                                      • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00C34809
                                                      • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00C3482F
                                                      • _wcscpy.LIBCMT ref: 00C3485D
                                                      • _wcscmp.LIBCMT ref: 00C34868
                                                      • _wcscat.LIBCMT ref: 00C3487E
                                                      • _wcsstr.LIBCMT ref: 00C34889
                                                      • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00C348A5
                                                      • _wcscat.LIBCMT ref: 00C348EE
                                                      • _wcscat.LIBCMT ref: 00C348F5
                                                      • _wcsncpy.LIBCMT ref: 00C34920
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                      • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                      • API String ID: 699586101-1459072770
                                                      • Opcode ID: 2855b408a0fb293ce0b5d80e78a9a6f058c177c5c9a015879aba8110e5852abe
                                                      • Instruction ID: 1b0d09446295c4b28c4e2a1cccbe9c748d0b1c32fd138a69cbb77ab72b2df3f1
                                                      • Opcode Fuzzy Hash: 2855b408a0fb293ce0b5d80e78a9a6f058c177c5c9a015879aba8110e5852abe
                                                      • Instruction Fuzzy Hash: D64106326142087AEB24BB758C43EBF77ECDF41710F1400A6FA05E7192EB74AA0597A5
                                                      APIs
                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00BD2C8C
                                                      • GetSystemMetrics.USER32(00000007), ref: 00BD2C94
                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00BD2CBF
                                                      • GetSystemMetrics.USER32(00000008), ref: 00BD2CC7
                                                      • GetSystemMetrics.USER32(00000004), ref: 00BD2CEC
                                                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00BD2D09
                                                      • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00BD2D19
                                                      • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00BD2D4C
                                                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00BD2D60
                                                      • GetClientRect.USER32(00000000,000000FF), ref: 00BD2D7E
                                                      • GetStockObject.GDI32(00000011), ref: 00BD2D9A
                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00BD2DA5
                                                        • Part of subcall function 00BD2714: GetCursorPos.USER32(?), ref: 00BD2727
                                                        • Part of subcall function 00BD2714: ScreenToClient.USER32(00C967B0,?), ref: 00BD2744
                                                        • Part of subcall function 00BD2714: GetAsyncKeyState.USER32(00000001), ref: 00BD2769
                                                        • Part of subcall function 00BD2714: GetAsyncKeyState.USER32(00000002), ref: 00BD2777
                                                      • SetTimer.USER32(00000000,00000000,00000028,00BD1473), ref: 00BD2DCC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                      • String ID: AutoIt v3 GUI
                                                      • API String ID: 1458621304-248962490
                                                      • Opcode ID: ed78b6afc7b6ac37bf312a425892b2b4a3806ce1b2609b2557cf366ea87b9e17
                                                      • Instruction ID: 9ad2dc86bac315c3703190dc36159ed98a7f4709a85bcd90ef10fc601bbd653b
                                                      • Opcode Fuzzy Hash: ed78b6afc7b6ac37bf312a425892b2b4a3806ce1b2609b2557cf366ea87b9e17
                                                      • Instruction Fuzzy Hash: DDB15F7160024A9FDB14DFA9CC89BAEB7F4FB18310F10426AFA15A72E0DB749950CF54
                                                      APIs
                                                        • Part of subcall function 00BE1821: _memmove.LIBCMT ref: 00BE185B
                                                      • GetForegroundWindow.USER32(00C60980,?,?,?,?,?), ref: 00BF040E
                                                      • IsWindow.USER32(?), ref: 00C264A0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Window$Foreground_memmove
                                                      • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                                      • API String ID: 3828923867-1919597938
                                                      • Opcode ID: 924905526e7dbad4205dbfe565f4850418163bae1781ee927acce6cb0b2b2ffd
                                                      • Instruction ID: 46c08ff7954aa5c55f6fda89fbd8ccfe43babde2316ae8ce5f5ab4b9c0524407
                                                      • Opcode Fuzzy Hash: 924905526e7dbad4205dbfe565f4850418163bae1781ee927acce6cb0b2b2ffd
                                                      • Instruction Fuzzy Hash: 13D109701042429BCB08FF11D4819BABBE5FF54304F504A5DF5A683AA3DB31EA59CBA1
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?), ref: 00C54274
                                                      • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00C54334
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: BuffCharMessageSendUpper
                                                      • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                      • API String ID: 3974292440-719923060
                                                      • Opcode ID: c1d10a0dd5d7a5a7ba726a37767449ef1aed27a1e8f278e4c8c69a34633123ef
                                                      • Instruction ID: 66bd8dae7a73f1ec038ec298bc7ac3203465dde056d1c83e282e720071e2cda2
                                                      • Opcode Fuzzy Hash: c1d10a0dd5d7a5a7ba726a37767449ef1aed27a1e8f278e4c8c69a34633123ef
                                                      • Instruction Fuzzy Hash: 10A18E742142019FCB18EF10C851B7AB3E5FF84319F1049A9F8665B3A2EB71ED89CB55
                                                      APIs
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00C2AF5E
                                                      • __swprintf.LIBCMT ref: 00C2AFFF
                                                      • _wcscmp.LIBCMT ref: 00C2B012
                                                      • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00C2B067
                                                      • _wcscmp.LIBCMT ref: 00C2B0A3
                                                      • GetClassNameW.USER32(?,?,00000400), ref: 00C2B0DA
                                                      • GetDlgCtrlID.USER32(?), ref: 00C2B12C
                                                      • GetWindowRect.USER32(?,?), ref: 00C2B162
                                                      • GetParent.USER32(?), ref: 00C2B180
                                                      • ScreenToClient.USER32(00000000), ref: 00C2B187
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00C2B201
                                                      • _wcscmp.LIBCMT ref: 00C2B215
                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 00C2B23B
                                                      • _wcscmp.LIBCMT ref: 00C2B24F
                                                        • Part of subcall function 00BF378E: _iswctype.LIBCMT ref: 00BF3796
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                      • String ID: %s%u
                                                      • API String ID: 3744389584-679674701
                                                      • Opcode ID: 0d95a26e5c2fa95cc5fd4e5c043b1bcc6647919b5fe11b1407fe4882929f5c61
                                                      • Instruction ID: ac4df66358a17d17ced7e565eb5168d5b31958bf7ecabd8b2bf213d159f6070d
                                                      • Opcode Fuzzy Hash: 0d95a26e5c2fa95cc5fd4e5c043b1bcc6647919b5fe11b1407fe4882929f5c61
                                                      • Instruction Fuzzy Hash: 59A1DB71204726AFDB15DF60D884BAEB7E8FF44310F108629F9A992590DB30EE55CBA1
                                                      APIs
                                                      • GetClassNameW.USER32(00000008,?,00000400), ref: 00C2B894
                                                      • _wcscmp.LIBCMT ref: 00C2B8A5
                                                      • GetWindowTextW.USER32(00000001,?,00000400), ref: 00C2B8CD
                                                      • CharUpperBuffW.USER32(?,00000000), ref: 00C2B8EA
                                                      • _wcscmp.LIBCMT ref: 00C2B908
                                                      • _wcsstr.LIBCMT ref: 00C2B919
                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00C2B951
                                                      • _wcscmp.LIBCMT ref: 00C2B961
                                                      • GetWindowTextW.USER32(00000002,?,00000400), ref: 00C2B988
                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00C2B9D1
                                                      • _wcscmp.LIBCMT ref: 00C2B9E1
                                                      • GetClassNameW.USER32(00000010,?,00000400), ref: 00C2BA09
                                                      • GetWindowRect.USER32(00000004,?), ref: 00C2BA72
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                      • String ID: @$ThumbnailClass
                                                      • API String ID: 1788623398-1539354611
                                                      • Opcode ID: 6d16ecbb49dccbd5cdbb86dd300abc6af28c8907da5b940df6196e936f92c9e5
                                                      • Instruction ID: 5555f9f8b36b70f0ff3103943cc8b8d2b0fb080e069cd5ff5ce30ad8a13f8310
                                                      • Opcode Fuzzy Hash: 6d16ecbb49dccbd5cdbb86dd300abc6af28c8907da5b940df6196e936f92c9e5
                                                      • Instruction Fuzzy Hash: 4081C171004219AFDB10DF15E881FBA77E8FF84314F148469FE999A492DB70DE89CBA1
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: __wcsnicmp
                                                      • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                      • API String ID: 1038674560-1810252412
                                                      • Opcode ID: 37e363a93f1a7122446e3bd1a426e55b03848e32b7d1a56c38c502f9ec9cfcd8
                                                      • Instruction ID: b64ae9764165aa96492e0eefa3ebd972c0260eeed27c417d0f054eced40ca941
                                                      • Opcode Fuzzy Hash: 37e363a93f1a7122446e3bd1a426e55b03848e32b7d1a56c38c502f9ec9cfcd8
                                                      • Instruction Fuzzy Hash: 5E31D030940215A6DB18FA65EC83EED73E4AF10B10F700976F812B28D2EF616E08D765
                                                      APIs
                                                      • LoadIconW.USER32(00000063), ref: 00C2C98D
                                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00C2C99F
                                                      • SetWindowTextW.USER32(?,?), ref: 00C2C9B6
                                                      • GetDlgItem.USER32(?,000003EA), ref: 00C2C9CB
                                                      • SetWindowTextW.USER32(00000000,?), ref: 00C2C9D1
                                                      • GetDlgItem.USER32(?,000003E9), ref: 00C2C9E1
                                                      • SetWindowTextW.USER32(00000000,?), ref: 00C2C9E7
                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00C2CA08
                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00C2CA22
                                                      • GetWindowRect.USER32(?,?), ref: 00C2CA2B
                                                      • SetWindowTextW.USER32(?,?), ref: 00C2CA96
                                                      • GetDesktopWindow.USER32 ref: 00C2CA9C
                                                      • GetWindowRect.USER32(00000000), ref: 00C2CAA3
                                                      • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00C2CAEF
                                                      • GetClientRect.USER32(?,?), ref: 00C2CAFC
                                                      • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00C2CB21
                                                      • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00C2CB4C
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                      • String ID:
                                                      • API String ID: 3869813825-0
                                                      • Opcode ID: 052efa0d5e60fca7e4579566dc9a4af03688f521f51ba49ff7784cd2d349b2e2
                                                      • Instruction ID: 0d7dfc98409e76c27cbb810b17812dfc33104e82ddb538e34ffe5650e71d8f5c
                                                      • Opcode Fuzzy Hash: 052efa0d5e60fca7e4579566dc9a4af03688f521f51ba49ff7784cd2d349b2e2
                                                      • Instruction Fuzzy Hash: 7A518C30900709EFDB20DFA9DD89B6FBBF5FF04705F100929E596A29A0C7B4A954DB50
                                                      APIs
                                                      • LoadCursorW.USER32(00000000,00007F8A), ref: 00C454C3
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00C454CE
                                                      • LoadCursorW.USER32(00000000,00007F03), ref: 00C454D9
                                                      • LoadCursorW.USER32(00000000,00007F8B), ref: 00C454E4
                                                      • LoadCursorW.USER32(00000000,00007F01), ref: 00C454EF
                                                      • LoadCursorW.USER32(00000000,00007F81), ref: 00C454FA
                                                      • LoadCursorW.USER32(00000000,00007F88), ref: 00C45505
                                                      • LoadCursorW.USER32(00000000,00007F80), ref: 00C45510
                                                      • LoadCursorW.USER32(00000000,00007F86), ref: 00C4551B
                                                      • LoadCursorW.USER32(00000000,00007F83), ref: 00C45526
                                                      • LoadCursorW.USER32(00000000,00007F85), ref: 00C45531
                                                      • LoadCursorW.USER32(00000000,00007F82), ref: 00C4553C
                                                      • LoadCursorW.USER32(00000000,00007F84), ref: 00C45547
                                                      • LoadCursorW.USER32(00000000,00007F04), ref: 00C45552
                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 00C4555D
                                                      • LoadCursorW.USER32(00000000,00007F89), ref: 00C45568
                                                      • GetCursorInfo.USER32(?), ref: 00C45578
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Cursor$Load$Info
                                                      • String ID:
                                                      • API String ID: 2577412497-0
                                                      • Opcode ID: 0995133fb23787f6871380f4c8eeb2d2ff0abe1c05b2c230710ff69a0fe5ade6
                                                      • Instruction ID: aa6a4446077d3f05fad411d727b37e77332558f06d78a1d5cac9ddf5f33510ef
                                                      • Opcode Fuzzy Hash: 0995133fb23787f6871380f4c8eeb2d2ff0abe1c05b2c230710ff69a0fe5ade6
                                                      • Instruction Fuzzy Hash: 8B31F4B0D483196BDB109FB68C8996FBFE9FF04750F50452AE51CE7281DA78A9008F91
                                                      APIs
                                                      • _memset.LIBCMT ref: 00C5A646
                                                      • DestroyWindow.USER32(00000000,?), ref: 00C5A6C0
                                                        • Part of subcall function 00BE1821: _memmove.LIBCMT ref: 00BE185B
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00C5A73A
                                                      • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00C5A75C
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00C5A76F
                                                      • DestroyWindow.USER32(00000000), ref: 00C5A791
                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00BD0000,00000000), ref: 00C5A7C8
                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00C5A7E1
                                                      • GetDesktopWindow.USER32 ref: 00C5A7FA
                                                      • GetWindowRect.USER32(00000000), ref: 00C5A801
                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00C5A819
                                                      • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00C5A831
                                                        • Part of subcall function 00BD29AB: GetWindowLongW.USER32(?,000000EB), ref: 00BD29BC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                      • String ID: 0$tooltips_class32
                                                      • API String ID: 1297703922-3619404913
                                                      • Opcode ID: e00eb1af56beb4049acca1c5af3bdf303d3ae1acaeb7b33f18d1479a7f1df43a
                                                      • Instruction ID: cc95152605204a13e03387c860e76a834c84c634de2c1acc09859675887f7fa6
                                                      • Opcode Fuzzy Hash: e00eb1af56beb4049acca1c5af3bdf303d3ae1acaeb7b33f18d1479a7f1df43a
                                                      • Instruction Fuzzy Hash: 0771AB74140241AFD725CF29CC48F6B7BE5FB88304F140A1EF995972A1D770EA4ACB5A
                                                      APIs
                                                        • Part of subcall function 00BD29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BD29F3
                                                      • DragQueryPoint.SHELL32(?,?), ref: 00C5CA4A
                                                        • Part of subcall function 00C5AF24: ClientToScreen.USER32(?,?), ref: 00C5AF4D
                                                        • Part of subcall function 00C5AF24: GetWindowRect.USER32(?,?), ref: 00C5AFC3
                                                        • Part of subcall function 00C5AF24: PtInRect.USER32(?,?,00C5C437), ref: 00C5AFD3
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00C5CAB3
                                                      • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00C5CABE
                                                      • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00C5CAE1
                                                      • _wcscat.LIBCMT ref: 00C5CB11
                                                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00C5CB28
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00C5CB41
                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00C5CB58
                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00C5CB7A
                                                      • DragFinish.SHELL32(?), ref: 00C5CB81
                                                      • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00C5CC74
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                      • API String ID: 169749273-3440237614
                                                      • Opcode ID: 97a3607a9162711d40632b9673e16971a310b9f1b4790e805736100abc4b5318
                                                      • Instruction ID: 0e5317f3dd2fb45a19be3c3e161054b16abaf21c615386f50c46cf813f4ae17e
                                                      • Opcode Fuzzy Hash: 97a3607a9162711d40632b9673e16971a310b9f1b4790e805736100abc4b5318
                                                      • Instruction Fuzzy Hash: D9615C71108300AFC711EF65DC85EAFBBF8EF88750F100A2EF595962A1DB709A49CB56
                                                      APIs
                                                      • VariantInit.OLEAUT32(00000000), ref: 00C38187
                                                      • VariantCopy.OLEAUT32(00000000,?), ref: 00C38190
                                                      • VariantClear.OLEAUT32(00000000), ref: 00C3819C
                                                      • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00C3828A
                                                      • __swprintf.LIBCMT ref: 00C382BA
                                                      • VarR8FromDec.OLEAUT32(?,?), ref: 00C382E6
                                                      • VariantInit.OLEAUT32(?), ref: 00C38397
                                                      • SysFreeString.OLEAUT32(?), ref: 00C3842B
                                                      • VariantClear.OLEAUT32(?), ref: 00C38485
                                                      • VariantClear.OLEAUT32(?), ref: 00C38494
                                                      • VariantInit.OLEAUT32(00000000), ref: 00C384D2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                      • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                      • API String ID: 3730832054-3931177956
                                                      • Opcode ID: 483c2bede18ec234af2cbeab5ecc42ff2047ba36f61847d417cc266ff6727175
                                                      • Instruction ID: 860f0a7f29f577ae572739a36fefb3056382331f49a764dc71a330e52fb4724c
                                                      • Opcode Fuzzy Hash: 483c2bede18ec234af2cbeab5ecc42ff2047ba36f61847d417cc266ff6727175
                                                      • Instruction Fuzzy Hash: D7D12131620716EBDB20AF66C884B7EB7B4BF04700F248565F425AB291DF78DD49DBA0
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?), ref: 00C54829
                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00C54874
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: BuffCharMessageSendUpper
                                                      • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                      • API String ID: 3974292440-4258414348
                                                      • Opcode ID: b0281cba9cf0066b2e37c70feef55d558e29764d628d884b601d2a81985b0093
                                                      • Instruction ID: 4ddc5902d6e8ad6db0037ae07a7767bb2fb2288a59f001d298003d1f9cd84cde
                                                      • Opcode Fuzzy Hash: b0281cba9cf0066b2e37c70feef55d558e29764d628d884b601d2a81985b0093
                                                      • Instruction Fuzzy Hash: 8491A5782046019BCB08EF10C451A6AB7E5EF94358F0089ADFCA65B7A3DB31ED89DB45
                                                      APIs
                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00C5BCA1
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00C595AF), ref: 00C5BCFD
                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00C5BD36
                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00C5BD79
                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00C5BDB0
                                                      • FreeLibrary.KERNEL32(?), ref: 00C5BDBC
                                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00C5BDCC
                                                      • DestroyIcon.USER32(?,?,?,?,?,00C595AF), ref: 00C5BDDB
                                                      • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00C5BDF8
                                                      • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00C5BE04
                                                        • Part of subcall function 00BF305F: __wcsicmp_l.LIBCMT ref: 00BF30E8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                      • String ID: .dll$.exe$.icl
                                                      • API String ID: 1212759294-1154884017
                                                      • Opcode ID: e305aaef825aa5ef47e934ad61f16edf01a05547c403afa7f6ed4b768022d8de
                                                      • Instruction ID: f6ad59b3bc76f0fac0ad240fa04049252eb3852f38d522f4d822f046595aa69e
                                                      • Opcode Fuzzy Hash: e305aaef825aa5ef47e934ad61f16edf01a05547c403afa7f6ed4b768022d8de
                                                      • Instruction Fuzzy Hash: 6861FE75500619BAEB24DF60CC41BBE7BB8EB08712F104156FD25E61D0DBB4AE88CBA4
                                                      APIs
                                                      • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00C3A12F
                                                        • Part of subcall function 00BE1A36: _memmove.LIBCMT ref: 00BE1A77
                                                      • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00C3A150
                                                      • __swprintf.LIBCMT ref: 00C3A1A9
                                                      • __swprintf.LIBCMT ref: 00C3A1C2
                                                      • _wprintf.LIBCMT ref: 00C3A269
                                                      • _wprintf.LIBCMT ref: 00C3A287
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: LoadString__swprintf_wprintf$_memmove
                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                      • API String ID: 311963372-3080491070
                                                      • Opcode ID: 86f0787c057b765444b44ad04d04cb7a7cf72c048d5ba4e3c082ef942dca4d61
                                                      • Instruction ID: a490163235643a4282ed9a124b1a5b244138473372106c15358e658cb671fccd
                                                      • Opcode Fuzzy Hash: 86f0787c057b765444b44ad04d04cb7a7cf72c048d5ba4e3c082ef942dca4d61
                                                      • Instruction Fuzzy Hash: 4951B171900149AACF15EBE5CD46FEEB7B9EF04340F2005A5F515B21A2DB322F58DB61
                                                      APIs
                                                        • Part of subcall function 00BD4D37: __itow.LIBCMT ref: 00BD4D62
                                                        • Part of subcall function 00BD4D37: __swprintf.LIBCMT ref: 00BD4DAC
                                                      • CharLowerBuffW.USER32(?,?), ref: 00C3A87B
                                                      • GetDriveTypeW.KERNEL32 ref: 00C3A8C8
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C3A910
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C3A947
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C3A975
                                                        • Part of subcall function 00BE1821: _memmove.LIBCMT ref: 00BE185B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                      • API String ID: 2698844021-4113822522
                                                      • Opcode ID: 717422ea484a3b02b96887f32f5a89ca7f4fb5b2d34eb1f9867bd3c2b8126994
                                                      • Instruction ID: b8593ab4b40dcd945b53acfda1796f398d4bdef8a8f05023395ca6972594e269
                                                      • Opcode Fuzzy Hash: 717422ea484a3b02b96887f32f5a89ca7f4fb5b2d34eb1f9867bd3c2b8126994
                                                      • Instruction Fuzzy Hash: 88516D711143049FC700EF15C88196AB7E8FF88758F1449ADF89AA7262DB31EE09CB92
                                                      APIs
                                                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00C3A6BF
                                                      • __swprintf.LIBCMT ref: 00C3A6E1
                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00C3A71E
                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00C3A743
                                                      • _memset.LIBCMT ref: 00C3A762
                                                      • _wcsncpy.LIBCMT ref: 00C3A79E
                                                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00C3A7D3
                                                      • CloseHandle.KERNEL32(00000000), ref: 00C3A7DE
                                                      • RemoveDirectoryW.KERNEL32(?), ref: 00C3A7E7
                                                      • CloseHandle.KERNEL32(00000000), ref: 00C3A7F1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                      • String ID: :$\$\??\%s
                                                      • API String ID: 2733774712-3457252023
                                                      • Opcode ID: c1b2ce786923184ede2e54834d3faefdc06992f82ca59ca87fb73432bd36cd3d
                                                      • Instruction ID: fa44a5b652fb5be5646626ca3092671c7d13b64a3e31d5dfa007afa9312f2bc5
                                                      • Opcode Fuzzy Hash: c1b2ce786923184ede2e54834d3faefdc06992f82ca59ca87fb73432bd36cd3d
                                                      • Instruction Fuzzy Hash: B4318171510109ABDB219FA1DC89FEF77BCAF89700F2041B6FA19E2160E77097948B65
                                                      APIs
                                                        • Part of subcall function 00BD29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BD29F3
                                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00C5C61F
                                                      • GetFocus.USER32 ref: 00C5C62F
                                                      • GetDlgCtrlID.USER32(00000000), ref: 00C5C63A
                                                      • _memset.LIBCMT ref: 00C5C765
                                                      • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00C5C790
                                                      • GetMenuItemCount.USER32(?), ref: 00C5C7B0
                                                      • GetMenuItemID.USER32(?,00000000), ref: 00C5C7C3
                                                      • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00C5C7F7
                                                      • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00C5C83F
                                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00C5C877
                                                      • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00C5C8AC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                      • String ID: 0
                                                      • API String ID: 1296962147-4108050209
                                                      • Opcode ID: 9a7cd59a21a35b5d7e12bf7beb2e20ee4da2923558ad8638375a92f205d209ba
                                                      • Instruction ID: 37667dc497f91168f99f5b43620a45a7ad478524b427ebcaca5ac84306225d62
                                                      • Opcode Fuzzy Hash: 9a7cd59a21a35b5d7e12bf7beb2e20ee4da2923558ad8638375a92f205d209ba
                                                      • Instruction Fuzzy Hash: A3818E745083019FD720CF15C884A6FBBE8FB88355F10492EFD95A7291D770DA89CBAA
                                                      APIs
                                                        • Part of subcall function 00C28C03: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00C28C1F
                                                        • Part of subcall function 00C28C03: GetLastError.KERNEL32(?,00C286E3,?,?,?), ref: 00C28C29
                                                        • Part of subcall function 00C28C03: GetProcessHeap.KERNEL32(00000008,?,?,00C286E3,?,?,?), ref: 00C28C38
                                                        • Part of subcall function 00C28C03: HeapAlloc.KERNEL32(00000000,?,00C286E3,?,?,?), ref: 00C28C3F
                                                        • Part of subcall function 00C28C03: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00C28C56
                                                        • Part of subcall function 00C28CA0: GetProcessHeap.KERNEL32(00000008,00C286F9,00000000,00000000,?,00C286F9,?), ref: 00C28CAC
                                                        • Part of subcall function 00C28CA0: HeapAlloc.KERNEL32(00000000,?,00C286F9,?), ref: 00C28CB3
                                                        • Part of subcall function 00C28CA0: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00C286F9,?), ref: 00C28CC4
                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00C28911
                                                      • _memset.LIBCMT ref: 00C28926
                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00C28945
                                                      • GetLengthSid.ADVAPI32(?), ref: 00C28956
                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 00C28993
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00C289AF
                                                      • GetLengthSid.ADVAPI32(?), ref: 00C289CC
                                                      • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00C289DB
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00C289E2
                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00C28A03
                                                      • CopySid.ADVAPI32(00000000), ref: 00C28A0A
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00C28A3B
                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00C28A61
                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00C28A75
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                      • String ID:
                                                      • API String ID: 3996160137-0
                                                      • Opcode ID: 988dad9d586bbaf01096701c763737a1b247fa848ae076e9d45422abd14362bc
                                                      • Instruction ID: 566e41108d56ad52cb2b5fe8eeb3803634591767fd20b2c0d0ee40bf7f4c8d1b
                                                      • Opcode Fuzzy Hash: 988dad9d586bbaf01096701c763737a1b247fa848ae076e9d45422abd14362bc
                                                      • Instruction Fuzzy Hash: AA613A71901219EFDF10DFA5EC45FEEBB79FF04300F14812AE925A6290DB759A09DB60
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 00C4783E
                                                      • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00C4784A
                                                      • CreateCompatibleDC.GDI32(?), ref: 00C47856
                                                      • SelectObject.GDI32(00000000,?), ref: 00C47863
                                                      • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00C478B7
                                                      • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00C478F3
                                                      • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00C47917
                                                      • SelectObject.GDI32(00000006,?), ref: 00C4791F
                                                      • DeleteObject.GDI32(?), ref: 00C47928
                                                      • DeleteDC.GDI32(00000006), ref: 00C4792F
                                                      • ReleaseDC.USER32(00000000,?), ref: 00C4793A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                      • String ID: (
                                                      • API String ID: 2598888154-3887548279
                                                      • Opcode ID: b4408e689abcf9f3f27450d2643e32005168639bd812bc60c1911944ee2e9ceb
                                                      • Instruction ID: 8be441c0cb043927441cb3bea8b01e4d767ba0aa470ebbec9c2a90eddd9f5e59
                                                      • Opcode Fuzzy Hash: b4408e689abcf9f3f27450d2643e32005168639bd812bc60c1911944ee2e9ceb
                                                      • Instruction Fuzzy Hash: 91511771904209AFCB25CFA9CC89FAEBBB9FF48310F148519F95AA7250D771A941CB60
                                                      APIs
                                                      • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00C3A341
                                                        • Part of subcall function 00BE1A36: _memmove.LIBCMT ref: 00BE1A77
                                                      • LoadStringW.USER32(?,?,00000FFF,?), ref: 00C3A363
                                                      • __swprintf.LIBCMT ref: 00C3A3BC
                                                      • __swprintf.LIBCMT ref: 00C3A3D5
                                                      • _wprintf.LIBCMT ref: 00C3A48B
                                                      • _wprintf.LIBCMT ref: 00C3A4A9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: LoadString__swprintf_wprintf$_memmove
                                                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                      • API String ID: 311963372-2391861430
                                                      • Opcode ID: fc1853d709d3ee7a1a041a6720e9930fde1d1870cfc3dc8a73180203370c4346
                                                      • Instruction ID: 7d6a4eae3565c750e38fd979f4f730cf2524ba22f44aede839cd5ac5b2058d47
                                                      • Opcode Fuzzy Hash: fc1853d709d3ee7a1a041a6720e9930fde1d1870cfc3dc8a73180203370c4346
                                                      • Instruction Fuzzy Hash: 6651C071800149BACF14EBE5CD86EEEB7B9EF04300F2045A5F515B21A2EB716F58DB61
                                                      APIs
                                                        • Part of subcall function 00C39387: __time64.LIBCMT ref: 00C39391
                                                        • Part of subcall function 00BE4A8C: _fseek.LIBCMT ref: 00BE4AA4
                                                      • __wsplitpath.LIBCMT ref: 00C3965C
                                                        • Part of subcall function 00BF424E: __wsplitpath_helper.LIBCMT ref: 00BF428E
                                                      • _wcscpy.LIBCMT ref: 00C3966F
                                                      • _wcscat.LIBCMT ref: 00C39682
                                                      • __wsplitpath.LIBCMT ref: 00C396A7
                                                      • _wcscat.LIBCMT ref: 00C396BD
                                                      • _wcscat.LIBCMT ref: 00C396D0
                                                        • Part of subcall function 00C393CD: _memmove.LIBCMT ref: 00C39406
                                                        • Part of subcall function 00C393CD: _memmove.LIBCMT ref: 00C39415
                                                      • _wcscmp.LIBCMT ref: 00C39617
                                                        • Part of subcall function 00C39B5E: _wcscmp.LIBCMT ref: 00C39C4E
                                                        • Part of subcall function 00C39B5E: _wcscmp.LIBCMT ref: 00C39C61
                                                      • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00C3987A
                                                      • _wcsncpy.LIBCMT ref: 00C398ED
                                                      • DeleteFileW.KERNEL32(?,?), ref: 00C39923
                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00C39939
                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00C3994A
                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00C3995C
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                      • String ID:
                                                      • API String ID: 1500180987-0
                                                      • Opcode ID: e230102301fbb21f457397bb4c09aff97f51be60508e2a4eb1fadbccd532faed
                                                      • Instruction ID: 47cbd5e36a28a6559c593959f6cb258c97a2725cc133bb94c914fb7b30e0377c
                                                      • Opcode Fuzzy Hash: e230102301fbb21f457397bb4c09aff97f51be60508e2a4eb1fadbccd532faed
                                                      • Instruction Fuzzy Hash: 33C13BB1D1021DAADF21DF95CC85AEEB7BDEF45310F0040AAF609E7151EBB09A848F65
                                                      APIs
                                                      • _memset.LIBCMT ref: 00BE5BF1
                                                      • GetMenuItemCount.USER32(00C96890), ref: 00C20DFB
                                                      • GetMenuItemCount.USER32(00C96890), ref: 00C20EAB
                                                      • GetCursorPos.USER32(?), ref: 00C20EEF
                                                      • SetForegroundWindow.USER32(00000000), ref: 00C20EF8
                                                      • TrackPopupMenuEx.USER32(00C96890,00000000,?,00000000,00000000,00000000), ref: 00C20F0B
                                                      • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00C20F17
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                                      • String ID:
                                                      • API String ID: 2751501086-0
                                                      • Opcode ID: 5c0641e6bbb1036ab96b6672d8c3aaa4989f958c273c42c431930be04585e5e0
                                                      • Instruction ID: fba9398f51452c025c9875b6de6f3ec024fd0fdd4713999226e5aab3140562d6
                                                      • Opcode Fuzzy Hash: 5c0641e6bbb1036ab96b6672d8c3aaa4989f958c273c42c431930be04585e5e0
                                                      • Instruction Fuzzy Hash: 6A71F170641619BFEB308B55EC89FAABFA4FF04328F300217F5246A2D2C7B06850DB94
                                                      APIs
                                                        • Part of subcall function 00BE1821: _memmove.LIBCMT ref: 00BE185B
                                                      • _memset.LIBCMT ref: 00C2826C
                                                      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00C282A1
                                                      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00C282BD
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00C282D9
                                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00C28303
                                                      • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00C2832B
                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00C28336
                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00C2833B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                      • API String ID: 1411258926-22481851
                                                      • Opcode ID: 95b196434b29a5471be0008a27d12d978a4378d20c588cfb18c43767a7abb03f
                                                      • Instruction ID: ef292506f1efda5dad5d1eac03ebe71fe871f33e156152fca2754dd72234b8a0
                                                      • Opcode Fuzzy Hash: 95b196434b29a5471be0008a27d12d978a4378d20c588cfb18c43767a7abb03f
                                                      • Instruction Fuzzy Hash: CA412876C1022CABCF21EBA5DC95EEEB7B8FF04740B504569E911B3261DB705E09CB90
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C501D5,?,?), ref: 00C51259
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpper
                                                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                      • API String ID: 3964851224-909552448
                                                      • Opcode ID: db38fdc41b2538f018d675d4956fae419efe3b026715c012b70a1b6659c5e319
                                                      • Instruction ID: b0917c9da7140c24b192fbe01387f14da32b51ec7cd039419a66fdf032fcf1a3
                                                      • Opcode Fuzzy Hash: db38fdc41b2538f018d675d4956fae419efe3b026715c012b70a1b6659c5e319
                                                      • Instruction Fuzzy Hash: 0B41BB7811024A8BDF04EF10C869BFE33A4FF91305F540895EC660B6A2DB719E5ECB64
                                                      APIs
                                                        • Part of subcall function 00BE1821: _memmove.LIBCMT ref: 00BE185B
                                                        • Part of subcall function 00BE153B: _memmove.LIBCMT ref: 00BE15C4
                                                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00C35758
                                                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00C3576E
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C3577F
                                                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00C35791
                                                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00C357A2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: SendString$_memmove
                                                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                      • API String ID: 2279737902-1007645807
                                                      • Opcode ID: 91e7306540cb44ede9b419d38f33bf6430e8c06735ef60635500fb4308976c21
                                                      • Instruction ID: 14c0c46c624eed55194a5207e1d35caf13cdd4b5143d91b74000bfd60768fd91
                                                      • Opcode Fuzzy Hash: 91e7306540cb44ede9b419d38f33bf6430e8c06735ef60635500fb4308976c21
                                                      • Instruction Fuzzy Hash: 3C11827096015979DB20B666DC5ADFF6BBCEFE2B44F140879B411A21D1EE701905CAA0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                      • String ID: 0.0.0.0
                                                      • API String ID: 208665112-3771769585
                                                      • Opcode ID: 8e60675eba1089ed638bc4f90f6192bd7f052c9f7c0b797833c897c1e27d63cd
                                                      • Instruction ID: 74882a5f2b972e26787b317a92e99cc5923ba912b436a3e6cc7147f7937c182e
                                                      • Opcode Fuzzy Hash: 8e60675eba1089ed638bc4f90f6192bd7f052c9f7c0b797833c897c1e27d63cd
                                                      • Instruction Fuzzy Hash: 61112432914108ABCB24BBA19C4AFEFB7BCDF40314F1401B5F105A7092EFB0EA859B91
                                                      APIs
                                                      • timeGetTime.WINMM ref: 00C353A2
                                                        • Part of subcall function 00BF074E: timeGetTime.WINMM(?,00000002,00BDC22C), ref: 00BF0752
                                                      • Sleep.KERNEL32(0000000A), ref: 00C353CE
                                                      • EnumThreadWindows.USER32(?,Function_00065350,00000000), ref: 00C353F2
                                                      • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00C35414
                                                      • SetActiveWindow.USER32 ref: 00C35433
                                                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00C35441
                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00C35460
                                                      • Sleep.KERNEL32(000000FA), ref: 00C3546B
                                                      • IsWindow.USER32 ref: 00C35477
                                                      • EndDialog.USER32(00000000), ref: 00C35488
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                      • String ID: BUTTON
                                                      • API String ID: 1194449130-3405671355
                                                      • Opcode ID: 991bfa7e9bd7ae0fc0fd604c5d7379d43016c43b24af92a19c2085ceccd0a61c
                                                      • Instruction ID: 23a657f6054fa81543f21a5f481e8cb912e65c8e5c93e4c8fd55a9511e2a7fe0
                                                      • Opcode Fuzzy Hash: 991bfa7e9bd7ae0fc0fd604c5d7379d43016c43b24af92a19c2085ceccd0a61c
                                                      • Instruction Fuzzy Hash: 5C21D570229A09AFE7906B31ED8DB2F3B69EB46346F241515F511921B1CBF1CE50DB23
                                                      APIs
                                                        • Part of subcall function 00BD4D37: __itow.LIBCMT ref: 00BD4D62
                                                        • Part of subcall function 00BD4D37: __swprintf.LIBCMT ref: 00BD4DAC
                                                      • CoInitialize.OLE32(00000000), ref: 00C3DA9A
                                                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00C3DB2D
                                                      • SHGetDesktopFolder.SHELL32(?), ref: 00C3DB41
                                                      • CoCreateInstance.OLE32(00C63D4C,00000000,00000001,00C89BEC,?), ref: 00C3DB8D
                                                      • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00C3DBFC
                                                      • CoTaskMemFree.OLE32(?,?), ref: 00C3DC54
                                                      • _memset.LIBCMT ref: 00C3DC91
                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00C3DCCD
                                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00C3DCF0
                                                      • CoTaskMemFree.OLE32(00000000), ref: 00C3DCF7
                                                      • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00C3DD2E
                                                      • CoUninitialize.OLE32(00000001,00000000), ref: 00C3DD30
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                      • String ID:
                                                      • API String ID: 1246142700-0
                                                      • Opcode ID: 1cf9868513f0bfe94cac9fb7384ce674142a38a5325a20155754f61e6b71fdaf
                                                      • Instruction ID: 900afc398ee51c7130db998cb764ad29b1afd5de797939b042166f5351d49ac2
                                                      • Opcode Fuzzy Hash: 1cf9868513f0bfe94cac9fb7384ce674142a38a5325a20155754f61e6b71fdaf
                                                      • Instruction Fuzzy Hash: 9DB1FB75A10109AFDB14DFA4D888EAEBBF9EF48304F148499F906EB251DB30AD45CB50
                                                      APIs
                                                      • GetKeyboardState.USER32(?), ref: 00C30702
                                                      • SetKeyboardState.USER32(?), ref: 00C3076D
                                                      • GetAsyncKeyState.USER32(000000A0), ref: 00C3078D
                                                      • GetKeyState.USER32(000000A0), ref: 00C307A4
                                                      • GetAsyncKeyState.USER32(000000A1), ref: 00C307D3
                                                      • GetKeyState.USER32(000000A1), ref: 00C307E4
                                                      • GetAsyncKeyState.USER32(00000011), ref: 00C30810
                                                      • GetKeyState.USER32(00000011), ref: 00C3081E
                                                      • GetAsyncKeyState.USER32(00000012), ref: 00C30847
                                                      • GetKeyState.USER32(00000012), ref: 00C30855
                                                      • GetAsyncKeyState.USER32(0000005B), ref: 00C3087E
                                                      • GetKeyState.USER32(0000005B), ref: 00C3088C
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: State$Async$Keyboard
                                                      • String ID:
                                                      • API String ID: 541375521-0
                                                      • Opcode ID: 3d6ee20f49c634d6d76118337478621aa6367723c7f8482867e71ce801eef5e7
                                                      • Instruction ID: cfc9597ab3d4110da925e9215df1adc5449f96ab73f5f90d4dc27171172fb216
                                                      • Opcode Fuzzy Hash: 3d6ee20f49c634d6d76118337478621aa6367723c7f8482867e71ce801eef5e7
                                                      • Instruction Fuzzy Hash: 2051B93291478829FB35E7B084257EBBFB49F01340F18459ED9D2575C3DA54AB8CCBA2
                                                      APIs
                                                      • GetDlgItem.USER32(?,00000001), ref: 00C2CBFF
                                                      • GetWindowRect.USER32(00000000,?), ref: 00C2CC11
                                                      • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00C2CC6F
                                                      • GetDlgItem.USER32(?,00000002), ref: 00C2CC7A
                                                      • GetWindowRect.USER32(00000000,?), ref: 00C2CC8C
                                                      • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00C2CCE0
                                                      • GetDlgItem.USER32(?,000003E9), ref: 00C2CCEE
                                                      • GetWindowRect.USER32(00000000,?), ref: 00C2CCFF
                                                      • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00C2CD42
                                                      • GetDlgItem.USER32(?,000003EA), ref: 00C2CD50
                                                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00C2CD6D
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00C2CD7A
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Window$ItemMoveRect$Invalidate
                                                      • String ID:
                                                      • API String ID: 3096461208-0
                                                      • Opcode ID: c0602e3cf69010aa6bd36f657bb69fa06d681a7597e420024fa73c0e01d564cc
                                                      • Instruction ID: f7a75caa4b2bf3d5231113d1166bf65fa748ef5ff7ee545a4e33079314fc2f01
                                                      • Opcode Fuzzy Hash: c0602e3cf69010aa6bd36f657bb69fa06d681a7597e420024fa73c0e01d564cc
                                                      • Instruction Fuzzy Hash: 97513471B00605AFDB18CF69DD85BAEBBB5EB88310F14812DF516E7691D7B0DE008B50
                                                      APIs
                                                        • Part of subcall function 00BD1F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00BD2412,?,00000000,?,?,?,?,00BD1AA7,00000000,?), ref: 00BD1F76
                                                      • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00BD24AF
                                                      • KillTimer.USER32(-00000001,?,?,?,?,00BD1AA7,00000000,?,?,00BD1EBE,?,?), ref: 00BD254A
                                                      • DestroyAcceleratorTable.USER32(00000000), ref: 00C0BF17
                                                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00BD1AA7,00000000,?,?,00BD1EBE,?,?), ref: 00C0BF48
                                                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00BD1AA7,00000000,?,?,00BD1EBE,?,?), ref: 00C0BF5F
                                                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00BD1AA7,00000000,?,?,00BD1EBE,?,?), ref: 00C0BF7B
                                                      • DeleteObject.GDI32(00000000), ref: 00C0BF8D
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                      • String ID:
                                                      • API String ID: 641708696-0
                                                      • Opcode ID: 70bc77c2121e4c9b845d3145c45914d2f93aedc9e8322238f6ed25c364a8aad8
                                                      • Instruction ID: 0320dc34deed053616571c1fc1c1789da8dd854993073c07d180c1a9c1cadc6c
                                                      • Opcode Fuzzy Hash: 70bc77c2121e4c9b845d3145c45914d2f93aedc9e8322238f6ed25c364a8aad8
                                                      • Instruction Fuzzy Hash: 1461A734100652DFCB259F18D988B2AB7F1FF60316F20896AE95257BE0D771AD80DF90
                                                      APIs
                                                        • Part of subcall function 00BD29AB: GetWindowLongW.USER32(?,000000EB), ref: 00BD29BC
                                                      • GetSysColor.USER32(0000000F), ref: 00BD25AF
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ColorLongWindow
                                                      • String ID:
                                                      • API String ID: 259745315-0
                                                      • Opcode ID: 36cb0f047f185fe05910366d5d2bf88723f2e1eda9e405ec1da13d90db56a921
                                                      • Instruction ID: 7b144f61b9fe5305b74e9ab49bd9b17c288d8fc046c0dc727ab7a74202c19930
                                                      • Opcode Fuzzy Hash: 36cb0f047f185fe05910366d5d2bf88723f2e1eda9e405ec1da13d90db56a921
                                                      • Instruction Fuzzy Hash: A741C5300042809FDB255F28DC88BBD77A5EB26335F1543A2FD669A2E6E770CD41DB21
                                                      APIs
                                                        • Part of subcall function 00BF0AB6: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00BE2A3E,?,00008000), ref: 00BF0AD2
                                                        • Part of subcall function 00BF01AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00BE2A58,?,00008000), ref: 00BF01CF
                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00BE2ADF
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00BE2C2C
                                                        • Part of subcall function 00BE3EBE: _wcscpy.LIBCMT ref: 00BE3EF6
                                                        • Part of subcall function 00BF379F: _iswctype.LIBCMT ref: 00BF37A7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                      • String ID: #include depth exceeded. Make sure there are no recursive includes$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                      • API String ID: 537147316-3738523708
                                                      • Opcode ID: 99d22f262f049acbea1d4f6b3c3d10ce1cbccff3545ea291d4b8465c1d45d608
                                                      • Instruction ID: ec8828c7b5c7696b037f0ee755abf4dbfb1ade2d43dd9055389c3f24bec76b62
                                                      • Opcode Fuzzy Hash: 99d22f262f049acbea1d4f6b3c3d10ce1cbccff3545ea291d4b8465c1d45d608
                                                      • Instruction Fuzzy Hash: 7102B3701083819FC724EF25C891AAFBBE5FF85314F10496DF595932A2DB30DA4ADB42
                                                      APIs
                                                      • CharLowerBuffW.USER32(?,?,00C60980), ref: 00C3ADBB
                                                      • GetDriveTypeW.KERNEL32(00000061,00C89970,00000061), ref: 00C3AE85
                                                      • _wcscpy.LIBCMT ref: 00C3AEAF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: BuffCharDriveLowerType_wcscpy
                                                      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                      • API String ID: 2820617543-1000479233
                                                      • Opcode ID: 9a2723c508d0e5771d93b656c006a5f5d54f34947f1bed9bcadf3b58aa74e561
                                                      • Instruction ID: 8760bb94ac1026af96703fcd3242bbde63bf10a3219df428d2bdadd8231ec17d
                                                      • Opcode Fuzzy Hash: 9a2723c508d0e5771d93b656c006a5f5d54f34947f1bed9bcadf3b58aa74e561
                                                      • Instruction Fuzzy Hash: 9251B0701283019BC714EF15C891AABB7E9FF84304F50486DF5AA572A2DB719E29CB92
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: __i64tow__itow__swprintf
                                                      • String ID: %.15g$0x%p$False$True
                                                      • API String ID: 421087845-2263619337
                                                      • Opcode ID: 30a396eb4a5e5c55aa8ac0d261b93f4a6cf20dca4129d84d5004db6909d10b62
                                                      • Instruction ID: 47caa7f5c875ea6faea52f14609387acbe59dd436888e8346350f4c4a4a401a4
                                                      • Opcode Fuzzy Hash: 30a396eb4a5e5c55aa8ac0d261b93f4a6cf20dca4129d84d5004db6909d10b62
                                                      • Instruction Fuzzy Hash: DD41E771614209AFDB24EF74C882E7AB3E9EF44300F2444AEE15AD7291FB319E41DB10
                                                      APIs
                                                      • _memset.LIBCMT ref: 00C57557
                                                      • CreateMenu.USER32 ref: 00C57572
                                                      • SetMenu.USER32(?,00000000), ref: 00C57581
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C5760E
                                                      • IsMenu.USER32(?), ref: 00C57624
                                                      • CreatePopupMenu.USER32 ref: 00C5762E
                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00C5765B
                                                      • DrawMenuBar.USER32 ref: 00C57663
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                      • String ID: 0$F
                                                      • API String ID: 176399719-3044882817
                                                      • Opcode ID: 0a0494104987b6a955095730ebd31027e816e1d91888715c238be2856444c82e
                                                      • Instruction ID: b40aaf736e6d10a57cc2e5646f1ef47fcd3bdc5187ff0d10e1256e011ab36504
                                                      • Opcode Fuzzy Hash: 0a0494104987b6a955095730ebd31027e816e1d91888715c238be2856444c82e
                                                      • Instruction Fuzzy Hash: E8415978A00205EFDB20DF65E844B9A7BB5FF48341F140129FD15A73A0DB70AA54CF98
                                                      APIs
                                                      • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00C5794B
                                                      • CreateCompatibleDC.GDI32(00000000), ref: 00C57952
                                                      • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00C57965
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00C5796D
                                                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 00C57978
                                                      • DeleteDC.GDI32(00000000), ref: 00C57981
                                                      • GetWindowLongW.USER32(?,000000EC), ref: 00C5798B
                                                      • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00C5799F
                                                      • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00C579AB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                      • String ID: static
                                                      • API String ID: 2559357485-2160076837
                                                      • Opcode ID: 03c7b03ac97e9f0ba8ee5057b19f8eef60c7b48a09723059cd82300b8637649c
                                                      • Instruction ID: 05ea092bf372da8af1de72daa46de614affcda4c1665111c4d0c35ca7be83773
                                                      • Opcode Fuzzy Hash: 03c7b03ac97e9f0ba8ee5057b19f8eef60c7b48a09723059cd82300b8637649c
                                                      • Instruction Fuzzy Hash: 06317A36104119ABDF229F65EC09FDF3B69EF09321F200315FA65A21A0C771D9A5DBA8
                                                      APIs
                                                      • _memset.LIBCMT ref: 00BF6F9B
                                                        • Part of subcall function 00BF8C88: __getptd_noexit.LIBCMT ref: 00BF8C88
                                                      • __gmtime64_s.LIBCMT ref: 00BF7034
                                                      • __gmtime64_s.LIBCMT ref: 00BF706A
                                                      • __gmtime64_s.LIBCMT ref: 00BF7087
                                                      • __allrem.LIBCMT ref: 00BF70DD
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00BF70F9
                                                      • __allrem.LIBCMT ref: 00BF7110
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00BF712E
                                                      • __allrem.LIBCMT ref: 00BF7145
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00BF7163
                                                      • __invoke_watson.LIBCMT ref: 00BF71D4
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                      • String ID:
                                                      • API String ID: 384356119-0
                                                      • Opcode ID: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                      • Instruction ID: 4aa081e2d091c1d848a5ade2ee1859c9752db03481f43e8ead5f25c1094293a9
                                                      • Opcode Fuzzy Hash: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                      • Instruction Fuzzy Hash: 4E71D871A4071AABD7149E79DC42B7AB3E8EF10764F1442B9FA14E76C1EB70DA0887D0
                                                      APIs
                                                      • _memset.LIBCMT ref: 00C32B55
                                                      • GetMenuItemInfoW.USER32(00C96890,000000FF,00000000,00000030), ref: 00C32BB6
                                                      • SetMenuItemInfoW.USER32(00C96890,00000004,00000000,00000030), ref: 00C32BEC
                                                      • Sleep.KERNEL32(000001F4), ref: 00C32BFE
                                                      • GetMenuItemCount.USER32(?), ref: 00C32C42
                                                      • GetMenuItemID.USER32(?,00000000), ref: 00C32C5E
                                                      • GetMenuItemID.USER32(?,-00000001), ref: 00C32C88
                                                      • GetMenuItemID.USER32(?,?), ref: 00C32CCD
                                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00C32D13
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C32D27
                                                      • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C32D48
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                      • String ID:
                                                      • API String ID: 4176008265-0
                                                      • Opcode ID: 5c05d98919a6b95f6e759a100d06afdbc08f3ebf62887fa8f5e04db427faaed7
                                                      • Instruction ID: b944c8986de5e0cf393b1516089577314a5423ec1d7ce5ef2d73bbbcc72f5385
                                                      • Opcode Fuzzy Hash: 5c05d98919a6b95f6e759a100d06afdbc08f3ebf62887fa8f5e04db427faaed7
                                                      • Instruction Fuzzy Hash: 3F6194B0910249AFDF21CF65DC88EBFBBB8FB41304F240459E852A7291D771AE45DB61
                                                      APIs
                                                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00C57392
                                                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00C57395
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00C573B9
                                                      • _memset.LIBCMT ref: 00C573CA
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00C573DC
                                                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00C57454
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$LongWindow_memset
                                                      • String ID:
                                                      • API String ID: 830647256-0
                                                      • Opcode ID: 943ed5231ff97ce5d0668da8a3e52afb200dc7e51f268dcd55eb0e606055fc9b
                                                      • Instruction ID: 5a3ab015d49fefab6d9a08a0ee2b94e5aa94c47f9adf8452ca5d02fff79c64ff
                                                      • Opcode Fuzzy Hash: 943ed5231ff97ce5d0668da8a3e52afb200dc7e51f268dcd55eb0e606055fc9b
                                                      • Instruction Fuzzy Hash: 52616A75900248AFDB11DFA4DC85EEE7BF8AB08710F10015AFE14A72A1D770AE85DF94
                                                      APIs
                                                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00C275C0
                                                      • SafeArrayAllocData.OLEAUT32(?), ref: 00C27619
                                                      • VariantInit.OLEAUT32(?), ref: 00C2762B
                                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 00C2764B
                                                      • VariantCopy.OLEAUT32(?,?), ref: 00C2769E
                                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 00C276B2
                                                      • VariantClear.OLEAUT32(?), ref: 00C276C7
                                                      • SafeArrayDestroyData.OLEAUT32(?), ref: 00C276D4
                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00C276DD
                                                      • VariantClear.OLEAUT32(?), ref: 00C276EF
                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00C276FA
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                      • String ID:
                                                      • API String ID: 2706829360-0
                                                      • Opcode ID: c41759dc3b069340fd5c6775a0b41b4a279d4d4251de612f116955fc1bea9473
                                                      • Instruction ID: 3a43e3c34d762657bbeb1e258b3cf35b969df062ae1abc1b7114129c309e9108
                                                      • Opcode Fuzzy Hash: c41759dc3b069340fd5c6775a0b41b4a279d4d4251de612f116955fc1bea9473
                                                      • Instruction Fuzzy Hash: DD418335A042199FCF11DF69D888EAEBBB9FF08350F108169F915A7261DB70E945CF90
                                                      APIs
                                                      • GetKeyboardState.USER32(?), ref: 00C3039C
                                                      • GetAsyncKeyState.USER32(000000A0), ref: 00C3041D
                                                      • GetKeyState.USER32(000000A0), ref: 00C30438
                                                      • GetAsyncKeyState.USER32(000000A1), ref: 00C30452
                                                      • GetKeyState.USER32(000000A1), ref: 00C30467
                                                      • GetAsyncKeyState.USER32(00000011), ref: 00C3047F
                                                      • GetKeyState.USER32(00000011), ref: 00C30491
                                                      • GetAsyncKeyState.USER32(00000012), ref: 00C304A9
                                                      • GetKeyState.USER32(00000012), ref: 00C304BB
                                                      • GetAsyncKeyState.USER32(0000005B), ref: 00C304D3
                                                      • GetKeyState.USER32(0000005B), ref: 00C304E5
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: State$Async$Keyboard
                                                      • String ID:
                                                      • API String ID: 541375521-0
                                                      • Opcode ID: e813e1dbdcd44dae01028998d95758c659481e574ab88cf017f7310c3630170c
                                                      • Instruction ID: fe9edb1f4b47d29dad0f2b8b7d54648a9554790ef7cc200aa4b1f83f498e13c1
                                                      • Opcode Fuzzy Hash: e813e1dbdcd44dae01028998d95758c659481e574ab88cf017f7310c3630170c
                                                      • Instruction Fuzzy Hash: 6F4129315547CA6AFF31876488243B6BFA06F11300F28805ADBE6575C2EBE45BC4CBA2
                                                      APIs
                                                        • Part of subcall function 00BD4D37: __itow.LIBCMT ref: 00BD4D62
                                                        • Part of subcall function 00BD4D37: __swprintf.LIBCMT ref: 00BD4DAC
                                                      • CoInitialize.OLE32 ref: 00C488B5
                                                      • CoUninitialize.OLE32 ref: 00C488C0
                                                      • CoCreateInstance.OLE32(?,00000000,00000017,00C63BBC,?), ref: 00C48920
                                                      • IIDFromString.OLE32(?,?), ref: 00C48993
                                                      • VariantInit.OLEAUT32(?), ref: 00C48A2D
                                                      • VariantClear.OLEAUT32(?), ref: 00C48A8E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                      • API String ID: 834269672-1287834457
                                                      • Opcode ID: bb4de0b2f9628c4322d1045a0f6b3922f78ee61726dd47460e30fb3f8996cc88
                                                      • Instruction ID: bad3dc6abca3e6c936cec4635933295cc7eae0f777ff89a69d1085aec829ad80
                                                      • Opcode Fuzzy Hash: bb4de0b2f9628c4322d1045a0f6b3922f78ee61726dd47460e30fb3f8996cc88
                                                      • Instruction Fuzzy Hash: 2C61AC30608711AFC720DF15C848B6EB7E8FF48714F14085AF985AB291DB70EE48DB92
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 00C3B980
                                                      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00C3B9F6
                                                      • GetLastError.KERNEL32 ref: 00C3BA00
                                                      • SetErrorMode.KERNEL32(00000000,READY), ref: 00C3BA6D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Error$Mode$DiskFreeLastSpace
                                                      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                      • API String ID: 4194297153-14809454
                                                      • Opcode ID: 4889f8271ce1455d6f872a5be75879d4028bf4b12f94cd4a0641079af3bfd983
                                                      • Instruction ID: b20630ef123a5f114da15802eb293d5c7c35f4fa3a3306c3f343d459428fe676
                                                      • Opcode Fuzzy Hash: 4889f8271ce1455d6f872a5be75879d4028bf4b12f94cd4a0641079af3bfd983
                                                      • Instruction Fuzzy Hash: 24312535A10605AFCB10EF69C885FBEB7B4FF04300F248466EA16E7291DB719E05DB40
                                                      APIs
                                                        • Part of subcall function 00BE1A36: _memmove.LIBCMT ref: 00BE1A77
                                                        • Part of subcall function 00C2B57D: GetClassNameW.USER32(?,?,000000FF), ref: 00C2B5A0
                                                      • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00C299AF
                                                      • GetDlgCtrlID.USER32 ref: 00C299BA
                                                      • GetParent.USER32 ref: 00C299D6
                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00C299D9
                                                      • GetDlgCtrlID.USER32(?), ref: 00C299E2
                                                      • GetParent.USER32(?), ref: 00C299FE
                                                      • SendMessageW.USER32(00000000,?,?,00000111), ref: 00C29A01
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 1536045017-1403004172
                                                      • Opcode ID: abace5c7dc8a61f6611ee9f5f1808dcb615c186c84885ca93d462eca6305f134
                                                      • Instruction ID: 3b0b9e9bdc4a4ea7e810acda0d4b09644b3af188123cbeb21cb0ddb53947ce9c
                                                      • Opcode Fuzzy Hash: abace5c7dc8a61f6611ee9f5f1808dcb615c186c84885ca93d462eca6305f134
                                                      • Instruction Fuzzy Hash: 9021F170A00204ABCF00EB61DC85EBEBBB8EF84300F200115F861A72E1DBB58914DA20
                                                      APIs
                                                        • Part of subcall function 00BE1A36: _memmove.LIBCMT ref: 00BE1A77
                                                        • Part of subcall function 00C2B57D: GetClassNameW.USER32(?,?,000000FF), ref: 00C2B5A0
                                                      • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00C29A98
                                                      • GetDlgCtrlID.USER32 ref: 00C29AA3
                                                      • GetParent.USER32 ref: 00C29ABF
                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00C29AC2
                                                      • GetDlgCtrlID.USER32(?), ref: 00C29ACB
                                                      • GetParent.USER32(?), ref: 00C29AE7
                                                      • SendMessageW.USER32(00000000,?,?,00000111), ref: 00C29AEA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 1536045017-1403004172
                                                      • Opcode ID: 5a609cf226ba6adf9392f3bd1b592e5762dc7f5bed7e06ed53c9217cdba1c787
                                                      • Instruction ID: b7bbf7e0103def9f4f4a9c9c6d750fb988d9fb253565f2471788510d9655bb84
                                                      • Opcode Fuzzy Hash: 5a609cf226ba6adf9392f3bd1b592e5762dc7f5bed7e06ed53c9217cdba1c787
                                                      • Instruction Fuzzy Hash: 80219074A00218ABDB10EB65DC85FFEBBB9EB54300F600155F961A7291DBB58915EB20
                                                      APIs
                                                      • GetParent.USER32 ref: 00C29B0A
                                                      • GetClassNameW.USER32(00000000,?,00000100), ref: 00C29B1F
                                                      • _wcscmp.LIBCMT ref: 00C29B31
                                                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00C29BAC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameParentSend_wcscmp
                                                      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                      • API String ID: 1704125052-3381328864
                                                      • Opcode ID: 53a69fa0cf119a8d6838599a15ff1ec594c04eef506dedb79a14dcd6f361fb41
                                                      • Instruction ID: e575213e5c0bc5152b5d67f7b73435de263f5325e51171725e120aaf6bcad9fb
                                                      • Opcode Fuzzy Hash: 53a69fa0cf119a8d6838599a15ff1ec594c04eef506dedb79a14dcd6f361fb41
                                                      • Instruction Fuzzy Hash: 2D11E37664831AFBFA302622FC06EB673DCDB15724F200066FA04B58E2FEB269544655
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 00C48D89
                                                      • CoInitialize.OLE32(00000000), ref: 00C48DB6
                                                      • CoUninitialize.OLE32 ref: 00C48DC0
                                                      • GetRunningObjectTable.OLE32(00000000,?), ref: 00C48EC0
                                                      • SetErrorMode.KERNEL32(00000001,00000029), ref: 00C48FED
                                                      • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00C63BDC), ref: 00C49021
                                                      • CoGetObject.OLE32(?,00000000,00C63BDC,?), ref: 00C49044
                                                      • SetErrorMode.KERNEL32(00000000), ref: 00C49057
                                                      • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00C490D7
                                                      • VariantClear.OLEAUT32(?), ref: 00C490E7
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                      • String ID:
                                                      • API String ID: 2395222682-0
                                                      • Opcode ID: 562116744391936a7087a4ad8c0da8d8044ec84f2052ba6dd6de8f76c6060613
                                                      • Instruction ID: f7263b598983a84562a89aad5214f14b3e3d129fb543ec8d6e634b624e415e8a
                                                      • Opcode Fuzzy Hash: 562116744391936a7087a4ad8c0da8d8044ec84f2052ba6dd6de8f76c6060613
                                                      • Instruction Fuzzy Hash: EFC15470608305AFD700DF68C884A2BB7E9FF88748F10495DF98A9B251DB71ED49CB92
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 00C3185B
                                                      • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00C308D3,?,00000001), ref: 00C3186F
                                                      • GetWindowThreadProcessId.USER32(00000000), ref: 00C31876
                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00C308D3,?,00000001), ref: 00C31885
                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00C31897
                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00C308D3,?,00000001), ref: 00C318B0
                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00C308D3,?,00000001), ref: 00C318C2
                                                      • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00C308D3,?,00000001), ref: 00C31907
                                                      • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00C308D3,?,00000001), ref: 00C3191C
                                                      • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00C308D3,?,00000001), ref: 00C31927
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                      • String ID:
                                                      • API String ID: 2156557900-0
                                                      • Opcode ID: d346aebb5462b61988dff5a49d311218520ddb3e3993030057f928b383739a58
                                                      • Instruction ID: bf96111ef4c3236745005015cf453d72ff436ab40dff78fc7b8f93f6d7e33804
                                                      • Opcode Fuzzy Hash: d346aebb5462b61988dff5a49d311218520ddb3e3993030057f928b383739a58
                                                      • Instruction Fuzzy Hash: 1E31CE71521308EFEB219B91DC5CBBE77ADEB49321F24411AFD10A6290D7B09E408B55
                                                      APIs
                                                      • GetSysColor.USER32(00000008), ref: 00BD260D
                                                      • SetTextColor.GDI32(?,000000FF), ref: 00BD2617
                                                      • SetBkMode.GDI32(?,00000001), ref: 00BD262C
                                                      • GetStockObject.GDI32(00000005), ref: 00BD2634
                                                      • GetClientRect.USER32(?), ref: 00C0C02C
                                                      • SendMessageW.USER32(?,00001328,00000000,?), ref: 00C0C043
                                                      • GetWindowDC.USER32(?), ref: 00C0C04F
                                                      • GetPixel.GDI32(00000000,?,?), ref: 00C0C05E
                                                      • ReleaseDC.USER32(?,00000000), ref: 00C0C070
                                                      • GetSysColor.USER32(00000005), ref: 00C0C08E
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                                      • String ID:
                                                      • API String ID: 3430376129-0
                                                      • Opcode ID: 1abecb98f956fc2aa48876e697ba185753a07ca5aaf27a2d5376f680d8a648fc
                                                      • Instruction ID: de4c9ca54184146fb0780865f12ecf06bf8c38568aee3abeb887278673d19521
                                                      • Opcode Fuzzy Hash: 1abecb98f956fc2aa48876e697ba185753a07ca5aaf27a2d5376f680d8a648fc
                                                      • Instruction Fuzzy Hash: 78117C31100205AFDB615FA5EC48BEE7BB1EB19321F204266FA26A51E1CBB14951EF11
                                                      APIs
                                                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00BDADE1
                                                      • OleUninitialize.OLE32(?,00000000), ref: 00BDAE80
                                                      • UnregisterHotKey.USER32(?), ref: 00BDAFD7
                                                      • DestroyWindow.USER32(?), ref: 00C12E94
                                                      • FreeLibrary.KERNEL32(?), ref: 00C12EF9
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00C12F26
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                      • String ID: close all
                                                      • API String ID: 469580280-3243417748
                                                      • Opcode ID: a1f58dd43578c62a8ffd50481a70f1112c3e8f9fd91a7f1d3aaad06f59974818
                                                      • Instruction ID: f6d616444a2deba7fded4dc9ea3cc93c115d28659b900ae6f26c41f60cd63a17
                                                      • Opcode Fuzzy Hash: a1f58dd43578c62a8ffd50481a70f1112c3e8f9fd91a7f1d3aaad06f59974818
                                                      • Instruction Fuzzy Hash: 4CA169347012228FCB29EF55C495B69F7A4EF05700F2042EDE90AAB361DB31AD66DF91
                                                      APIs
                                                      • EnumChildWindows.USER32(?,00C2AF1D), ref: 00C2AE5B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ChildEnumWindows
                                                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                      • API String ID: 3555792229-1603158881
                                                      • Opcode ID: 5f04a51c2a9a9f5b370c7e66a01fe7b124f4ea5f0a3f1d2678bad1679614409f
                                                      • Instruction ID: 6523e0a7eedefeace472280f9fbb6b4b946d1c731eb6ea0bb1e44e5ddf2f1617
                                                      • Opcode Fuzzy Hash: 5f04a51c2a9a9f5b370c7e66a01fe7b124f4ea5f0a3f1d2678bad1679614409f
                                                      • Instruction Fuzzy Hash: 6E911870600519ABCB08EF60D441BFEFBB9FF04300F908159D96AA7A52DF316A9DDB91
                                                      APIs
                                                      • SetWindowLongW.USER32(?,000000EB), ref: 00BD327E
                                                        • Part of subcall function 00BD218F: GetClientRect.USER32(?,?), ref: 00BD21B8
                                                        • Part of subcall function 00BD218F: GetWindowRect.USER32(?,?), ref: 00BD21F9
                                                        • Part of subcall function 00BD218F: ScreenToClient.USER32(?,?), ref: 00BD2221
                                                      • GetDC.USER32 ref: 00C0CFA3
                                                      • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00C0CFB6
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00C0CFC4
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00C0CFD9
                                                      • ReleaseDC.USER32(?,00000000), ref: 00C0CFE1
                                                      • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00C0D06C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                      • String ID: U
                                                      • API String ID: 4009187628-3372436214
                                                      • Opcode ID: 70da03befe3f6df144cd8713fcec97f54f0274b9c629b7055961f04be93bbe20
                                                      • Instruction ID: c79f6dcc82ccacc184847fabd500dfcb8adc56744a98ac8c3aa8ee2fab188b72
                                                      • Opcode Fuzzy Hash: 70da03befe3f6df144cd8713fcec97f54f0274b9c629b7055961f04be93bbe20
                                                      • Instruction Fuzzy Hash: CD71C530500205EFCF218FA4C884ABA7BB5FF49354F1442AAFD66562E6D7318A52DF51
                                                      APIs
                                                        • Part of subcall function 00BD29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BD29F3
                                                        • Part of subcall function 00BD2714: GetCursorPos.USER32(?), ref: 00BD2727
                                                        • Part of subcall function 00BD2714: ScreenToClient.USER32(00C967B0,?), ref: 00BD2744
                                                        • Part of subcall function 00BD2714: GetAsyncKeyState.USER32(00000001), ref: 00BD2769
                                                        • Part of subcall function 00BD2714: GetAsyncKeyState.USER32(00000002), ref: 00BD2777
                                                      • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 00C5C417
                                                      • ImageList_EndDrag.COMCTL32 ref: 00C5C41D
                                                      • ReleaseCapture.USER32 ref: 00C5C423
                                                      • SetWindowTextW.USER32(?,00000000), ref: 00C5C4CD
                                                      • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00C5C4E0
                                                      • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 00C5C5C2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                      • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                      • API String ID: 1924731296-2107944366
                                                      • Opcode ID: 9a4a2504ce10d8f613550c91552f7c33f0c56cf4bb5463a87ff6119e5f714d67
                                                      • Instruction ID: 7053e3cf1e80dd2c9fead9a3207975ce0eeae3d7c112908894d0d60fde2b2f99
                                                      • Opcode Fuzzy Hash: 9a4a2504ce10d8f613550c91552f7c33f0c56cf4bb5463a87ff6119e5f714d67
                                                      • Instruction Fuzzy Hash: 86519C74204304AFDB10EF24CC9AF6E7BE1EB84311F10492AF955972E2DB70A948DB56
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00C60980), ref: 00C491DA
                                                      • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00C60980), ref: 00C4920E
                                                      • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00C49388
                                                      • SysFreeString.OLEAUT32(?), ref: 00C493B2
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                      • String ID:
                                                      • API String ID: 560350794-0
                                                      • Opcode ID: d1c53e1fc4b5b46d988632c6e7814822bf75cfbed306073147459269c041a282
                                                      • Instruction ID: 42e21623013ab3e58c1d3bc779438f53059d1eadb9d434ec8cf8106cfbd019c2
                                                      • Opcode Fuzzy Hash: d1c53e1fc4b5b46d988632c6e7814822bf75cfbed306073147459269c041a282
                                                      • Instruction Fuzzy Hash: EEF12C71A00119EFCF14DF94C884EAEB7B9FF89314F108598F915AB2A1DB71AE46CB50
                                                      APIs
                                                        • Part of subcall function 00C34A30: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00C339F7,?), ref: 00C34A4D
                                                        • Part of subcall function 00C34A30: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00C339F7,?), ref: 00C34A66
                                                        • Part of subcall function 00C34E59: GetFileAttributesW.KERNEL32(?,00C33A6B), ref: 00C34E5A
                                                      • lstrcmpiW.KERNEL32(?,?), ref: 00C35168
                                                      • _wcscmp.LIBCMT ref: 00C35182
                                                      • MoveFileW.KERNEL32(?,?), ref: 00C3519D
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                      • String ID:
                                                      • API String ID: 793581249-0
                                                      • Opcode ID: e1f4c40f96fac34b7977f275ed9e216c9f14a566c2024236fdbbe79ef1568fd6
                                                      • Instruction ID: 5b664102a5dc93dd791368c12a3019a96d7f67ee1c6dd295a0f392ff23682e1e
                                                      • Opcode Fuzzy Hash: e1f4c40f96fac34b7977f275ed9e216c9f14a566c2024236fdbbe79ef1568fd6
                                                      • Instruction Fuzzy Hash: DC5196B24087859BC724DB90CC81ADFB3ECAF84340F10492EF699D3151EF70A28C8756
                                                      APIs
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00C58AEC
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: InvalidateRect
                                                      • String ID:
                                                      • API String ID: 634782764-0
                                                      • Opcode ID: 5ef3da30b1e56af3ea1a2922168ea6db3e7b8df32d44f2bc6afd96859d831ed0
                                                      • Instruction ID: 3e769f96f6c17515ff34e2a640c3965b1f0cca6a5aa6c7df51478086502f8aa2
                                                      • Opcode Fuzzy Hash: 5ef3da30b1e56af3ea1a2922168ea6db3e7b8df32d44f2bc6afd96859d831ed0
                                                      • Instruction Fuzzy Hash: 1151AF78501244BFEF209B29CC89B5D7BA4AB05352F204512FE25F61E2CF71AADC9A58
                                                      APIs
                                                      • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00C0C568
                                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00C0C58A
                                                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00C0C5A2
                                                      • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00C0C5C0
                                                      • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00C0C5E1
                                                      • DestroyIcon.USER32(00000000), ref: 00C0C5F0
                                                      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00C0C60D
                                                      • DestroyIcon.USER32(?), ref: 00C0C61C
                                                        • Part of subcall function 00C5A89C: DeleteObject.GDI32(00000000), ref: 00C5A8D5
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                      • String ID:
                                                      • API String ID: 2819616528-0
                                                      • Opcode ID: ee9b7444ad6cdedd2636956078fa254ea3e87c1e6431f3e1df0b21e0a956d5ed
                                                      • Instruction ID: 2593407ac490709ffb6cfdf03b91d9dc41e056c035874af6154b7c6dffec918d
                                                      • Opcode Fuzzy Hash: ee9b7444ad6cdedd2636956078fa254ea3e87c1e6431f3e1df0b21e0a956d5ed
                                                      • Instruction Fuzzy Hash: 51518D74600249AFDB24DF25CC85BAAB7F5EB54310F104659F912A73D0E7B0EE50EB60
                                                      APIs
                                                        • Part of subcall function 00C2B310: GetWindowThreadProcessId.USER32(?,00000000), ref: 00C2B330
                                                        • Part of subcall function 00C2B310: GetCurrentThreadId.KERNEL32 ref: 00C2B337
                                                        • Part of subcall function 00C2B310: AttachThreadInput.USER32(00000000,?,00C2A01E,?,00000001), ref: 00C2B33E
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00C2A029
                                                      • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00C2A046
                                                      • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00C2A049
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00C2A052
                                                      • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00C2A070
                                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00C2A073
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00C2A07C
                                                      • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00C2A093
                                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00C2A096
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                      • String ID:
                                                      • API String ID: 2014098862-0
                                                      • Opcode ID: d811cbbe8eb6332ae9aed8ab05153f3b71f8e6ee406c9934b55010aa75c7bde3
                                                      • Instruction ID: d930119eea785779d0245284303eb9c7f18b6c9038dd55e1565adf9571a27cb3
                                                      • Opcode Fuzzy Hash: d811cbbe8eb6332ae9aed8ab05153f3b71f8e6ee406c9934b55010aa75c7bde3
                                                      • Instruction Fuzzy Hash: 6F1104B1910618BFF6206F65DC89F6F3F2DEB4C751F200819F6447B0A0CAF25C509AA4
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00C28F3D,00000B00,?,?), ref: 00C292C5
                                                      • HeapAlloc.KERNEL32(00000000,?,00C28F3D,00000B00,?,?), ref: 00C292CC
                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00C28F3D,00000B00,?,?), ref: 00C292E1
                                                      • GetCurrentProcess.KERNEL32(?,00000000,?,00C28F3D,00000B00,?,?), ref: 00C292E9
                                                      • DuplicateHandle.KERNEL32(00000000,?,00C28F3D,00000B00,?,?), ref: 00C292EC
                                                      • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00C28F3D,00000B00,?,?), ref: 00C292FC
                                                      • GetCurrentProcess.KERNEL32(00C28F3D,00000000,?,00C28F3D,00000B00,?,?), ref: 00C29304
                                                      • DuplicateHandle.KERNEL32(00000000,?,00C28F3D,00000B00,?,?), ref: 00C29307
                                                      • CreateThread.KERNEL32(00000000,00000000,00C2932D,00000000,00000000,00000000), ref: 00C29321
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                      • String ID:
                                                      • API String ID: 1957940570-0
                                                      • Opcode ID: 86e62176f470b537264e45c52e7c4d2c792c0513e04fa55286b0048aa860efb9
                                                      • Instruction ID: 3fbe0edb1e400167749e792fe32f3e01896c7be6a578db61c2de60308fbb60f6
                                                      • Opcode Fuzzy Hash: 86e62176f470b537264e45c52e7c4d2c792c0513e04fa55286b0048aa860efb9
                                                      • Instruction Fuzzy Hash: B001BBB5640304BFE720ABA6DC4DF6F7BACEB89711F504411FA05EB1A1CAB19800CB20
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit$_memset
                                                      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                      • API String ID: 2862541840-625585964
                                                      • Opcode ID: 9f85b2bdd386f4a6a651e46299af6f2e5389d7f11a7e5c423e05ed85f33add7f
                                                      • Instruction ID: 44e08bc4b30adaed0f287113fc630c4ced53eca1a0167c306541ad3bd3efe06f
                                                      • Opcode Fuzzy Hash: 9f85b2bdd386f4a6a651e46299af6f2e5389d7f11a7e5c423e05ed85f33add7f
                                                      • Instruction Fuzzy Hash: 33917E71A00229ABDF24CFA5C888FAFBBB8FF45714F108559F515AB291D7709A44CFA0
                                                      APIs
                                                        • Part of subcall function 00C27B0B: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00C27A45,80070057,?,?,?,00C27E56), ref: 00C27B28
                                                        • Part of subcall function 00C27B0B: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00C27A45,80070057,?,?), ref: 00C27B43
                                                        • Part of subcall function 00C27B0B: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00C27A45,80070057,?,?), ref: 00C27B51
                                                        • Part of subcall function 00C27B0B: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00C27A45,80070057,?), ref: 00C27B61
                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00C49CB8
                                                      • _memset.LIBCMT ref: 00C49CC5
                                                      • _memset.LIBCMT ref: 00C49E08
                                                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00C49E34
                                                      • CoTaskMemFree.OLE32(?), ref: 00C49E3F
                                                      Strings
                                                      • NULL Pointer assignment, xrefs: 00C49E8D
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                      • String ID: NULL Pointer assignment
                                                      • API String ID: 1300414916-2785691316
                                                      • Opcode ID: a36e6cc735b3402a6dd17fc93c7f39b2b9e8afbac6868c33db892728df460689
                                                      • Instruction ID: 8c8b1e215bbc5b7f293e49523435ec8aaa6ca58ae5d3cf5a8435810b8278eef8
                                                      • Opcode Fuzzy Hash: a36e6cc735b3402a6dd17fc93c7f39b2b9e8afbac6868c33db892728df460689
                                                      • Instruction Fuzzy Hash: F5912771D00229ABDB10DFA5DC85EDEBBB9FF08310F20456AF519A7291DB719A44CFA0
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00C57211
                                                      • SendMessageW.USER32(?,00001036,00000000,?), ref: 00C57225
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00C5723F
                                                      • _wcscat.LIBCMT ref: 00C5729A
                                                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 00C572B1
                                                      • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00C572DF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window_wcscat
                                                      • String ID: SysListView32
                                                      • API String ID: 307300125-78025650
                                                      • Opcode ID: 8f48a744125ceaeb8b2f20f21b227ec2514042c3b137411b608c77ad7c98821d
                                                      • Instruction ID: 0c16be28dc91e2a280b80d009588d48a71f2edd01a86fcf0ea455f26926c2c61
                                                      • Opcode Fuzzy Hash: 8f48a744125ceaeb8b2f20f21b227ec2514042c3b137411b608c77ad7c98821d
                                                      • Instruction Fuzzy Hash: 3341D474904308AFEB21DFA4DC89FEE77E9EF08351F10052AF998A7191D6719DC88B64
                                                      APIs
                                                      • LoadIconW.USER32(00000000,00007F03), ref: 00C333E9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: IconLoad
                                                      • String ID: blank$info$question$stop$warning
                                                      • API String ID: 2457776203-404129466
                                                      • Opcode ID: eeaad861265614cb6a2609e8e105f3d1447f26d1d95f4d9c0737b2632b574dd1
                                                      • Instruction ID: e556cc4e79e8f861ae67fd9a897862ff87de6ba18d1a31e545d12fb8bbc7fd3b
                                                      • Opcode Fuzzy Hash: eeaad861265614cb6a2609e8e105f3d1447f26d1d95f4d9c0737b2632b574dd1
                                                      • Instruction Fuzzy Hash: 2A11573234834ABAE7525B26DC82EBA77DCDF15720F20406AF600A61D2DFF99F4142A4
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00C3466F
                                                      • LoadStringW.USER32(00000000), ref: 00C34676
                                                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00C3468C
                                                      • LoadStringW.USER32(00000000), ref: 00C34693
                                                      • _wprintf.LIBCMT ref: 00C346B9
                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00C346D7
                                                      Strings
                                                      • %s (%d) : ==> %s: %s %s, xrefs: 00C346B4
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadModuleString$Message_wprintf
                                                      • String ID: %s (%d) : ==> %s: %s %s
                                                      • API String ID: 3648134473-3128320259
                                                      • Opcode ID: 97a148f389f282426fcd15d5a238f34194e24a4338e242b241c8777f06841931
                                                      • Instruction ID: bea7e082cae488aebb90ad0c3dec3d2e08a426749671f30b16cec68b51d76148
                                                      • Opcode Fuzzy Hash: 97a148f389f282426fcd15d5a238f34194e24a4338e242b241c8777f06841931
                                                      • Instruction Fuzzy Hash: 9D014FF69402087FE721AB91DD89FFB776CE709300F1005A5FB46E2051EAB49E948B75
                                                      APIs
                                                        • Part of subcall function 00BD29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BD29F3
                                                      • GetSystemMetrics.USER32(0000000F), ref: 00C5D89F
                                                      • GetSystemMetrics.USER32(0000000F), ref: 00C5D8BF
                                                      • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00C5DAFA
                                                      • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00C5DB18
                                                      • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00C5DB39
                                                      • ShowWindow.USER32(00000003,00000000), ref: 00C5DB58
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00C5DB7D
                                                      • DefDlgProcW.USER32(?,00000005,?,?), ref: 00C5DBA0
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                      • String ID:
                                                      • API String ID: 1211466189-0
                                                      • Opcode ID: f5d8412f77732d5c2ffe6f1cca840774a692c5e5ac80543652a63d508cc490c4
                                                      • Instruction ID: 8387f5043b5d6532af8ae75572dd3398fa108278d734153a6ada110c40c438ec
                                                      • Opcode Fuzzy Hash: f5d8412f77732d5c2ffe6f1cca840774a692c5e5ac80543652a63d508cc490c4
                                                      • Instruction Fuzzy Hash: F6B1CC38500215EFCF24CF69C9C57AE7BB2FF04712F098069EC5A9B295D770AA94CB64
                                                      APIs
                                                        • Part of subcall function 00BE1A36: _memmove.LIBCMT ref: 00BE1A77
                                                        • Part of subcall function 00C51242: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C501D5,?,?), ref: 00C51259
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C50216
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: BuffCharConnectRegistryUpper_memmove
                                                      • String ID:
                                                      • API String ID: 3479070676-0
                                                      • Opcode ID: 5d312aaa1921d6603f7a04dab569c24d3e5f1142b126bd3e153f946f63879e90
                                                      • Instruction ID: a727d82c6b5ad3ac1056bc5dabdaf0ccaf14ea19c1e1cec91238b7e23feb8975
                                                      • Opcode Fuzzy Hash: 5d312aaa1921d6603f7a04dab569c24d3e5f1142b126bd3e153f946f63879e90
                                                      • Instruction Fuzzy Hash: 6EA1BB342042019FCB10EF55C885B2EB7E5FF84314F24885DF9A69B2A2DB71ED89DB46
                                                      APIs
                                                      • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00C0C438,00000004,00000000,00000000,00000000), ref: 00BD2E9F
                                                      • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00C0C438,00000004,00000000,00000000,00000000,000000FF), ref: 00BD2EE7
                                                      • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00C0C438,00000004,00000000,00000000,00000000), ref: 00C0C48B
                                                      • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00C0C438,00000004,00000000,00000000,00000000), ref: 00C0C4F7
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ShowWindow
                                                      • String ID:
                                                      • API String ID: 1268545403-0
                                                      • Opcode ID: 9f79af4a81ac922c045a493019f752be7a02de4e91b33b8f3e3b8d197fe05a06
                                                      • Instruction ID: 1be3b5c5798761960cbf55ae10be85d08bd7dad81de1c5683ee57bf550b42b46
                                                      • Opcode Fuzzy Hash: 9f79af4a81ac922c045a493019f752be7a02de4e91b33b8f3e3b8d197fe05a06
                                                      • Instruction Fuzzy Hash: AC41F6346086C09BCB358B69C8D877BFBD2FBA1300F28859FE457567A1E771A981D710
                                                      APIs
                                                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 00C37505
                                                        • Part of subcall function 00BF0F16: std::exception::exception.LIBCMT ref: 00BF0F4C
                                                        • Part of subcall function 00BF0F16: __CxxThrowException@8.LIBCMT ref: 00BF0F61
                                                      • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00C3753C
                                                      • EnterCriticalSection.KERNEL32(?), ref: 00C37558
                                                      • _memmove.LIBCMT ref: 00C375A6
                                                      • _memmove.LIBCMT ref: 00C375C3
                                                      • LeaveCriticalSection.KERNEL32(?), ref: 00C375D2
                                                      • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00C375E7
                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00C37606
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                      • String ID:
                                                      • API String ID: 256516436-0
                                                      • Opcode ID: e371e85618321f19300d27815ba3015a053dbadf8935474e735215c2a93282c7
                                                      • Instruction ID: c729ffbf1b4b994a8fdcfa3d6018276692ab10c556112d99ad87f8de9d3d0850
                                                      • Opcode Fuzzy Hash: e371e85618321f19300d27815ba3015a053dbadf8935474e735215c2a93282c7
                                                      • Instruction Fuzzy Hash: B7318F71914209EBCF20EF65DC85ABFB7B8EF45700F2481A5F904AB256D7709A14DBA0
                                                      APIs
                                                      • DeleteObject.GDI32(00000000), ref: 00C565D8
                                                      • GetDC.USER32(00000000), ref: 00C565E0
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00C565EB
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00C565F7
                                                      • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00C56633
                                                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00C56644
                                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00C59417,?,?,000000FF,00000000,?,000000FF,?), ref: 00C5667E
                                                      • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00C5669E
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                      • String ID:
                                                      • API String ID: 3864802216-0
                                                      • Opcode ID: 43432e894eed5c84bc0ce82d2a1154fef2ae0eee6a315a4160852b4ce06703a5
                                                      • Instruction ID: 02db520c387d66788712c2d8b7c7c5fde6797dc2275b926b3fc33a1562adc2ed
                                                      • Opcode Fuzzy Hash: 43432e894eed5c84bc0ce82d2a1154fef2ae0eee6a315a4160852b4ce06703a5
                                                      • Instruction Fuzzy Hash: F4317C76101214BFEB218F11CC4AFEB3FA9EF49751F040051FE08AA291C6B59951CBB4
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _memcmp
                                                      • String ID:
                                                      • API String ID: 2931989736-0
                                                      • Opcode ID: 99e1bed6347182f5ca07d10efcd40ffa89c9ac47069b7eec952acb78f680c1d6
                                                      • Instruction ID: 536654f81e1cc32cb1bc2d040729cc234cb333de9fe0180075828c022524d925
                                                      • Opcode Fuzzy Hash: 99e1bed6347182f5ca07d10efcd40ffa89c9ac47069b7eec952acb78f680c1d6
                                                      • Instruction Fuzzy Hash: A1212F61F0052AB7D620A5196DC2F7F335CAE60380B040472FD06D7642F761FF15A2E5
                                                      APIs
                                                        • Part of subcall function 00BD4D37: __itow.LIBCMT ref: 00BD4D62
                                                        • Part of subcall function 00BD4D37: __swprintf.LIBCMT ref: 00BD4DAC
                                                        • Part of subcall function 00BE436A: _wcscpy.LIBCMT ref: 00BE438D
                                                      • _wcstok.LIBCMT ref: 00C3F144
                                                      • _wcscpy.LIBCMT ref: 00C3F1D3
                                                      • _memset.LIBCMT ref: 00C3F206
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                      • String ID: X
                                                      • API String ID: 774024439-3081909835
                                                      • Opcode ID: cd5c0206e0f6dc83eddbad6826308782426a6b988b8ebac4956a8ac4f99fcc51
                                                      • Instruction ID: 1073d6e97289e7336e52f79cad84862f6c2f622a8723cc9f598683108a89b73f
                                                      • Opcode Fuzzy Hash: cd5c0206e0f6dc83eddbad6826308782426a6b988b8ebac4956a8ac4f99fcc51
                                                      • Instruction Fuzzy Hash: EEC16D755187419FC724EF28C845A6EB7E4EF84310F10496DF89A973A2DB30ED46CB92
                                                      APIs
                                                      • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00C470B0
                                                      • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00C470D1
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00C470E4
                                                      • htons.WSOCK32(?,?,?,00000000,?), ref: 00C4719A
                                                      • inet_ntoa.WSOCK32(?), ref: 00C47157
                                                        • Part of subcall function 00C2B2CD: _strlen.LIBCMT ref: 00C2B2D7
                                                        • Part of subcall function 00C2B2CD: _memmove.LIBCMT ref: 00C2B2F9
                                                      • _strlen.LIBCMT ref: 00C471F4
                                                      • _memmove.LIBCMT ref: 00C4725D
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                      • String ID:
                                                      • API String ID: 3619996494-0
                                                      • Opcode ID: 5dbea5849a892c221eaf55830f67d7ea925097a2f2df8bcb4d00c43b8e5c8500
                                                      • Instruction ID: 074fdd7248a3ed62c55397c78e7a1086b8311b7dd7d24de163108b7644b3626d
                                                      • Opcode Fuzzy Hash: 5dbea5849a892c221eaf55830f67d7ea925097a2f2df8bcb4d00c43b8e5c8500
                                                      • Instruction Fuzzy Hash: B381C071508300ABC720EB65DC85F6FB7E8EF84714F104A5DF5559B292EB70AD05CB91
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 34875c9d27fabca250cad41e763a22b7dd966ff306f8a8fd3454f639a459fc50
                                                      • Instruction ID: 0bb1b47c4e9b620dd68c47fc00b220e690427b5d9b741e93a46293a09940320e
                                                      • Opcode Fuzzy Hash: 34875c9d27fabca250cad41e763a22b7dd966ff306f8a8fd3454f639a459fc50
                                                      • Instruction Fuzzy Hash: E3717E30900109FFCB18CF58CC85EAEBBB9FF86314F14859AF915AB291D7319A51DBA0
                                                      APIs
                                                      • IsWindow.USER32(01154828), ref: 00C5B7D8
                                                      • IsWindowEnabled.USER32(01154828), ref: 00C5B7E4
                                                      • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00C5B8C8
                                                      • SendMessageW.USER32(01154828,000000B0,?,?), ref: 00C5B8FF
                                                      • IsDlgButtonChecked.USER32(?,?), ref: 00C5B93C
                                                      • GetWindowLongW.USER32(01154828,000000EC), ref: 00C5B95E
                                                      • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00C5B976
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                      • String ID:
                                                      • API String ID: 4072528602-0
                                                      • Opcode ID: f80656949c02faa5edb754a96ceb076b42eedcad93e180ca2d944e286b7588e4
                                                      • Instruction ID: e19f820792275d1ec4ce4387dd7f557fa10c0310b956eb748b846284f2b4e7b2
                                                      • Opcode Fuzzy Hash: f80656949c02faa5edb754a96ceb076b42eedcad93e180ca2d944e286b7588e4
                                                      • Instruction Fuzzy Hash: AC719F38600204AFDB209F65C8D4FAA7FB9FF49352F144059FD65972A1C731AE98DB28
                                                      APIs
                                                      • _memset.LIBCMT ref: 00C4F8F9
                                                      • _memset.LIBCMT ref: 00C4F9C2
                                                      • ShellExecuteExW.SHELL32(?), ref: 00C4FA07
                                                        • Part of subcall function 00BD4D37: __itow.LIBCMT ref: 00BD4D62
                                                        • Part of subcall function 00BD4D37: __swprintf.LIBCMT ref: 00BD4DAC
                                                        • Part of subcall function 00BE436A: _wcscpy.LIBCMT ref: 00BE438D
                                                      • GetProcessId.KERNEL32(00000000), ref: 00C4FA7E
                                                      • CloseHandle.KERNEL32(00000000), ref: 00C4FAAD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                      • String ID: @
                                                      • API String ID: 3522835683-2766056989
                                                      • Opcode ID: 9b4c77590848e68b19bfcca9abd399c1fa81bed17348e006d66b3cde14a8c209
                                                      • Instruction ID: da8934b80d79c28468ff37e6c425bd9511d8ae59a924b3852e84cbeb121d4b89
                                                      • Opcode Fuzzy Hash: 9b4c77590848e68b19bfcca9abd399c1fa81bed17348e006d66b3cde14a8c209
                                                      • Instruction Fuzzy Hash: A2619E75A006199FCB14EF54C484AAEFBF5FF48310F1485ADE859AB351DB30AD42CB90
                                                      APIs
                                                      • GetParent.USER32(?), ref: 00C315F7
                                                      • GetKeyboardState.USER32(?), ref: 00C3160C
                                                      • SetKeyboardState.USER32(?), ref: 00C3166D
                                                      • PostMessageW.USER32(?,00000101,00000010,?), ref: 00C3169B
                                                      • PostMessageW.USER32(?,00000101,00000011,?), ref: 00C316BA
                                                      • PostMessageW.USER32(?,00000101,00000012,?), ref: 00C31700
                                                      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00C31723
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessagePost$KeyboardState$Parent
                                                      • String ID:
                                                      • API String ID: 87235514-0
                                                      • Opcode ID: 87a6826bc052b1a3ebdb3d3067fdd485b459ada7c96e4524e4f3bfaf406cb149
                                                      • Instruction ID: 8e87598edd46fbf15c84a1e091d0ea59260e490e822b35009188427b75024c2f
                                                      • Opcode Fuzzy Hash: 87a6826bc052b1a3ebdb3d3067fdd485b459ada7c96e4524e4f3bfaf406cb149
                                                      • Instruction Fuzzy Hash: 9C5105A06247D13DFB324664CC16BBA7FA99B06304F0C4989F9E5458C2C6E8AE94D760
                                                      APIs
                                                      • GetParent.USER32(00000000), ref: 00C31410
                                                      • GetKeyboardState.USER32(?), ref: 00C31425
                                                      • SetKeyboardState.USER32(?), ref: 00C31486
                                                      • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00C314B2
                                                      • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00C314CF
                                                      • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00C31513
                                                      • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00C31534
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessagePost$KeyboardState$Parent
                                                      • String ID:
                                                      • API String ID: 87235514-0
                                                      • Opcode ID: fcbe85db1acfa498e1064390e957bbd2016ed0460cebd518fb818c37cf45b6e2
                                                      • Instruction ID: 2374ec82238111e5069dd54b904ced26da2419dd37c13b55d7481d6861f44d14
                                                      • Opcode Fuzzy Hash: fcbe85db1acfa498e1064390e957bbd2016ed0460cebd518fb818c37cf45b6e2
                                                      • Instruction Fuzzy Hash: AF514AA05643D53DFB3387348C11BBABFA9AB46300F0C8489F9E65A4C3D294EE84E750
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _wcsncpy$LocalTime
                                                      • String ID:
                                                      • API String ID: 2945705084-0
                                                      • Opcode ID: b9a31cb8622578f33f07615ddfd2cdac5af19669b955b29f9a8a9d0aa3152107
                                                      • Instruction ID: de6ae15e9c1127afbc9f2b4240dc04108fc1ae8c6f6ff3dc6b15d0b398449680
                                                      • Opcode Fuzzy Hash: b9a31cb8622578f33f07615ddfd2cdac5af19669b955b29f9a8a9d0aa3152107
                                                      • Instruction Fuzzy Hash: 61415266C2161876CB11EBA88C4A9EFB3FC9F05310F5044A6F618E3221EB75D359C7A9
                                                      APIs
                                                        • Part of subcall function 00C34A30: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00C339F7,?), ref: 00C34A4D
                                                        • Part of subcall function 00C34A30: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00C339F7,?), ref: 00C34A66
                                                      • lstrcmpiW.KERNEL32(?,?), ref: 00C33A17
                                                      • _wcscmp.LIBCMT ref: 00C33A33
                                                      • MoveFileW.KERNEL32(?,?), ref: 00C33A4B
                                                      • _wcscat.LIBCMT ref: 00C33A93
                                                      • SHFileOperationW.SHELL32(?), ref: 00C33AFF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                      • String ID: \*.*
                                                      • API String ID: 1377345388-1173974218
                                                      • Opcode ID: 3fe5a038c06e13e53b8bfef30622d7b286907674d8715147faa23a2b4f02db6e
                                                      • Instruction ID: 19c0d502dbbac692282fa647fce22ae5e232a9aba387468e160c706c51b935df
                                                      • Opcode Fuzzy Hash: 3fe5a038c06e13e53b8bfef30622d7b286907674d8715147faa23a2b4f02db6e
                                                      • Instruction Fuzzy Hash: F6419A71518384AAC765EB60C441AEBB7ECEF88340F10096EB4DAC3151EB34E789DB66
                                                      APIs
                                                      • _memset.LIBCMT ref: 00C57697
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C5773E
                                                      • IsMenu.USER32(?), ref: 00C57756
                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00C5779E
                                                      • DrawMenuBar.USER32 ref: 00C577B1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$DrawInfoInsert_memset
                                                      • String ID: 0
                                                      • API String ID: 3866635326-4108050209
                                                      • Opcode ID: 5dee37188dd927d5c7778affd642d4aa9b57491d6fa7b58e0096cbc42c156397
                                                      • Instruction ID: ff1998df6d59c9b55efadc5d6e0bbf91d55034baf7c77c3c69b67d723e4965fb
                                                      • Opcode Fuzzy Hash: 5dee37188dd927d5c7778affd642d4aa9b57491d6fa7b58e0096cbc42c156397
                                                      • Instruction Fuzzy Hash: 53414F78604208EFDB21DF51E884E9ABBF4FB08395F148159ED1597360D770AD94CFA4
                                                      APIs
                                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00C513F9
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00C51423
                                                      • FreeLibrary.KERNEL32(00000000), ref: 00C514DA
                                                        • Part of subcall function 00C513CA: RegCloseKey.ADVAPI32(?), ref: 00C51440
                                                        • Part of subcall function 00C513CA: FreeLibrary.KERNEL32(?), ref: 00C51492
                                                        • Part of subcall function 00C513CA: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00C514B5
                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00C5147D
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                      • String ID:
                                                      • API String ID: 395352322-0
                                                      • Opcode ID: f5ab43bdce90f469c8b40742ccf73bb253fbd6fa090bff27608fd5e4b23a72a3
                                                      • Instruction ID: 1e3f68a4e2b532d2bdf95da775c956a62e3d27db54ad0cdf4dc1eafb85c4dd0d
                                                      • Opcode Fuzzy Hash: f5ab43bdce90f469c8b40742ccf73bb253fbd6fa090bff27608fd5e4b23a72a3
                                                      • Instruction Fuzzy Hash: C0313C75900109BFDB24DB91DC89BFFB7BCEF08341F140169ED16A2141E7B49F899AA4
                                                      APIs
                                                      • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00C566D9
                                                      • GetWindowLongW.USER32(01154828,000000F0), ref: 00C5670C
                                                      • GetWindowLongW.USER32(01154828,000000F0), ref: 00C56741
                                                      • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00C56773
                                                      • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00C5679D
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00C567AE
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00C567C8
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: LongWindow$MessageSend
                                                      • String ID:
                                                      • API String ID: 2178440468-0
                                                      • Opcode ID: faddb0266ceec5a12bf1e3783284b01661b1642db40cd4a7daf4b91fa1e1b0ac
                                                      • Instruction ID: 581b0b44b19d524e9d4ec0af36c5c275cb916d8645f080f30ee9337c82f4c2ba
                                                      • Opcode Fuzzy Hash: faddb0266ceec5a12bf1e3783284b01661b1642db40cd4a7daf4b91fa1e1b0ac
                                                      • Instruction Fuzzy Hash: 903137382001409FDB21CF19DC88F5937E1FB49795F6901A5F9219B2F2CB71E998DB58
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C2E0AD
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C2E0D3
                                                      • SysAllocString.OLEAUT32(00000000), ref: 00C2E0D6
                                                      • SysAllocString.OLEAUT32(?), ref: 00C2E0F4
                                                      • SysFreeString.OLEAUT32(?), ref: 00C2E0FD
                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 00C2E122
                                                      • SysAllocString.OLEAUT32(?), ref: 00C2E130
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                      • String ID:
                                                      • API String ID: 3761583154-0
                                                      • Opcode ID: efffaf78928bb7db93befd923c4eb8190f95bb90738c756f03929da3fe44725c
                                                      • Instruction ID: 6b69fc7e63fd1ee31924f4d812f6f1a0294a915f12f9b7b02767b06a90c50c94
                                                      • Opcode Fuzzy Hash: efffaf78928bb7db93befd923c4eb8190f95bb90738c756f03929da3fe44725c
                                                      • Instruction Fuzzy Hash: 9E21C732600219AF9B20DFB9DC88DBF73ECEB08360B148125FA14EB191DAB0DD418B60
                                                      APIs
                                                        • Part of subcall function 00C4823D: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00C48268
                                                      • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00C46676
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00C46685
                                                      • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00C466BE
                                                      • connect.WSOCK32(00000000,?,00000010), ref: 00C466C7
                                                      • WSAGetLastError.WSOCK32 ref: 00C466D1
                                                      • closesocket.WSOCK32(00000000), ref: 00C466FA
                                                      • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00C46713
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                      • String ID:
                                                      • API String ID: 910771015-0
                                                      • Opcode ID: e030eeae1a14cc82cea6fa024a6d805bb140cb142e4b745fbad7bcc02621f315
                                                      • Instruction ID: 58dd07c5947161d01f25ad087d1e2d495e6ae863a3430dd3e37bc8f1cfe5e715
                                                      • Opcode Fuzzy Hash: e030eeae1a14cc82cea6fa024a6d805bb140cb142e4b745fbad7bcc02621f315
                                                      • Instruction Fuzzy Hash: 5131D131600208AFDB209F64DC85BBE77B9FB49764F114069F916A7291DBB0AD048BA2
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C2E188
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C2E1AE
                                                      • SysAllocString.OLEAUT32(00000000), ref: 00C2E1B1
                                                      • SysAllocString.OLEAUT32 ref: 00C2E1D2
                                                      • SysFreeString.OLEAUT32 ref: 00C2E1DB
                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 00C2E1F5
                                                      • SysAllocString.OLEAUT32(?), ref: 00C2E203
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                      • String ID:
                                                      • API String ID: 3761583154-0
                                                      • Opcode ID: 4f773fe08a3af8da11748a66d667c94e8d155fa1a94d6d05f60f4bc1f184f24d
                                                      • Instruction ID: 0b755fd31ffff796dd54a3efc76884938c2721fa241e6c409c4867c89bc44287
                                                      • Opcode Fuzzy Hash: 4f773fe08a3af8da11748a66d667c94e8d155fa1a94d6d05f60f4bc1f184f24d
                                                      • Instruction Fuzzy Hash: 85218831604114EF9B20DFA9DC88EBF77ECFB09360B108165FA15DB2A1DAB0DD418BA4
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: __wcsnicmp
                                                      • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                      • API String ID: 1038674560-2734436370
                                                      • Opcode ID: 8d6dc6c85fd599c9a230de10ced618ea3501c93f4b26f1b8d5b6bc63d4dce9c0
                                                      • Instruction ID: eb1cbc8ba5a4096dc05f96f59c7d7ef8241e6a1b5a149668bc286de1e807bde3
                                                      • Opcode Fuzzy Hash: 8d6dc6c85fd599c9a230de10ced618ea3501c93f4b26f1b8d5b6bc63d4dce9c0
                                                      • Instruction Fuzzy Hash: 6D21373210453D66D230BB26AC42EBB73E8EF51750F50443EFD5687992EBA1AE438395
                                                      APIs
                                                        • Part of subcall function 00BD2111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00BD214F
                                                        • Part of subcall function 00BD2111: GetStockObject.GDI32(00000011), ref: 00BD2163
                                                        • Part of subcall function 00BD2111: SendMessageW.USER32(00000000,00000030,00000000), ref: 00BD216D
                                                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00C57A1F
                                                      • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00C57A2C
                                                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00C57A37
                                                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00C57A46
                                                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00C57A52
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CreateObjectStockWindow
                                                      • String ID: Msctls_Progress32
                                                      • API String ID: 1025951953-3636473452
                                                      • Opcode ID: 4007d498db586db23249d3b0e7b5cc1923caff5711fa5a150e3cbafb86ef1039
                                                      • Instruction ID: 3a14efed2ac7e13f334d1d86c13a58803dd40141a60b5a78329079218db31c92
                                                      • Opcode Fuzzy Hash: 4007d498db586db23249d3b0e7b5cc1923caff5711fa5a150e3cbafb86ef1039
                                                      • Instruction Fuzzy Hash: 7B11B2B611021DBFEF119F61CC85EEB7F6DEF08758F014215BB04A2190C6729C61DBA4
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00BF41B2,?), ref: 00BF4103
                                                      • GetProcAddress.KERNEL32(00000000), ref: 00BF410A
                                                      • EncodePointer.KERNEL32(00000000), ref: 00BF4116
                                                      • DecodePointer.KERNEL32(00000001,00BF41B2,?), ref: 00BF4133
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                      • String ID: RoInitialize$combase.dll
                                                      • API String ID: 3489934621-340411864
                                                      • Opcode ID: a1ce3415c19ca285a99834b496d6e40d931895d521d93e7088cdfae051474a14
                                                      • Instruction ID: 9b943210c483894225de998a0b704d1547f6de2cb442fe98ccb3879da1aea67a
                                                      • Opcode Fuzzy Hash: a1ce3415c19ca285a99834b496d6e40d931895d521d93e7088cdfae051474a14
                                                      • Instruction Fuzzy Hash: 83E0E5B06A0340AFEE241B71EC9DB5E3AA4AB25B02F604425F511E61B0DBF541958A00
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00BF40D8), ref: 00BF41D8
                                                      • GetProcAddress.KERNEL32(00000000), ref: 00BF41DF
                                                      • EncodePointer.KERNEL32(00000000), ref: 00BF41EA
                                                      • DecodePointer.KERNEL32(00BF40D8), ref: 00BF4205
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                      • String ID: RoUninitialize$combase.dll
                                                      • API String ID: 3489934621-2819208100
                                                      • Opcode ID: 7f8212d33938310a2b77000f7db1b51fefc15517b25286206195b494aebf3bbf
                                                      • Instruction ID: e6611aa88ff79307556fc33e697df70d67a2de606bc31abcd9d33f7b0753ddfb
                                                      • Opcode Fuzzy Hash: 7f8212d33938310a2b77000f7db1b51fefc15517b25286206195b494aebf3bbf
                                                      • Instruction Fuzzy Hash: 09E0B678561300ABDB349F61AD4DF5F3AA4BB20746F20002AF105E21B0CBF44685CA14
                                                      APIs
                                                      • GetClientRect.USER32(?,?), ref: 00BD21B8
                                                      • GetWindowRect.USER32(?,?), ref: 00BD21F9
                                                      • ScreenToClient.USER32(?,?), ref: 00BD2221
                                                      • GetClientRect.USER32(?,?), ref: 00BD2350
                                                      • GetWindowRect.USER32(?,?), ref: 00BD2369
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Rect$Client$Window$Screen
                                                      • String ID:
                                                      • API String ID: 1296646539-0
                                                      • Opcode ID: 6e147996e2f9c44c90bb61e6a68c6afd2982330abf67fc22d6dc72c2ff450bfe
                                                      • Instruction ID: 88ab0ecb4cd9c86e4a668ffb00f1ad5e3b125334564aa3e14e1fe984ce1e34cc
                                                      • Opcode Fuzzy Hash: 6e147996e2f9c44c90bb61e6a68c6afd2982330abf67fc22d6dc72c2ff450bfe
                                                      • Instruction Fuzzy Hash: 00B14B39900289DBDF14CFA8C5807EEB7B1FF18710F14916AED69AB354EB34AA50CB54
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _memmove$__itow__swprintf
                                                      • String ID:
                                                      • API String ID: 3253778849-0
                                                      • Opcode ID: 9c84728a43189bd6ce68faab2277934646e23141b114edc06f1b291e46af5055
                                                      • Instruction ID: 2d8f435e139f05c75e30fc49f54cc754c2176944e6a57fe994bf85970706fde1
                                                      • Opcode Fuzzy Hash: 9c84728a43189bd6ce68faab2277934646e23141b114edc06f1b291e46af5055
                                                      • Instruction Fuzzy Hash: FA61B13051065AABCF11FF64CC81EFEB7E5AF04308F448599F9596B2A2EB349D05EB50
                                                      APIs
                                                        • Part of subcall function 00BE1A36: _memmove.LIBCMT ref: 00BE1A77
                                                        • Part of subcall function 00C51242: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C501D5,?,?), ref: 00C51259
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C506E5
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00C50725
                                                      • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00C50748
                                                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00C50771
                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00C507B4
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00C507C1
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                      • String ID:
                                                      • API String ID: 4046560759-0
                                                      • Opcode ID: 7aaad17753bbd7303f35cc2fceafdb3d7d8af8220697b1753ce7d0a8bac2688c
                                                      • Instruction ID: 7121e370fd6f3dc479e02897ba77c1f028a69064e4c176d79c9fd2d70a9a0ee3
                                                      • Opcode Fuzzy Hash: 7aaad17753bbd7303f35cc2fceafdb3d7d8af8220697b1753ce7d0a8bac2688c
                                                      • Instruction Fuzzy Hash: 65518A31108200AFC720EF64C895E6FBBE8FF88350F24495DF995872A1DB71E948CB92
                                                      APIs
                                                      • GetMenu.USER32(?), ref: 00C55C00
                                                      • GetMenuItemCount.USER32(00000000), ref: 00C55C37
                                                      • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00C55C5F
                                                      • GetMenuItemID.USER32(?,?), ref: 00C55CCE
                                                      • GetSubMenu.USER32(?,?), ref: 00C55CDC
                                                      • PostMessageW.USER32(?,00000111,?,00000000), ref: 00C55D2D
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$CountMessagePostString
                                                      • String ID:
                                                      • API String ID: 650687236-0
                                                      • Opcode ID: cd5ec288519db5d7da32a630c5c39a2fd3fb515fd6235262ebf9912bffba28d9
                                                      • Instruction ID: 94d15d6cb1d9f94b4532831aa69c325c2bfe52fdafb1f5457fcd45c32eac2fa0
                                                      • Opcode Fuzzy Hash: cd5ec288519db5d7da32a630c5c39a2fd3fb515fd6235262ebf9912bffba28d9
                                                      • Instruction Fuzzy Hash: 2451D139A00619EFCF11EF94C955AAEB7F5EF48310F1040A9ED11BB351DB70AE818B94
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 00C2F485
                                                      • VariantClear.OLEAUT32(00000013), ref: 00C2F4F7
                                                      • VariantClear.OLEAUT32(00000000), ref: 00C2F552
                                                      • _memmove.LIBCMT ref: 00C2F57C
                                                      • VariantClear.OLEAUT32(?), ref: 00C2F5C9
                                                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00C2F5F7
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Variant$Clear$ChangeInitType_memmove
                                                      • String ID:
                                                      • API String ID: 1101466143-0
                                                      • Opcode ID: cbba4f4ad5b73ab537526293fe02d6227f64b9b04930c40b7b8a426b0e4fb1c6
                                                      • Instruction ID: 306a447fc5a18d8246e69bf62d0c497fc004e28c7359f9571ecfa580069b7046
                                                      • Opcode Fuzzy Hash: cbba4f4ad5b73ab537526293fe02d6227f64b9b04930c40b7b8a426b0e4fb1c6
                                                      • Instruction Fuzzy Hash: E3513BB5A00219AFDB24CF58D884AAAB7B8FF4C314B15856EE959DB300D730E951CFA0
                                                      APIs
                                                      • _memset.LIBCMT ref: 00C3286B
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C328B6
                                                      • IsMenu.USER32(00000000), ref: 00C328D6
                                                      • CreatePopupMenu.USER32 ref: 00C3290A
                                                      • GetMenuItemCount.USER32(000000FF), ref: 00C32968
                                                      • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00C32999
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                      • String ID:
                                                      • API String ID: 3311875123-0
                                                      • Opcode ID: ec25665b7a39c18e4cbe4cbb3d5a1d9b831d6ee2ac85df4f3b46e665bf811bfc
                                                      • Instruction ID: fbc5db75a601c9b174a91d61cb9a29df71320940560aa3e01da3831ac4d20a38
                                                      • Opcode Fuzzy Hash: ec25665b7a39c18e4cbe4cbb3d5a1d9b831d6ee2ac85df4f3b46e665bf811bfc
                                                      • Instruction Fuzzy Hash: 4951AF7062030AEFDF24CF69C888BAEBBF5FF44314F144559E865AB291D7B09A44CB61
                                                      APIs
                                                        • Part of subcall function 00BD29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BD29F3
                                                      • BeginPaint.USER32(?,?,?,?,?,?), ref: 00BD1B76
                                                      • GetWindowRect.USER32(?,?), ref: 00BD1BDA
                                                      • ScreenToClient.USER32(?,?), ref: 00BD1BF7
                                                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00BD1C08
                                                      • EndPaint.USER32(?,?), ref: 00BD1C52
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                      • String ID:
                                                      • API String ID: 1827037458-0
                                                      • Opcode ID: cbf45723581d981e85a127d1e6e13221934bf88e70c6f22a2dd27bdf3163c3e7
                                                      • Instruction ID: 98678fbc685ac96e519255281ca2056e5797034ab788e7d60830d662e83125fd
                                                      • Opcode Fuzzy Hash: cbf45723581d981e85a127d1e6e13221934bf88e70c6f22a2dd27bdf3163c3e7
                                                      • Instruction Fuzzy Hash: 9141A270104300AFD720DF29DC88FBBBBF8EB45720F140A6AF9659A2E2D7719945DB61
                                                      APIs
                                                      • ShowWindow.USER32(00C967B0,00000000,01154828,?,?,00C967B0,?,00C5B995,?,?), ref: 00C5BAFF
                                                      • EnableWindow.USER32(?,00000000), ref: 00C5BB23
                                                      • ShowWindow.USER32(00C967B0,00000000,01154828,?,?,00C967B0,?,00C5B995,?,?), ref: 00C5BB83
                                                      • ShowWindow.USER32(?,00000004,?,00C5B995,?,?), ref: 00C5BB95
                                                      • EnableWindow.USER32(?,00000001), ref: 00C5BBB9
                                                      • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00C5BBDC
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Window$Show$Enable$MessageSend
                                                      • String ID:
                                                      • API String ID: 642888154-0
                                                      • Opcode ID: dcd9cb7977a63b9d6dbca507c2c336fcdbc9aa60608b9c4a5eee5af14aee1f18
                                                      • Instruction ID: 7f7793ba6d3479e923ca0b007562c93295f143e298b84a7dd0c7ba06237790ca
                                                      • Opcode Fuzzy Hash: dcd9cb7977a63b9d6dbca507c2c336fcdbc9aa60608b9c4a5eee5af14aee1f18
                                                      • Instruction Fuzzy Hash: 16415138600540AFDB25CF14C489FA5BFE1FB05316F1841B9ED588F2A6C7B1AD89CB54
                                                      APIs
                                                      • GetForegroundWindow.USER32(?,?,?,?,?,?,00C452F1,?,?,00000000,00000001), ref: 00C4755B
                                                        • Part of subcall function 00C43E50: GetWindowRect.USER32(?,?), ref: 00C43E63
                                                      • GetDesktopWindow.USER32 ref: 00C47585
                                                      • GetWindowRect.USER32(00000000), ref: 00C4758C
                                                      • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00C475BE
                                                        • Part of subcall function 00C3566C: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00C356E4
                                                      • GetCursorPos.USER32(?), ref: 00C475EA
                                                      • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00C47648
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                      • String ID:
                                                      • API String ID: 4137160315-0
                                                      • Opcode ID: 835117e39740934fae77f2ef0aaf14d659d4bab0b1ec26335a6de0d99379ba38
                                                      • Instruction ID: 961dbb4b306a9eedfdbbd4e864f960169a988fef12b8e3bc379327b85c8db652
                                                      • Opcode Fuzzy Hash: 835117e39740934fae77f2ef0aaf14d659d4bab0b1ec26335a6de0d99379ba38
                                                      • Instruction Fuzzy Hash: A731D072108305ABD720DF14C849F9FB7A9FF88314F100A19F599A7191DB70EA08CB92
                                                      APIs
                                                        • Part of subcall function 00C28AAA: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00C28AC1
                                                        • Part of subcall function 00C28AAA: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00C28ACB
                                                        • Part of subcall function 00C28AAA: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00C28ADA
                                                        • Part of subcall function 00C28AAA: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00C28AE1
                                                        • Part of subcall function 00C28AAA: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00C28AF7
                                                      • GetLengthSid.ADVAPI32(?,00000000,00C28E30), ref: 00C29265
                                                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00C29271
                                                      • HeapAlloc.KERNEL32(00000000), ref: 00C29278
                                                      • CopySid.ADVAPI32(00000000,00000000,?), ref: 00C29291
                                                      • GetProcessHeap.KERNEL32(00000000,00000000,00C28E30), ref: 00C292A5
                                                      • HeapFree.KERNEL32(00000000), ref: 00C292AC
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                      • String ID:
                                                      • API String ID: 3008561057-0
                                                      • Opcode ID: edad7ce06ccb4cfcfc26caf73a64e4b8b03dbdf77654d89a388a6c8e9286a569
                                                      • Instruction ID: 87df0791497d38b6f0be3b62eb96df744ab9443b613b70022c524e3a0c4b7730
                                                      • Opcode Fuzzy Hash: edad7ce06ccb4cfcfc26caf73a64e4b8b03dbdf77654d89a388a6c8e9286a569
                                                      • Instruction Fuzzy Hash: 9511BB32601214FFEB20DFA5EC09FAF7BA8EF45316F208019F855A7610C772AA44DB60
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00C28FE3
                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00C28FEA
                                                      • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00C28FF9
                                                      • CloseHandle.KERNEL32(00000004), ref: 00C29004
                                                      • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00C29033
                                                      • DestroyEnvironmentBlock.USERENV(00000000), ref: 00C29047
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                      • String ID:
                                                      • API String ID: 1413079979-0
                                                      • Opcode ID: f3864b5053358be9f8d9348fba7e7e52087d9af64c2880c1a91c0cb7a3a8bf21
                                                      • Instruction ID: dedbae2c6bc80b6b81a17ccbd1c48d5d7e31eac7d34120690dcd39539bd89a88
                                                      • Opcode Fuzzy Hash: f3864b5053358be9f8d9348fba7e7e52087d9af64c2880c1a91c0cb7a3a8bf21
                                                      • Instruction Fuzzy Hash: 2F11597250124DABDF228F99ED49FDF7BA9EF08704F144065FE04A2160C7B29E64EB60
                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 00C2C131
                                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 00C2C142
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00C2C149
                                                      • ReleaseDC.USER32(00000000,00000000), ref: 00C2C151
                                                      • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00C2C168
                                                      • MulDiv.KERNEL32(000009EC,?,?), ref: 00C2C17A
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CapsDevice$Release
                                                      • String ID:
                                                      • API String ID: 1035833867-0
                                                      • Opcode ID: fa37572ff66303ffe048519a0461d400fceab7ea3560ea833fe8c791d8226cb3
                                                      • Instruction ID: 10bbe3e0b8b498929cace791dd53da5c385b65642e6b8f3486bf5f02f6b3ecbe
                                                      • Opcode Fuzzy Hash: fa37572ff66303ffe048519a0461d400fceab7ea3560ea833fe8c791d8226cb3
                                                      • Instruction Fuzzy Hash: F9018475E00218BBEB109BA69C49B5FBFB8EF48351F104065FE04B7281D6B09D10CFA0
                                                      APIs
                                                        • Part of subcall function 00BD16CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00BD1729
                                                        • Part of subcall function 00BD16CF: SelectObject.GDI32(?,00000000), ref: 00BD1738
                                                        • Part of subcall function 00BD16CF: BeginPath.GDI32(?), ref: 00BD174F
                                                        • Part of subcall function 00BD16CF: SelectObject.GDI32(?,00000000), ref: 00BD1778
                                                      • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00C5C2F7
                                                      • LineTo.GDI32(00000000,00000003,?), ref: 00C5C30B
                                                      • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00C5C319
                                                      • LineTo.GDI32(00000000,00000000,?), ref: 00C5C329
                                                      • EndPath.GDI32(00000000), ref: 00C5C339
                                                      • StrokePath.GDI32(00000000), ref: 00C5C349
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                      • String ID:
                                                      • API String ID: 43455801-0
                                                      • Opcode ID: 6b8ebadf6cea729e075eaae67453658a0f8175d878dc3c26b89d0b2b65c74c1c
                                                      • Instruction ID: a1d10d109da780073919904306dc9aa6213afee383ba36874f247e57709bf907
                                                      • Opcode Fuzzy Hash: 6b8ebadf6cea729e075eaae67453658a0f8175d878dc3c26b89d0b2b65c74c1c
                                                      • Instruction Fuzzy Hash: 5911B77600010DBFDB129F95DC88FAE7FADEB08354F148061FA195A1A0D7B29E95DBA0
                                                      APIs
                                                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00BF0717
                                                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 00BF071F
                                                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00BF072A
                                                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00BF0735
                                                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 00BF073D
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00BF0745
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Virtual
                                                      • String ID:
                                                      • API String ID: 4278518827-0
                                                      • Opcode ID: c8071bf48434589998bc6544bd59768767ef922413ef1c3d103fdb281ac17d7d
                                                      • Instruction ID: a971ddc40e628c32db86b69d5020b41a0d3dc36c72ca410942bf60a69e970e98
                                                      • Opcode Fuzzy Hash: c8071bf48434589998bc6544bd59768767ef922413ef1c3d103fdb281ac17d7d
                                                      • Instruction Fuzzy Hash: B50148B09017597DE3008F5A8C85B56FEA8FF59354F00411BA15847941C7F5A864CBE5
                                                      APIs
                                                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00C35821
                                                      • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00C35837
                                                      • GetWindowThreadProcessId.USER32(?,?), ref: 00C35846
                                                      • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00C35855
                                                      • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00C3585F
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00C35866
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                      • String ID:
                                                      • API String ID: 839392675-0
                                                      • Opcode ID: d1870c4e23174caacd9dbb5e21f1a22a5d9489d1ca6bf43cfb569f87803fec95
                                                      • Instruction ID: fbec778bbb59029e8e011569f7851922387b61a54e8cffd7fb06e88bb34eb5b6
                                                      • Opcode Fuzzy Hash: d1870c4e23174caacd9dbb5e21f1a22a5d9489d1ca6bf43cfb569f87803fec95
                                                      • Instruction Fuzzy Hash: 9DF01D32241558BBE7315B93DC0DFEF7A7CEBC6B12F100159FA04A1050D7E05A1186B5
                                                      APIs
                                                      • InterlockedExchange.KERNEL32(?,?), ref: 00C3766B
                                                      • EnterCriticalSection.KERNEL32(?,?,00BDC2B6,?,?), ref: 00C3767C
                                                      • TerminateThread.KERNEL32(00000000,000001F6,?,00BDC2B6,?,?), ref: 00C37689
                                                      • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00BDC2B6,?,?), ref: 00C37696
                                                        • Part of subcall function 00C3705D: CloseHandle.KERNEL32(00000000,?,00C376A3,?,00BDC2B6,?,?), ref: 00C37067
                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00C376A9
                                                      • LeaveCriticalSection.KERNEL32(?,?,00BDC2B6,?,?), ref: 00C376B0
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                      • String ID:
                                                      • API String ID: 3495660284-0
                                                      • Opcode ID: a521f4f34965a7f39134358ec07076dee2fd09ddd340191b2ca5a3646c03dd14
                                                      • Instruction ID: 476f44fffd8ff30aaa1f6e35b8e980e7de7d9c4a238c133ba7d7b68b697d96ad
                                                      • Opcode Fuzzy Hash: a521f4f34965a7f39134358ec07076dee2fd09ddd340191b2ca5a3646c03dd14
                                                      • Instruction Fuzzy Hash: 1FF05E72165611ABDB312B65EC9DBAF7739FF46702F240926F602B10A1CBB55901CB60
                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00C29338
                                                      • UnloadUserProfile.USERENV(?,?), ref: 00C29344
                                                      • CloseHandle.KERNEL32(?), ref: 00C2934D
                                                      • CloseHandle.KERNEL32(?), ref: 00C29355
                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00C2935E
                                                      • HeapFree.KERNEL32(00000000), ref: 00C29365
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                      • String ID:
                                                      • API String ID: 146765662-0
                                                      • Opcode ID: a653fbf991a48fea03b64b7ee55dc61fa3296f8b11364f0a943b9021ce70d0ef
                                                      • Instruction ID: 959f2380db63c9d07d0af0e937900270dd8894785a62744e029a0be07826f646
                                                      • Opcode Fuzzy Hash: a653fbf991a48fea03b64b7ee55dc61fa3296f8b11364f0a943b9021ce70d0ef
                                                      • Instruction Fuzzy Hash: 80E0E536004101BBDB121FE2EC0CB5FBF39FF4A722B204620F215A1170CBB2A460DB50
                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 00C48AC5
                                                      • CharUpperBuffW.USER32(?,?), ref: 00C48BD4
                                                      • VariantClear.OLEAUT32(?), ref: 00C48D4C
                                                        • Part of subcall function 00C3798A: VariantInit.OLEAUT32(00000000), ref: 00C379CA
                                                        • Part of subcall function 00C3798A: VariantCopy.OLEAUT32(00000000,?), ref: 00C379D3
                                                        • Part of subcall function 00C3798A: VariantClear.OLEAUT32(00000000), ref: 00C379DF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                      • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                      • API String ID: 4237274167-1221869570
                                                      • Opcode ID: 42453ee6803ea12f54f41ae92302659ad34d34765e6a475cd7323febede8aee8
                                                      • Instruction ID: cc199c1f1e19507c9b26ac14dcc3dec7fc24e8b13fb60dfbda834ab8d3d2dad7
                                                      • Opcode Fuzzy Hash: 42453ee6803ea12f54f41ae92302659ad34d34765e6a475cd7323febede8aee8
                                                      • Instruction Fuzzy Hash: 26916A70A043019FC710EF25C48496EBBE4FF89714F14896EF89A8B362DB31E949CB52
                                                      APIs
                                                        • Part of subcall function 00BE436A: _wcscpy.LIBCMT ref: 00BE438D
                                                      • _memset.LIBCMT ref: 00C3319B
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00C331CA
                                                      • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00C3327D
                                                      • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00C332AB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                      • String ID: 0
                                                      • API String ID: 4152858687-4108050209
                                                      • Opcode ID: d23d160899bdc3cda40a25d31671092e2c1f997186859d5650e6ff9da017aecf
                                                      • Instruction ID: d091e45298400cb85f9304a68f72929afcef46e063c32605e383d1f4ccbf8f36
                                                      • Opcode Fuzzy Hash: d23d160899bdc3cda40a25d31671092e2c1f997186859d5650e6ff9da017aecf
                                                      • Instruction Fuzzy Hash: FB51D1716283819ADB25EF29D84576BBBE4EF45310F040A2DF8A5D31E2DB71CF048796
                                                      APIs
                                                      • CoCreateInstance.OLE32(00000018,00000000,00000005,00000028,?,?,?,?,?,00000000,00000000,00000000,?,00C487D6,?,00000000), ref: 00C5DCCE
                                                      • SetErrorMode.KERNEL32(00000001,?,00000000,00000000,00000000,?,00C487D6,?,00000000,00000000), ref: 00C5DD04
                                                      • GetProcAddress.KERNEL32(00000000,DllGetClassObject), ref: 00C5DD15
                                                      • SetErrorMode.KERNEL32(00000000,?,00000000,00000000,00000000,?,00C487D6,?,00000000,00000000), ref: 00C5DD97
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$AddressCreateInstanceProc
                                                      • String ID: DllGetClassObject
                                                      • API String ID: 753597075-1075368562
                                                      • Opcode ID: 404766c4779bddf54ae6354b20dedf777bd8eadca7db52e09a592c65f5c5db86
                                                      • Instruction ID: 7b3f41a71db391b7525175e11eb6d1754ab6d81da32cbbdae4ccd987fd7cf1ef
                                                      • Opcode Fuzzy Hash: 404766c4779bddf54ae6354b20dedf777bd8eadca7db52e09a592c65f5c5db86
                                                      • Instruction Fuzzy Hash: 2541B475600305EFDB25DF65C884B9A7BB9EF45311F1080ADEC069F205D7B1DA88CBA4
                                                      APIs
                                                      • _memset.LIBCMT ref: 00C32DD3
                                                      • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00C32DEF
                                                      • DeleteMenu.USER32(?,00000007,00000000), ref: 00C32E35
                                                      • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00C96890,00000000), ref: 00C32E7E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Menu$Delete$InfoItem_memset
                                                      • String ID: 0
                                                      • API String ID: 1173514356-4108050209
                                                      • Opcode ID: 6201b4fd54d4e018d29e67687e7b82d57e23d912a369492e7c37b5ba2cd22c0a
                                                      • Instruction ID: fd060c21377930199b3df14d456642da21375f52b3deeea35a252818d6d08e81
                                                      • Opcode Fuzzy Hash: 6201b4fd54d4e018d29e67687e7b82d57e23d912a369492e7c37b5ba2cd22c0a
                                                      • Instruction Fuzzy Hash: 89419F702143419FDB24DF29C885B2AB7E8AF89311F14462EF9A6973D1D770E905CB62
                                                      APIs
                                                      • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00C4DC76
                                                        • Part of subcall function 00BE1462: _memmove.LIBCMT ref: 00BE14B0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: BuffCharLower_memmove
                                                      • String ID: cdecl$none$stdcall$winapi
                                                      • API String ID: 3425801089-567219261
                                                      • Opcode ID: 4b47799b814e376e3e8b742718c7272445e452e82c58ae4b800620320a5b3f7a
                                                      • Instruction ID: 3a65e5f117e985c5d0b85fd6958b4e90a765b65efc7b26ea1ac5108ead615412
                                                      • Opcode Fuzzy Hash: 4b47799b814e376e3e8b742718c7272445e452e82c58ae4b800620320a5b3f7a
                                                      • Instruction Fuzzy Hash: 9B318370A10619ABCF04FF54C8419FEB3B4FF55314B208A6AE836977D2DB71A905CB90
                                                      APIs
                                                        • Part of subcall function 00BE1A36: _memmove.LIBCMT ref: 00BE1A77
                                                        • Part of subcall function 00C2B57D: GetClassNameW.USER32(?,?,000000FF), ref: 00C2B5A0
                                                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00C298AF
                                                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00C298C2
                                                      • SendMessageW.USER32(?,00000189,?,00000000), ref: 00C298F2
                                                        • Part of subcall function 00BE1821: _memmove.LIBCMT ref: 00BE185B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$_memmove$ClassName
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 365058703-1403004172
                                                      • Opcode ID: 622c3acf56b922632dfbefb565b6cff44e76b851ba5418eafa59449b79b7754b
                                                      • Instruction ID: b0446f4a6f7f18bdb8b59903663d55bb1adf7bbd8d5fafde0f1cf6fc41994183
                                                      • Opcode Fuzzy Hash: 622c3acf56b922632dfbefb565b6cff44e76b851ba5418eafa59449b79b7754b
                                                      • Instruction Fuzzy Hash: D6212671900108AEDB24BBA5DC45DFFB7B8EF41360F204529F835A76E1DB354E499660
                                                      APIs
                                                      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00C41CFC
                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00C41D22
                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00C41D52
                                                      • InternetCloseHandle.WININET(00000000), ref: 00C41D99
                                                        • Part of subcall function 00C42933: GetLastError.KERNEL32(?,?,00C41CC7,00000000,00000000,00000001), ref: 00C42948
                                                        • Part of subcall function 00C42933: SetEvent.KERNEL32(?,?,00C41CC7,00000000,00000000,00000001), ref: 00C4295D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                      • String ID:
                                                      • API String ID: 3113390036-3916222277
                                                      • Opcode ID: 8154d8ee3cc87670c1a3904f3adf2a2b1b93b8c1308c39c354dd4407266eef29
                                                      • Instruction ID: 5b521b85a69165a82548f7e0fe3d283856a9435e25658a1d7fc22cd5217961f9
                                                      • Opcode Fuzzy Hash: 8154d8ee3cc87670c1a3904f3adf2a2b1b93b8c1308c39c354dd4407266eef29
                                                      • Instruction Fuzzy Hash: AD21CFB1900208BFE7229F24CC85FBF77FCFB48744F14411AF955A2240DB609E459BA0
                                                      APIs
                                                        • Part of subcall function 00BD2111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00BD214F
                                                        • Part of subcall function 00BD2111: GetStockObject.GDI32(00000011), ref: 00BD2163
                                                        • Part of subcall function 00BD2111: SendMessageW.USER32(00000000,00000030,00000000), ref: 00BD216D
                                                      • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00C5684E
                                                      • LoadLibraryW.KERNEL32(?), ref: 00C56855
                                                      • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00C5686A
                                                      • DestroyWindow.USER32(?), ref: 00C56872
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                      • String ID: SysAnimate32
                                                      • API String ID: 4146253029-1011021900
                                                      • Opcode ID: 837d7205d9303a071e45446552cd41ec8dc5c31ce3ce3feee8cc7000f7fe4967
                                                      • Instruction ID: fcae688e8bda2d056d69daa7740219802b9623499c0c05ecc83ad889c705db3b
                                                      • Opcode Fuzzy Hash: 837d7205d9303a071e45446552cd41ec8dc5c31ce3ce3feee8cc7000f7fe4967
                                                      • Instruction Fuzzy Hash: 0821DB79200205ABEF204F74CC80FBB73A9EB58329FA04628FE60931D0CB71DC959724
                                                      APIs
                                                      • GetStdHandle.KERNEL32(0000000C), ref: 00C371E4
                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00C37217
                                                      • GetStdHandle.KERNEL32(0000000C), ref: 00C37229
                                                      • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00C37263
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CreateHandle$FilePipe
                                                      • String ID: nul
                                                      • API String ID: 4209266947-2873401336
                                                      • Opcode ID: 4821202d502286e18b7f4b03102b6e3d76e6549228a842d2b59f6ab16bbf4ae1
                                                      • Instruction ID: c7fc94946c91bfe297d4954bceea2eda8cecdca47c82b3d9e5b52c580fa9fa6a
                                                      • Opcode Fuzzy Hash: 4821202d502286e18b7f4b03102b6e3d76e6549228a842d2b59f6ab16bbf4ae1
                                                      • Instruction Fuzzy Hash: 052190B1518206EBDB309F29DC04B9E77A4AF45720F204B19FCB4E72D0DBB19950DB50
                                                      APIs
                                                      • GetStdHandle.KERNEL32(000000F6), ref: 00C372B1
                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00C372E3
                                                      • GetStdHandle.KERNEL32(000000F6), ref: 00C372F4
                                                      • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00C3732E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CreateHandle$FilePipe
                                                      • String ID: nul
                                                      • API String ID: 4209266947-2873401336
                                                      • Opcode ID: b1c1ab5d107c550a54a4a26e80d48f2fcf146a20416a56ad649aea6135a2b75e
                                                      • Instruction ID: 2e97bccaa38991c9e4a5c04e43804c2a20d122ea859811056bc6d0eb772a4946
                                                      • Opcode Fuzzy Hash: b1c1ab5d107c550a54a4a26e80d48f2fcf146a20416a56ad649aea6135a2b75e
                                                      • Instruction Fuzzy Hash: 452162B1518206DBDB30AF699C44B9A77A8AF55730F300B19FCB1E72D0DBB199409751
                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 00C3B104
                                                      • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00C3B158
                                                      • __swprintf.LIBCMT ref: 00C3B171
                                                      • SetErrorMode.KERNEL32(00000000,00000001,00000000,00C60980), ref: 00C3B1AF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$InformationVolume__swprintf
                                                      • String ID: %lu
                                                      • API String ID: 3164766367-685833217
                                                      • Opcode ID: 6e228b466ddeceffeff65571f12d1d3963e5a46ee443b69717f45af83cf16981
                                                      • Instruction ID: 2eefc67e5ccaa95f59a5d880ccad7c5eecaad26779fb3da1b8a5e62ba3ea89ba
                                                      • Opcode Fuzzy Hash: 6e228b466ddeceffeff65571f12d1d3963e5a46ee443b69717f45af83cf16981
                                                      • Instruction Fuzzy Hash: 11215E34A00108AFCB10EB65C995EAEB7F8EF89704B1084A9F909E7251DB71EA45DB61
                                                      APIs
                                                        • Part of subcall function 00BE1821: _memmove.LIBCMT ref: 00BE185B
                                                        • Part of subcall function 00C2A835: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00C2A852
                                                        • Part of subcall function 00C2A835: GetWindowThreadProcessId.USER32(?,00000000), ref: 00C2A865
                                                        • Part of subcall function 00C2A835: GetCurrentThreadId.KERNEL32 ref: 00C2A86C
                                                        • Part of subcall function 00C2A835: AttachThreadInput.USER32(00000000), ref: 00C2A873
                                                      • GetFocus.USER32 ref: 00C2AA0D
                                                        • Part of subcall function 00C2A87E: GetParent.USER32(?), ref: 00C2A88C
                                                      • GetClassNameW.USER32(?,?,00000100), ref: 00C2AA56
                                                      • EnumChildWindows.USER32(?,00C2AACE), ref: 00C2AA7E
                                                      • __swprintf.LIBCMT ref: 00C2AA98
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                                      • String ID: %s%d
                                                      • API String ID: 1941087503-1110647743
                                                      • Opcode ID: 09568138048dbda019c25bf9228160f95157cbcd7557f4bc61ab37df5a07cde8
                                                      • Instruction ID: 7df0a639fba795c0e9326a36eb5f4bdcdce3c282393da047f873c229b6ca19b6
                                                      • Opcode Fuzzy Hash: 09568138048dbda019c25bf9228160f95157cbcd7557f4bc61ab37df5a07cde8
                                                      • Instruction Fuzzy Hash: 2211A271600215BBDF11BFA5DD85FAE37ADAF44700F1040B9FD18AA182DA705946DB71
                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?), ref: 00C32184
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpper
                                                      • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                      • API String ID: 3964851224-769500911
                                                      • Opcode ID: 6d67dd49bf271ba0e39646fc0ed08e8e781a907838912547e72dba19c12055ac
                                                      • Instruction ID: ae8b607b6b5e68bc90c364ba5d6da57f8cdd93e99e498ebd82840dd1360e2d6e
                                                      • Opcode Fuzzy Hash: 6d67dd49bf271ba0e39646fc0ed08e8e781a907838912547e72dba19c12055ac
                                                      • Instruction Fuzzy Hash: 3F118B749201088F8F04EF64C9519FEB3B4FF65308B5085A8E926A7263DB325E0ACB40
                                                      APIs
                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00C4F0B8
                                                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00C4F0E8
                                                      • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00C4F21B
                                                      • CloseHandle.KERNEL32(?), ref: 00C4F29C
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                      • String ID:
                                                      • API String ID: 2364364464-0
                                                      • Opcode ID: 06a8556ff50244d3d0339fab2114d5caaa9adb5612e080aafef3ccbdb7e2a310
                                                      • Instruction ID: 84afee4ca144b9dde6c4e81aa97f381792fd319380d49045c9d938f62d55ab81
                                                      • Opcode Fuzzy Hash: 06a8556ff50244d3d0339fab2114d5caaa9adb5612e080aafef3ccbdb7e2a310
                                                      • Instruction Fuzzy Hash: 598191756007019FD720DF28D846F2BF7E5AF88710F14896EF9999B392E7B0AD018B51
                                                      APIs
                                                        • Part of subcall function 00BE1A36: _memmove.LIBCMT ref: 00BE1A77
                                                        • Part of subcall function 00C51242: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C501D5,?,?), ref: 00C51259
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C50525
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00C50564
                                                      • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00C505AB
                                                      • RegCloseKey.ADVAPI32(?,?), ref: 00C505D7
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 00C505E4
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                      • String ID:
                                                      • API String ID: 3440857362-0
                                                      • Opcode ID: a4d215a3c77722041f649ba2d8584751a0964cd937077cc3d910ac6126d43898
                                                      • Instruction ID: d4e200c1f0a7eff2e22868b8cf2a5e5ad0a9016ac0fb6868625d7a2f1af6a770
                                                      • Opcode Fuzzy Hash: a4d215a3c77722041f649ba2d8584751a0964cd937077cc3d910ac6126d43898
                                                      • Instruction Fuzzy Hash: DC514A71208204AFC714EF59C881F6EB7E8FF84304F60495DF99697291EB70E948DB56
                                                      APIs
                                                      • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00C3EACF
                                                      • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00C3EAF8
                                                      • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00C3EB37
                                                        • Part of subcall function 00BD4D37: __itow.LIBCMT ref: 00BD4D62
                                                        • Part of subcall function 00BD4D37: __swprintf.LIBCMT ref: 00BD4DAC
                                                      • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00C3EB5C
                                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00C3EB64
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                      • String ID:
                                                      • API String ID: 1389676194-0
                                                      • Opcode ID: 58e5cf7f657b3b32c110119cfd3b743ef001f2ce642e4945b7469e56dac65479
                                                      • Instruction ID: f2883f599ae10973fa22c245c71e1dcd1b4e3240176349fb7a196ee6f3aaf290
                                                      • Opcode Fuzzy Hash: 58e5cf7f657b3b32c110119cfd3b743ef001f2ce642e4945b7469e56dac65479
                                                      • Instruction Fuzzy Hash: 21512D35A00509DFCF11EF65C985AAEBBF5EF08314B1480A9E919AB3A2DB31ED11DB50
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7ad4af5c677df6c3886a9272084c5dfcd01ff3b1e4fc9d16de888b162ab55b8b
                                                      • Instruction ID: 3b40e1bd340d018c4fb3fe8327c552d185bc0d9d611021ac8d7b4ea95210540f
                                                      • Opcode Fuzzy Hash: 7ad4af5c677df6c3886a9272084c5dfcd01ff3b1e4fc9d16de888b162ab55b8b
                                                      • Instruction Fuzzy Hash: 5D41D739900114AFC720DF6ACC48FA9BBA4FB09311F540355FD29A72E1D7B09E94DB5A
                                                      APIs
                                                      • GetCursorPos.USER32(?), ref: 00BD2727
                                                      • ScreenToClient.USER32(00C967B0,?), ref: 00BD2744
                                                      • GetAsyncKeyState.USER32(00000001), ref: 00BD2769
                                                      • GetAsyncKeyState.USER32(00000002), ref: 00BD2777
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: AsyncState$ClientCursorScreen
                                                      • String ID:
                                                      • API String ID: 4210589936-0
                                                      • Opcode ID: d1159605d5bb35afe20a0382e12bc40bbb9afcbef5a05aeca1df9f83a2d00ebf
                                                      • Instruction ID: 85f7bf73a24dbff0a4282409ec51097484c981edd9bc189af893d841e4fcb291
                                                      • Opcode Fuzzy Hash: d1159605d5bb35afe20a0382e12bc40bbb9afcbef5a05aeca1df9f83a2d00ebf
                                                      • Instruction Fuzzy Hash: 2D416F75504149FBDF299FA5C884EE9FBB4FB15321F20435AF829922D0D730AE94DB90
                                                      APIs
                                                      • GetWindowRect.USER32(?,?), ref: 00C293CB
                                                      • PostMessageW.USER32(?,00000201,00000001), ref: 00C29475
                                                      • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00C2947D
                                                      • PostMessageW.USER32(?,00000202,00000000), ref: 00C2948B
                                                      • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00C29493
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessagePostSleep$RectWindow
                                                      • String ID:
                                                      • API String ID: 3382505437-0
                                                      • Opcode ID: 7c2d60ce5294eb24d99ea8eddf31d9c4697fc6fe9d8cc2455d30eb5d30a737e1
                                                      • Instruction ID: 11987a093d1013eb08643495ad952858a449c16314632edb926dd09e41989be1
                                                      • Opcode Fuzzy Hash: 7c2d60ce5294eb24d99ea8eddf31d9c4697fc6fe9d8cc2455d30eb5d30a737e1
                                                      • Instruction Fuzzy Hash: A431CE71500229EFDF14CFA9E94CB9E7BB5EF45315F208229F925AA1D0C3B09A14DB90
                                                      APIs
                                                      • IsWindowVisible.USER32(?), ref: 00C2BB80
                                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00C2BB9D
                                                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00C2BBD5
                                                      • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00C2BBFB
                                                      • _wcsstr.LIBCMT ref: 00C2BC05
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                      • String ID:
                                                      • API String ID: 3902887630-0
                                                      • Opcode ID: 7ba8570c54d1650ef69b325626f885fce31e363404905ef7a53dd467fdcf9294
                                                      • Instruction ID: 1817cd55649b20f50aed005ee5e357e3867dd73cf21bbc87ae0711e56c644fe8
                                                      • Opcode Fuzzy Hash: 7ba8570c54d1650ef69b325626f885fce31e363404905ef7a53dd467fdcf9294
                                                      • Instruction Fuzzy Hash: 992107322042147BEB255B3AEC05F7F7BE8DF44720F104169FD05DA161EFA1DD4092A0
                                                      APIs
                                                        • Part of subcall function 00BD29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BD29F3
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00C5B57F
                                                      • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00C5B5A4
                                                      • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00C5B5BC
                                                      • GetSystemMetrics.USER32(00000004), ref: 00C5B5E5
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00C41340,00000000), ref: 00C5B603
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$MetricsSystem
                                                      • String ID:
                                                      • API String ID: 2294984445-0
                                                      • Opcode ID: fc24a279dfe54556fd03d78c6e578bd2bc7e7a77be020e3a5ce80889d3351b52
                                                      • Instruction ID: cc07890d0b23ae9272a08c6fad083006a52397c99bde000ea34799864840ba62
                                                      • Opcode Fuzzy Hash: fc24a279dfe54556fd03d78c6e578bd2bc7e7a77be020e3a5ce80889d3351b52
                                                      • Instruction Fuzzy Hash: BB217475510215AFCB249F3A8C08B6A7BA5EB05722F214725FD32D61E0E7709E94CB44
                                                      APIs
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00C29CBB
                                                        • Part of subcall function 00BE1821: _memmove.LIBCMT ref: 00BE185B
                                                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00C29CED
                                                      • __itow.LIBCMT ref: 00C29D05
                                                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00C29D2D
                                                      • __itow.LIBCMT ref: 00C29D3E
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$__itow$_memmove
                                                      • String ID:
                                                      • API String ID: 2983881199-0
                                                      • Opcode ID: 1285287a276c8351b207f17e23c8c715b82871f950c1134fd095ab89231cbef5
                                                      • Instruction ID: 8e393e30a25d95dcc86273047a616447dc149e1c6cb9e39f7a98b9e617910975
                                                      • Opcode Fuzzy Hash: 1285287a276c8351b207f17e23c8c715b82871f950c1134fd095ab89231cbef5
                                                      • Instruction Fuzzy Hash: E221A731701218BBDB20AA66EC89EEE7BEDEF45750F140065FE01EB251D6B0CD45E7A1
                                                      APIs
                                                      • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00BD1729
                                                      • SelectObject.GDI32(?,00000000), ref: 00BD1738
                                                      • BeginPath.GDI32(?), ref: 00BD174F
                                                      • SelectObject.GDI32(?,00000000), ref: 00BD1778
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ObjectSelect$BeginCreatePath
                                                      • String ID:
                                                      • API String ID: 3225163088-0
                                                      • Opcode ID: 15ded7696b10e9cfec1873ea52d9e2876a623aa7ef2e5c62bf175d5f52e46b37
                                                      • Instruction ID: 8d2828d7d0ac0bec3e88b44e4f6b2c9f8adb2a35b7ffeed51bbc4fd3e789f017
                                                      • Opcode Fuzzy Hash: 15ded7696b10e9cfec1873ea52d9e2876a623aa7ef2e5c62bf175d5f52e46b37
                                                      • Instruction Fuzzy Hash: 1C214170900208EBDB119F69DD4876EBBF9F700751F148657F811A62F0E7B19D91CB94
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _memcmp
                                                      • String ID:
                                                      • API String ID: 2931989736-0
                                                      • Opcode ID: 51f3f93e759667c507a9749c6c638997c85b57dd8c69815a8c4809e2a73ee606
                                                      • Instruction ID: 912fef03d2a9fc24b707880b0bc19b10dfeb54d9ce0159de737430540b915989
                                                      • Opcode Fuzzy Hash: 51f3f93e759667c507a9749c6c638997c85b57dd8c69815a8c4809e2a73ee606
                                                      • Instruction Fuzzy Hash: 9D01D8B1B0012ABBD220A616ADC2FBF779CAEB0794F004866FE15D7641F770DF1482A4
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 00C34EE2
                                                      • __beginthreadex.LIBCMT ref: 00C34F00
                                                      • MessageBoxW.USER32(?,?,?,?), ref: 00C34F15
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00C34F2B
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00C34F32
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                      • String ID:
                                                      • API String ID: 3824534824-0
                                                      • Opcode ID: cdd28f1db14e9daa004dd330540dc215de24ba09ab02905720e8c9e68ecb4d25
                                                      • Instruction ID: 8bf8d9d68293617c041728d8692401bf447a1cc717d9d098c8fbdaf4bd712c55
                                                      • Opcode Fuzzy Hash: cdd28f1db14e9daa004dd330540dc215de24ba09ab02905720e8c9e68ecb4d25
                                                      • Instruction Fuzzy Hash: E5110CB59146057BC7118BB99C08BDF7BACEB46320F140256F824E33A0D6B5890487A0
                                                      APIs
                                                      • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00C28C1F
                                                      • GetLastError.KERNEL32(?,00C286E3,?,?,?), ref: 00C28C29
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00C286E3,?,?,?), ref: 00C28C38
                                                      • HeapAlloc.KERNEL32(00000000,?,00C286E3,?,?,?), ref: 00C28C3F
                                                      • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00C28C56
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 842720411-0
                                                      • Opcode ID: bc6b1fe7330931fd93a8034fbcfb013786a95774c75fce2783ed70b2b25476a6
                                                      • Instruction ID: d29e25801be8251bacae7b0e4158cfd4777a41f9b7e3d3134028d551981dd988
                                                      • Opcode Fuzzy Hash: bc6b1fe7330931fd93a8034fbcfb013786a95774c75fce2783ed70b2b25476a6
                                                      • Instruction Fuzzy Hash: 29016270602224BFDB204FA6EC88E6F7BACEF867557200429F854D2220DB71CD14CA70
                                                      APIs
                                                      • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00C35688
                                                      • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00C35696
                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00C3569E
                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00C356A8
                                                      • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00C356E4
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: PerformanceQuery$CounterSleep$Frequency
                                                      • String ID:
                                                      • API String ID: 2833360925-0
                                                      • Opcode ID: ad04ba3625abdbadc91297dce4391999f8e63fc786f63b3798d7368a47f941ed
                                                      • Instruction ID: a50044e2929060c54747c8f6f44c729104ed8fb7c32947c5be2f49b4e697f775
                                                      • Opcode Fuzzy Hash: ad04ba3625abdbadc91297dce4391999f8e63fc786f63b3798d7368a47f941ed
                                                      • Instruction Fuzzy Hash: 1E012931E12A19DBCF10AFE5DD4ABEEBBB8FB09711F500456E915B2250CB7095508BA1
                                                      APIs
                                                      • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00C27A45,80070057,?,?,?,00C27E56), ref: 00C27B28
                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00C27A45,80070057,?,?), ref: 00C27B43
                                                      • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00C27A45,80070057,?,?), ref: 00C27B51
                                                      • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00C27A45,80070057,?), ref: 00C27B61
                                                      • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00C27A45,80070057,?,?), ref: 00C27B6D
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: From$Prog$FreeStringTasklstrcmpi
                                                      • String ID:
                                                      • API String ID: 3897988419-0
                                                      • Opcode ID: 89beac1282c9a9a52b5b9a49a92b117f3bce771b9025aac8a55e498e8199adf7
                                                      • Instruction ID: ba710097ee8e02ffb2d83856855c36975f41c88d3fef32f5df963b4c7717f13a
                                                      • Opcode Fuzzy Hash: 89beac1282c9a9a52b5b9a49a92b117f3bce771b9025aac8a55e498e8199adf7
                                                      • Instruction Fuzzy Hash: 5E017176605224BBDB258F65EC88BAE7BADEF48752F200128F904E3210E771DD40CBA0
                                                      APIs
                                                      • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00C28AC1
                                                      • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00C28ACB
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00C28ADA
                                                      • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00C28AE1
                                                      • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00C28AF7
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 44706859-0
                                                      • Opcode ID: 1c7d55f54aad734e6d522a92e98045ad61bd9c282a62c30929085b6316f60e45
                                                      • Instruction ID: 099f134657f48aafde49427f17163f978b16d4a1157116510d1a133c55bf52ec
                                                      • Opcode Fuzzy Hash: 1c7d55f54aad734e6d522a92e98045ad61bd9c282a62c30929085b6316f60e45
                                                      • Instruction Fuzzy Hash: 82F0AF70201214AFEB200FA6AC8DF6B3BACEF4A759B204029F904D2150CEA19C04DB60
                                                      APIs
                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00C28B22
                                                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00C28B2C
                                                      • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00C28B3B
                                                      • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00C28B42
                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00C28B58
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                      • String ID:
                                                      • API String ID: 44706859-0
                                                      • Opcode ID: 30581ae7d04a959d0ad814c2eb7abfea5ffe0528e1da2c54ed9fe3f996d455bd
                                                      • Instruction ID: 453749a5f742fd2232aac764d3ad4f57025813faf74187fbd99e40e1f6aa03d1
                                                      • Opcode Fuzzy Hash: 30581ae7d04a959d0ad814c2eb7abfea5ffe0528e1da2c54ed9fe3f996d455bd
                                                      • Instruction Fuzzy Hash: B7F0AF71201224AFEB210FA6EC88F6B3BACEF4A755B200029FA04D6150DAA19904DB60
                                                      APIs
                                                      • GetDlgItem.USER32(?,000003E9), ref: 00C2CB73
                                                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 00C2CB8A
                                                      • MessageBeep.USER32(00000000), ref: 00C2CBA2
                                                      • KillTimer.USER32(?,0000040A), ref: 00C2CBBE
                                                      • EndDialog.USER32(?,00000001), ref: 00C2CBD8
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                      • String ID:
                                                      • API String ID: 3741023627-0
                                                      • Opcode ID: d59d8b8fbbad0d9ed1172250fbfd07cd3d2349863894bf34438dca171bc88931
                                                      • Instruction ID: 40fd69a07da71cac73fb8bfaba7c6a12ba4813c1bf314d1faca195497df7355d
                                                      • Opcode Fuzzy Hash: d59d8b8fbbad0d9ed1172250fbfd07cd3d2349863894bf34438dca171bc88931
                                                      • Instruction Fuzzy Hash: 51016234540718ABEB315B55ED8EFAA77B8FB00705F100A99F593614E1DBF0AA548E90
                                                      APIs
                                                      • EndPath.GDI32(?), ref: 00BD179B
                                                      • StrokeAndFillPath.GDI32(?,?,00C0BAF9,00000000,?), ref: 00BD17B7
                                                      • SelectObject.GDI32(?,00000000), ref: 00BD17CA
                                                      • DeleteObject.GDI32 ref: 00BD17DD
                                                      • StrokePath.GDI32(?), ref: 00BD17F8
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Path$ObjectStroke$DeleteFillSelect
                                                      • String ID:
                                                      • API String ID: 2625713937-0
                                                      • Opcode ID: 2adb62520b3af27207e34723087b5055122c9c5ebc3cfc4cd4ed76c7743c6c9a
                                                      • Instruction ID: 03967e314c9e82cef8b82d1e77a1e3ed345b0c72f10ef1d3c62783ad0baeb84d
                                                      • Opcode Fuzzy Hash: 2adb62520b3af27207e34723087b5055122c9c5ebc3cfc4cd4ed76c7743c6c9a
                                                      • Instruction Fuzzy Hash: 15F0E770005208EBDB215F2AED4CB5E7FE4EB01326F248656F829651F0D7B18996DF24
                                                      APIs
                                                      • CoInitialize.OLE32(00000000), ref: 00C3C8E2
                                                      • CoCreateInstance.OLE32(00C63D3C,00000000,00000001,00C63BAC,?), ref: 00C3C8FA
                                                        • Part of subcall function 00BE1A36: _memmove.LIBCMT ref: 00BE1A77
                                                      • CoUninitialize.OLE32 ref: 00C3CB67
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CreateInitializeInstanceUninitialize_memmove
                                                      • String ID: .lnk
                                                      • API String ID: 2683427295-24824748
                                                      • Opcode ID: 43af49dd164b5f0dd02a183a3c3065c9f9deb2a0aad872432b230c3e75d03d7d
                                                      • Instruction ID: 9929bf50b2103715afdb156fc062202333cc8b94d46cdceda36bd66dd1e1c966
                                                      • Opcode Fuzzy Hash: 43af49dd164b5f0dd02a183a3c3065c9f9deb2a0aad872432b230c3e75d03d7d
                                                      • Instruction Fuzzy Hash: C8A13C71504205AFD300EF64C891EAFB7E8EF98718F10496DF155972A2EB70EE49CB92
                                                      APIs
                                                        • Part of subcall function 00BF0F16: std::exception::exception.LIBCMT ref: 00BF0F4C
                                                        • Part of subcall function 00BF0F16: __CxxThrowException@8.LIBCMT ref: 00BF0F61
                                                        • Part of subcall function 00BE1A36: _memmove.LIBCMT ref: 00BE1A77
                                                        • Part of subcall function 00BE1680: _memmove.LIBCMT ref: 00BE16DB
                                                      • __swprintf.LIBCMT ref: 00BDE598
                                                      Strings
                                                      • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00BDE431
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                      • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                      • API String ID: 1943609520-557222456
                                                      • Opcode ID: f1936622f9a86dfadc47ea6f839582d24903095a48d06f11a2ed9de8307c6640
                                                      • Instruction ID: 41103ee77cd5a5c13ea31ecb6c9bb22f4e3a2c65d9d3002e9eeb849fa5adf8b2
                                                      • Opcode Fuzzy Hash: f1936622f9a86dfadc47ea6f839582d24903095a48d06f11a2ed9de8307c6640
                                                      • Instruction Fuzzy Hash: DD91A0711086419FC714FF28C885CAEB7E4EF95304F50499EF5629B2A2EB30EE44CB92
                                                      APIs
                                                      • __startOneArgErrorHandling.LIBCMT ref: 00BF51FD
                                                        • Part of subcall function 00C00250: __87except.LIBCMT ref: 00C0028B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ErrorHandling__87except__start
                                                      • String ID: pow
                                                      • API String ID: 2905807303-2276729525
                                                      • Opcode ID: 12ec8bf1d577b2bed14c5eccdb769080ce7acdfaf875a232dcddd32c5ff7dda4
                                                      • Instruction ID: 8d75c4c342080038546431c6d41787cffa7ca2d2d632e6c55bbf659dc3b2d816
                                                      • Opcode Fuzzy Hash: 12ec8bf1d577b2bed14c5eccdb769080ce7acdfaf875a232dcddd32c5ff7dda4
                                                      • Instruction Fuzzy Hash: 51517820908A0997DB327718CD4137E2BD4EB40740F318AA9E395871E6EF349EDCEA46
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: #$+
                                                      • API String ID: 0-2552117581
                                                      • Opcode ID: ea1d797b995f3bf35881095f63a6fae06aa845717de493a9e7420fcb4faab0f5
                                                      • Instruction ID: 9d704d3ca6295b74683d69de290cea80268908d55f6ba71b64155824f011773d
                                                      • Opcode Fuzzy Hash: ea1d797b995f3bf35881095f63a6fae06aa845717de493a9e7420fcb4faab0f5
                                                      • Instruction Fuzzy Hash: 9C51217510426A9FDF11AF28D4406BA77E4EF55310F2440A6FDA19B2A1CB30DE56CB70
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _memset$_memmove
                                                      • String ID: ERCP
                                                      • API String ID: 2532777613-1384759551
                                                      • Opcode ID: cc05e553e8e897df9108f44657fddf2561f978bace286e0d26a0e69048fe66ff
                                                      • Instruction ID: 046bbb80da0ecc42db0f45a6f28fcd2be14a2485920a5995e7a70da38827be00
                                                      • Opcode Fuzzy Hash: cc05e553e8e897df9108f44657fddf2561f978bace286e0d26a0e69048fe66ff
                                                      • Instruction Fuzzy Hash: 9A51D570900745DFDB24DF66C9817AAB7F4EF04314F2845AEE84ADB241E7B0DA45CB80
                                                      APIs
                                                        • Part of subcall function 00C31B27: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00C29C31,?,?,00000034,00000800,?,00000034), ref: 00C31B51
                                                      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00C2A1DA
                                                        • Part of subcall function 00C31AF2: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00C29C60,?,?,00000800,?,00001073,00000000,?,?), ref: 00C31B1C
                                                        • Part of subcall function 00C31A49: GetWindowThreadProcessId.USER32(?,?), ref: 00C31A74
                                                        • Part of subcall function 00C31A49: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00C29BF5,00000034,?,?,00001004,00000000,00000000), ref: 00C31A84
                                                        • Part of subcall function 00C31A49: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00C29BF5,00000034,?,?,00001004,00000000,00000000), ref: 00C31A9A
                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00C2A247
                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00C2A294
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                      • String ID: @
                                                      • API String ID: 4150878124-2766056989
                                                      • Opcode ID: 85de23c5c480ba5aeca41c9afba8e8ef0811c33df93a9c2efcec5ad7498cce02
                                                      • Instruction ID: f9fc4627ce789fe291f2596f502bdfb378920928be822611243663fef736dcd3
                                                      • Opcode Fuzzy Hash: 85de23c5c480ba5aeca41c9afba8e8ef0811c33df93a9c2efcec5ad7498cce02
                                                      • Instruction Fuzzy Hash: D9417D72901228BFCB10DFA4DC81FEEBBB8EB09300F104095FA55B7191DA71AE49DB61
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00C5784E
                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00C57862
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00C57886
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window
                                                      • String ID: SysMonthCal32
                                                      • API String ID: 2326795674-1439706946
                                                      • Opcode ID: fc89d88be0e28ee27a15daf289c57feb474aa7ad37ec9a6ae65f41e143480f53
                                                      • Instruction ID: dc5da81710f4dad72dff057b5ef97c685afed15fc14156b5a344ea4bf471366a
                                                      • Opcode Fuzzy Hash: fc89d88be0e28ee27a15daf289c57feb474aa7ad37ec9a6ae65f41e143480f53
                                                      • Instruction Fuzzy Hash: 8821AD36600218ABDF218F94DC46FEA3BB9EF88714F110214FE547B1D0D6B1AC94DBA0
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00C57128
                                                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00C57138
                                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00C5715D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$MoveWindow
                                                      • String ID: Listbox
                                                      • API String ID: 3315199576-2633736733
                                                      • Opcode ID: 56e7c820d4b466e9e3b4faad32cd24ccc8d3bd5b0d9e38c81019d21c5e05e31a
                                                      • Instruction ID: a6392088dabbe9850c4d8004f6243763105dd1cdda41deb5ce8f5067990fe20d
                                                      • Opcode Fuzzy Hash: 56e7c820d4b466e9e3b4faad32cd24ccc8d3bd5b0d9e38c81019d21c5e05e31a
                                                      • Instruction Fuzzy Hash: 8221FF32204108BFEF118F54DC85FBF3BBAEB89761F008224FE149B190C671AC958BA4
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00C57B5F
                                                      • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00C57B74
                                                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00C57B81
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: msctls_trackbar32
                                                      • API String ID: 3850602802-1010561917
                                                      • Opcode ID: 3c437207a1b10f0935e244055e9bd5f62f53aab494ab7e26113d847b0419dd99
                                                      • Instruction ID: 5026890e9f281e4951da2f0a1fed115fe2990ebfd980d5af9ede7eab6b98a748
                                                      • Opcode Fuzzy Hash: 3c437207a1b10f0935e244055e9bd5f62f53aab494ab7e26113d847b0419dd99
                                                      • Instruction Fuzzy Hash: 4911C436244208BBDB205F61DC05FAB77A9EB88759F114219FA55A6090D271D891DB14
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00C101AA,?), ref: 00C4C4AF
                                                      • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00C4C4C1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                      • API String ID: 2574300362-1816364905
                                                      • Opcode ID: a5bcea4faa8cdd6965e6b1b6a0b89f357b6979a1f107de9cd39c26d2edf8aede
                                                      • Instruction ID: f8ab334baf1d797594254c28918d3a1999b421af3d084099d77278b780d3cde8
                                                      • Opcode Fuzzy Hash: a5bcea4faa8cdd6965e6b1b6a0b89f357b6979a1f107de9cd39c26d2edf8aede
                                                      • Instruction Fuzzy Hash: 87E0C276501B028FE7305B26C998B6B76D4BF14755B109839E89AE22B0D7B0C840C710
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00BE4AF7,?), ref: 00BE4BB8
                                                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00BE4BCA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                      • API String ID: 2574300362-1355242751
                                                      • Opcode ID: 5b4e325faf815f00da8ab7bae0ac5624fdb5602a1d16ff043156e54f419a4a18
                                                      • Instruction ID: b3f54ab1302cac0bd705a98de709016f4f1d9b8836d0883482d9c3472cf80faf
                                                      • Opcode Fuzzy Hash: 5b4e325faf815f00da8ab7bae0ac5624fdb5602a1d16ff043156e54f419a4a18
                                                      • Instruction Fuzzy Hash: F0D01771510B128FD7309F32D849B0B76E5AF05351F259CBAD486E2955EBB0D890CA10
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00BE4B44,?,00BE49D4,?,?,00BE27AF,?,00000001), ref: 00BE4B85
                                                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00BE4B97
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                      • API String ID: 2574300362-3689287502
                                                      • Opcode ID: 4a2cbc76ff1c8aa37932dbddcc68b975f73a0d080fbafc31ca42e18e283dbd08
                                                      • Instruction ID: 8502f32ae376adb60a314f1686026822df756512e13c532ea04341861f5ff0f4
                                                      • Opcode Fuzzy Hash: 4a2cbc76ff1c8aa37932dbddcc68b975f73a0d080fbafc31ca42e18e283dbd08
                                                      • Instruction Fuzzy Hash: ECD01771910B128FD7309F32D859B0F76E4AF05755F25CC7AD886E2150EBB0E880CA14
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(advapi32.dll,?,00C5145E), ref: 00C5121D
                                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00C5122F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                      • API String ID: 2574300362-4033151799
                                                      • Opcode ID: b0b1ef6b4297ec6351a2887f9450562030e90004fcc21b43f19d1611687dd579
                                                      • Instruction ID: 0a53c751f9e5c21847cc651ab0af49a2aaadcf40bacb6f2e1dfe0074e321e544
                                                      • Opcode Fuzzy Hash: b0b1ef6b4297ec6351a2887f9450562030e90004fcc21b43f19d1611687dd579
                                                      • Instruction Fuzzy Hash: BBD0C230440B128FD3209F31CC0830B76D4AF21342F14893AD891E6550D6B0C4C0C700
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00BE5E3D), ref: 00BE55FE
                                                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00BE5610
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: GetNativeSystemInfo$kernel32.dll
                                                      • API String ID: 2574300362-192647395
                                                      • Opcode ID: 188c4495acdde8ce1cf6a00274081d82936f6550a05d862943470e160f1bb0a1
                                                      • Instruction ID: 82f62a25a9104dde4f4b5d4f7f2dfefe6f67d3527abcaa8136e3146209a92076
                                                      • Opcode Fuzzy Hash: 188c4495acdde8ce1cf6a00274081d82936f6550a05d862943470e160f1bb0a1
                                                      • Instruction Fuzzy Hash: A3D01775920B128FE7309F32C94971B76E5AF05359B258C7AD48AE2191E7B0C880CA50
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00C491A6,?,00C60980), ref: 00C495A0
                                                      • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00C495B2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: GetModuleHandleExW$kernel32.dll
                                                      • API String ID: 2574300362-199464113
                                                      • Opcode ID: f51bafe437dafb2211271f662f87e7c46b2b6fd7fbe14a23410da2619416b093
                                                      • Instruction ID: 54a20239dcb7f3851d6d49c26f0416fe44602b7a1a907a9a0f144c2dc5e69def
                                                      • Opcode Fuzzy Hash: f51bafe437dafb2211271f662f87e7c46b2b6fd7fbe14a23410da2619416b093
                                                      • Instruction Fuzzy Hash: A5D01771510B228FD7319F76D859B4BBAE4EF06356B258C3AD896E2190E6F0CA80CA10
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 1a6d04f0ad78de79aca979cbf6d6b59a8e2000a27fae13a2305973877b247260
                                                      • Instruction ID: 1e0f6bd8a29d51df78b9026726e36fae85718239aa0251060a9b2b77fab61672
                                                      • Opcode Fuzzy Hash: 1a6d04f0ad78de79aca979cbf6d6b59a8e2000a27fae13a2305973877b247260
                                                      • Instruction Fuzzy Hash: 33C17275A04226EFCB14CFA4D8C4EAEBBB5FF48710B114698E815EB651D730EE81DB90
                                                      APIs
                                                      • CharLowerBuffW.USER32(?,?), ref: 00C4E56F
                                                      • CharLowerBuffW.USER32(?,?), ref: 00C4E5B2
                                                        • Part of subcall function 00C4DC56: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00C4DC76
                                                      • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00C4E7B2
                                                      • _memmove.LIBCMT ref: 00C4E7C5
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: BuffCharLower$AllocVirtual_memmove
                                                      • String ID:
                                                      • API String ID: 3659485706-0
                                                      • Opcode ID: 50e41b2d7c9615b6738dbde531b5ba96c6a550f1c70362197aa1be569fbe5d12
                                                      • Instruction ID: 5b03a2113858c10cf44cd89a5c19c74221679643d920c5d189c37437f069834f
                                                      • Opcode Fuzzy Hash: 50e41b2d7c9615b6738dbde531b5ba96c6a550f1c70362197aa1be569fbe5d12
                                                      • Instruction Fuzzy Hash: 72C15A71A083119FC714DF28C48096ABBE5FF88718F1589AEF899DB351D731EA45CB82
                                                      APIs
                                                      • CoInitialize.OLE32(00000000), ref: 00C48575
                                                      • CoUninitialize.OLE32 ref: 00C48580
                                                        • Part of subcall function 00C5DC66: CoCreateInstance.OLE32(00000018,00000000,00000005,00000028,?,?,?,?,?,00000000,00000000,00000000,?,00C487D6,?,00000000), ref: 00C5DCCE
                                                      • VariantInit.OLEAUT32(?), ref: 00C4858B
                                                      • VariantClear.OLEAUT32(?), ref: 00C4885C
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                      • String ID:
                                                      • API String ID: 780911581-0
                                                      • Opcode ID: e337b43344bb079061b2be06a3090e1743232fe0515ce03820942d26d0b32c22
                                                      • Instruction ID: 50f372b28f857176c3f1ff52d9fbbe0838fafe048be5787b2926aff103d4dbcc
                                                      • Opcode Fuzzy Hash: e337b43344bb079061b2be06a3090e1743232fe0515ce03820942d26d0b32c22
                                                      • Instruction Fuzzy Hash: 23A15875604B019FCB10EF15C485B2EB7E5BF88354F148899F9999B3A2DB30ED44CB92
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Variant$AllocClearCopyInitString
                                                      • String ID:
                                                      • API String ID: 2808897238-0
                                                      • Opcode ID: 43960032a954a50fadac4d4b31950aa66b6006b5956bd2e395b34036614676a9
                                                      • Instruction ID: f0df25a3e21478a59b5693d845b759f5939eb9c25efd9c956a711602a0731f2c
                                                      • Opcode Fuzzy Hash: 43960032a954a50fadac4d4b31950aa66b6006b5956bd2e395b34036614676a9
                                                      • Instruction Fuzzy Hash: 3151E4306087169ACB30BF66E8D1A2DF7E9EF54310F208A1FE556DBAA1DB7098409B51
                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00C4F2EE
                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 00C4F2FC
                                                        • Part of subcall function 00BE1A36: _memmove.LIBCMT ref: 00BE1A77
                                                      • Process32NextW.KERNEL32(00000000,?), ref: 00C4F3BC
                                                      • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00C4F3CB
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                      • String ID:
                                                      • API String ID: 2576544623-0
                                                      • Opcode ID: d0df0f41b21437a258bb6a3ee54748870b38e93951de7fade830628f848ce14f
                                                      • Instruction ID: 16cf277f17b14d3a736ebe189d8c9e841b13e0e86d00f3a4f2df526b5f4e6b7c
                                                      • Opcode Fuzzy Hash: d0df0f41b21437a258bb6a3ee54748870b38e93951de7fade830628f848ce14f
                                                      • Instruction Fuzzy Hash: BD518B71504701AFD310EF25D886E6FB7E8FF94700F10496EF595972A1EB70AA09CB92
                                                      APIs
                                                      • GetWindowRect.USER32(?,?), ref: 00C59C50
                                                      • ScreenToClient.USER32(00000002,00000002), ref: 00C59C83
                                                      • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00C59CF0
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Window$ClientMoveRectScreen
                                                      • String ID:
                                                      • API String ID: 3880355969-0
                                                      • Opcode ID: c5206ee08954c2cf91159efe79b6872ded602ec338c97409a2316deeea2a55c3
                                                      • Instruction ID: 2f1dbe3990ea4cd8ac9e5a5ce3cac1dc22a070beb87fd61d1dcb9550a162caf1
                                                      • Opcode Fuzzy Hash: c5206ee08954c2cf91159efe79b6872ded602ec338c97409a2316deeea2a55c3
                                                      • Instruction Fuzzy Hash: 99514F34A00109EFCF24DF64C884AAE7BF6FB45361F248199FC25972A1D770AE85CB54
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                      • String ID:
                                                      • API String ID: 2782032738-0
                                                      • Opcode ID: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                                      • Instruction ID: 93d7177c483d986ceca61e5705e090016eb4c439214e68a1359f366dad415906
                                                      • Opcode Fuzzy Hash: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                                      • Instruction Fuzzy Hash: 5341B171B0064E9FDB288EA9C88097F77E6EF85360B24C5BDEA55C7640DBB0DD498B40
                                                      APIs
                                                      • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00C2A46D
                                                      • __itow.LIBCMT ref: 00C2A49E
                                                        • Part of subcall function 00C2A6EE: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00C2A759
                                                      • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00C2A507
                                                      • __itow.LIBCMT ref: 00C2A55E
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$__itow
                                                      • String ID:
                                                      • API String ID: 3379773720-0
                                                      • Opcode ID: 0fd4715b819f9bce04d214e5f2edfb915284036349517f10e20d11068d9306ad
                                                      • Instruction ID: 19c67ad5f02107c301a3f4c7ef641059094f86e93e801460374cdb91812e6d48
                                                      • Opcode Fuzzy Hash: 0fd4715b819f9bce04d214e5f2edfb915284036349517f10e20d11068d9306ad
                                                      • Instruction Fuzzy Hash: 25419E70A00258ABDF21EF59DC45BFE7BF9EF44750F100469F915A3291DBB09A44CBA2
                                                      APIs
                                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 00C46E81
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00C46E91
                                                        • Part of subcall function 00BD4D37: __itow.LIBCMT ref: 00BD4D62
                                                        • Part of subcall function 00BD4D37: __swprintf.LIBCMT ref: 00BD4DAC
                                                      • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00C46EF5
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00C46F01
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$__itow__swprintfsocket
                                                      • String ID:
                                                      • API String ID: 2214342067-0
                                                      • Opcode ID: 6f6feeef625e7c2433a81082285de3e96dbdab36b197e30224b92d6379c81afc
                                                      • Instruction ID: a1a164c4354f268374736063cdcbaa6b342636c038a87587754d0c19769f020b
                                                      • Opcode Fuzzy Hash: 6f6feeef625e7c2433a81082285de3e96dbdab36b197e30224b92d6379c81afc
                                                      • Instruction Fuzzy Hash: 3941B475740600AFEB20AF64DC8AF6AB7E5EB04714F14849DFA599B3D2E7709D008B91
                                                      APIs
                                                      • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00C60980), ref: 00C46957
                                                      • _strlen.LIBCMT ref: 00C46989
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _strlen
                                                      • String ID:
                                                      • API String ID: 4218353326-0
                                                      • Opcode ID: 1e9eae39fe4ff6c7dcbc38e47a5b90b00ede0e3271840ad3e022fcd3b9efda7e
                                                      • Instruction ID: d7a7d5d18e0a75455f99a051b4e49af8c09e65fa775e1632765009b30a18951e
                                                      • Opcode Fuzzy Hash: 1e9eae39fe4ff6c7dcbc38e47a5b90b00ede0e3271840ad3e022fcd3b9efda7e
                                                      • Instruction Fuzzy Hash: C2419531600108AFCB14FBA5DC95EBEB3E9BF55310F248195F91697292EB70AD04D791
                                                      APIs
                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00C3BD4E
                                                      • GetLastError.KERNEL32(?,00000000), ref: 00C3BD74
                                                      • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00C3BD99
                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00C3BDC5
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CreateHardLink$DeleteErrorFileLast
                                                      • String ID:
                                                      • API String ID: 3321077145-0
                                                      • Opcode ID: 71dec1fc8d06a93de80664fd13a533e43c97102b5056e332b8383a1aded07921
                                                      • Instruction ID: 787f06507745898e0aa09a690cbe90f45bc7005e1242335444adeebaafc12dd7
                                                      • Opcode Fuzzy Hash: 71dec1fc8d06a93de80664fd13a533e43c97102b5056e332b8383a1aded07921
                                                      • Instruction Fuzzy Hash: 32411839200A14DFCB11EF15C485A5EBBE2AF49310F19C4D9E95AAB362DB70FD01DB91
                                                      APIs
                                                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00C58CCB
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: InvalidateRect
                                                      • String ID:
                                                      • API String ID: 634782764-0
                                                      • Opcode ID: cd1961cff92001367222289e6ac4cc6c92d880cd9cef21371f99c4d9fed81189
                                                      • Instruction ID: 46d0ae5e46d71c2506f35a20cd5f51fee28dfa3bd0398b9b9134db1c5ec2c3f4
                                                      • Opcode Fuzzy Hash: cd1961cff92001367222289e6ac4cc6c92d880cd9cef21371f99c4d9fed81189
                                                      • Instruction Fuzzy Hash: B331A23C601109AEEF249A19CC85BAD77A4EB15312F244512FD21F62E1CA70AADC9659
                                                      APIs
                                                      • ClientToScreen.USER32(?,?), ref: 00C5AF4D
                                                      • GetWindowRect.USER32(?,?), ref: 00C5AFC3
                                                      • PtInRect.USER32(?,?,00C5C437), ref: 00C5AFD3
                                                      • MessageBeep.USER32(00000000), ref: 00C5B044
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Rect$BeepClientMessageScreenWindow
                                                      • String ID:
                                                      • API String ID: 1352109105-0
                                                      • Opcode ID: 9c59d75c7747e1854b7e8cb251d5b31a2680c98a94aacd93e588fd01b54171c5
                                                      • Instruction ID: 5809fe457d24ff2ca5b2e9adcfe4f27443293645e042d6635ff1617666955c0e
                                                      • Opcode Fuzzy Hash: 9c59d75c7747e1854b7e8cb251d5b31a2680c98a94aacd93e588fd01b54171c5
                                                      • Instruction Fuzzy Hash: 2841C0B8600109DFCB21CF49C884B6EBBF1FF88311F1481A9E8249B291C731EE89DB54
                                                      APIs
                                                      • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00C31192
                                                      • SetKeyboardState.USER32(00000080,?,00000001), ref: 00C311AE
                                                      • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00C31214
                                                      • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00C31266
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: KeyboardState$InputMessagePostSend
                                                      • String ID:
                                                      • API String ID: 432972143-0
                                                      • Opcode ID: 9d2451ed0607607b31a377dd9dc67c51555f1cabee3ce521f3e42cc80f145455
                                                      • Instruction ID: 1541434b632039ce22d81c0970ff2d82ac2770f17d69fde98c3b43a746f6968f
                                                      • Opcode Fuzzy Hash: 9d2451ed0607607b31a377dd9dc67c51555f1cabee3ce521f3e42cc80f145455
                                                      • Instruction Fuzzy Hash: A8314830AA02486EFF30CA268C05BFF7B69AB45320F1C431AFDA1D21D1C3758A519BA5
                                                      APIs
                                                      • GetKeyboardState.USER32(?,75A4C0D0,?,00008000), ref: 00C312D1
                                                      • SetKeyboardState.USER32(00000080,?,00008000), ref: 00C312ED
                                                      • PostMessageW.USER32(00000000,00000101,00000000), ref: 00C3134C
                                                      • SendInput.USER32(00000001,?,0000001C,75A4C0D0,?,00008000), ref: 00C3139E
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: KeyboardState$InputMessagePostSend
                                                      • String ID:
                                                      • API String ID: 432972143-0
                                                      • Opcode ID: 0e6b638a1170dc61509ed1c77facd6b2098863e849603ad3d6e2ea19b827a792
                                                      • Instruction ID: 1f1b36359d0e114c81d001b51d9b4ec8c091753d848b6db23bcc2733bb167dcd
                                                      • Opcode Fuzzy Hash: 0e6b638a1170dc61509ed1c77facd6b2098863e849603ad3d6e2ea19b827a792
                                                      • Instruction Fuzzy Hash: 46318930E606489EFF348A2A8C047FEBBA9AF44320F1C421AFCA0525F0C3748A559B95
                                                      APIs
                                                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00C0635B
                                                      • __isleadbyte_l.LIBCMT ref: 00C06389
                                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00C063B7
                                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00C063ED
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                      • String ID:
                                                      • API String ID: 3058430110-0
                                                      • Opcode ID: f3a3e5865fca411a77b76e9e02aa593aeb069c0fb6b369de4d76ed45ad8761a5
                                                      • Instruction ID: 7857e5d7d4d98e030b6cece5061b35dbed3df910e96262ec6f568c643b5a410a
                                                      • Opcode Fuzzy Hash: f3a3e5865fca411a77b76e9e02aa593aeb069c0fb6b369de4d76ed45ad8761a5
                                                      • Instruction Fuzzy Hash: EF31903160025AAFDB218F65C844BBE7BF9FF41310F154169F8649B1E1D731EAA1DB90
                                                      APIs
                                                      • GetForegroundWindow.USER32 ref: 00C55307
                                                        • Part of subcall function 00C339A1: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00C339BB
                                                        • Part of subcall function 00C339A1: GetCurrentThreadId.KERNEL32 ref: 00C339C2
                                                        • Part of subcall function 00C339A1: AttachThreadInput.USER32(00000000,?,00C3542D), ref: 00C339C9
                                                      • GetCaretPos.USER32(?), ref: 00C55318
                                                      • ClientToScreen.USER32(00000000,?), ref: 00C55353
                                                      • GetForegroundWindow.USER32 ref: 00C55359
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                      • String ID:
                                                      • API String ID: 2759813231-0
                                                      • Opcode ID: 6281c2007dadac718d59bccccfa14d13b1a7c7b20a91a3bb9c34764b659c8868
                                                      • Instruction ID: e8c98a4c123bc3cac46703bdb383b92d4fa2832a7ad1b78354112342b303e858
                                                      • Opcode Fuzzy Hash: 6281c2007dadac718d59bccccfa14d13b1a7c7b20a91a3bb9c34764b659c8868
                                                      • Instruction Fuzzy Hash: F9313075D00108AFDB10EFA5D885AEFF7F9EF98304F10416AE415E7241EB71AE458BA1
                                                      APIs
                                                        • Part of subcall function 00BD29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BD29F3
                                                      • GetCursorPos.USER32(?), ref: 00C5C8F5
                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00C0BC1C,?,?,?,?,?), ref: 00C5C90A
                                                      • GetCursorPos.USER32(?), ref: 00C5C957
                                                      • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00C0BC1C,?,?,?), ref: 00C5C991
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                      • String ID:
                                                      • API String ID: 2864067406-0
                                                      • Opcode ID: 6c51b652d105f2e499f03941f577d67e2d7993eaf498fad54886c3095893f5e1
                                                      • Instruction ID: 4eaf70a2e66f62b8f6910a39e676aad49d7e152ab8dc0f93351a96baf5517b3a
                                                      • Opcode Fuzzy Hash: 6c51b652d105f2e499f03941f577d67e2d7993eaf498fad54886c3095893f5e1
                                                      • Instruction Fuzzy Hash: 1031F239600218AFCB218F55D898FEE7BF5EB0A311F00416AFD05872A1C3315EA0DFA4
                                                      APIs
                                                      • __setmode.LIBCMT ref: 00BF0B0D
                                                        • Part of subcall function 00BE402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00C37CBE,?,?,00000000), ref: 00BE4041
                                                        • Part of subcall function 00BE402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00C37CBE,?,?,00000000,?,?), ref: 00BE4065
                                                      • _fprintf.LIBCMT ref: 00BF0B44
                                                      • OutputDebugStringW.KERNEL32(?), ref: 00C2672F
                                                        • Part of subcall function 00BF4BFA: _flsall.LIBCMT ref: 00BF4C13
                                                      • __setmode.LIBCMT ref: 00BF0B79
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                      • String ID:
                                                      • API String ID: 521402451-0
                                                      • Opcode ID: d5305c4d92ddfd485968656708ef5bc04a263d1e87ae7d79acc5d7db8f259ac9
                                                      • Instruction ID: 9e430c9330f977856a4ee93edf06ac845a9297334c5fb92c4b7049c55db060d8
                                                      • Opcode Fuzzy Hash: d5305c4d92ddfd485968656708ef5bc04a263d1e87ae7d79acc5d7db8f259ac9
                                                      • Instruction Fuzzy Hash: 871105315046087ADA14B7A8AC46EBEB7E89F41320F1441E6F30497293EF70594A87A4
                                                      APIs
                                                        • Part of subcall function 00C28B0B: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00C28B22
                                                        • Part of subcall function 00C28B0B: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00C28B2C
                                                        • Part of subcall function 00C28B0B: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00C28B3B
                                                        • Part of subcall function 00C28B0B: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00C28B42
                                                        • Part of subcall function 00C28B0B: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00C28B58
                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00C290A4
                                                      • _memcmp.LIBCMT ref: 00C290C7
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C290FD
                                                      • HeapFree.KERNEL32(00000000), ref: 00C29104
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                      • String ID:
                                                      • API String ID: 1592001646-0
                                                      • Opcode ID: 5009c34e74e724565b07f2f19071f69c84c2f880df693b9e2339745a1546e9c3
                                                      • Instruction ID: 9c7eae9fb270815c875b96d4afb79bdc5d0cd6f2a5ced6740ed1d5d2ed53d7be
                                                      • Opcode Fuzzy Hash: 5009c34e74e724565b07f2f19071f69c84c2f880df693b9e2339745a1546e9c3
                                                      • Instruction Fuzzy Hash: 8E21BD32E0011DEFDB10CFA9DA84BEEB7B8EF48301F144099E815A7241EB71AB05CB60
                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000EC), ref: 00C56185
                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00C5619F
                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00C561AD
                                                      • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00C561BB
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$AttributesLayered
                                                      • String ID:
                                                      • API String ID: 2169480361-0
                                                      • Opcode ID: 6d3706e565e63e230609423767e545dfbce22a2856f9d95411f443ca5a093c5c
                                                      • Instruction ID: 0601849c29621c8c4b22c92274bf1895eaf177d55060cd5294323b0fda7767b6
                                                      • Opcode Fuzzy Hash: 6d3706e565e63e230609423767e545dfbce22a2856f9d95411f443ca5a093c5c
                                                      • Instruction Fuzzy Hash: CD110039300914AFEB15AB14DC05FBFB7A9EF85320F144159F826DB2D2CBA0AD448B98
                                                      APIs
                                                        • Part of subcall function 00C2F63B: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00C2E252,?,?,?,00C2F045,00000000,000000EF,00000119,?,?), ref: 00C2F64A
                                                        • Part of subcall function 00C2F63B: lstrcpyW.KERNEL32(00000000,?,?,00C2E252,?,?,?,00C2F045,00000000,000000EF,00000119,?,?,00000000), ref: 00C2F670
                                                        • Part of subcall function 00C2F63B: lstrcmpiW.KERNEL32(00000000,?,00C2E252,?,?,?,00C2F045,00000000,000000EF,00000119,?,?), ref: 00C2F6A1
                                                      • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00C2F045,00000000,000000EF,00000119,?,?,00000000), ref: 00C2E26B
                                                      • lstrcpyW.KERNEL32(00000000,?,?,00C2F045,00000000,000000EF,00000119,?,?,00000000), ref: 00C2E291
                                                      • lstrcmpiW.KERNEL32(00000002,cdecl,?,00C2F045,00000000,000000EF,00000119,?,?,00000000), ref: 00C2E2C5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: lstrcmpilstrcpylstrlen
                                                      • String ID: cdecl
                                                      • API String ID: 4031866154-3896280584
                                                      • Opcode ID: b9fa80a31c09e88493ab61bba56621227e6766bc37561de6fe88b0d732d62e3e
                                                      • Instruction ID: d7f79d1a07bdb10422283d102f89b70c3b1373b1b4a267b18fa6d25e7dbd43ca
                                                      • Opcode Fuzzy Hash: b9fa80a31c09e88493ab61bba56621227e6766bc37561de6fe88b0d732d62e3e
                                                      • Instruction Fuzzy Hash: 7B11D036200315EFDB25AF24E845E7A77A8FF45310B40403AF906CB6A0EBB1A941C7A0
                                                      APIs
                                                      • _free.LIBCMT ref: 00C05261
                                                        • Part of subcall function 00BF586C: __FF_MSGBANNER.LIBCMT ref: 00BF5883
                                                        • Part of subcall function 00BF586C: __NMSG_WRITE.LIBCMT ref: 00BF588A
                                                        • Part of subcall function 00BF586C: RtlAllocateHeap.NTDLL(01140000,00000000,00000001,?,00000004,?,?,00BF0F33,?), ref: 00BF58AF
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap_free
                                                      • String ID:
                                                      • API String ID: 614378929-0
                                                      • Opcode ID: 7d0950c81ece9b57eb80d4e9a49c1723026920004f15eb313ff98614ee83bce0
                                                      • Instruction ID: 6bfe038880f16468858bab96a1029f6d5ee3b65c78446513d81da75cbe264f70
                                                      • Opcode Fuzzy Hash: 7d0950c81ece9b57eb80d4e9a49c1723026920004f15eb313ff98614ee83bce0
                                                      • Instruction Fuzzy Hash: D011A332906A1AABDB302F75AC0576F3BD8EF11361B244566FA159B1D1DF308A40CFA4
                                                      APIs
                                                      • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00C341F2
                                                      • _memset.LIBCMT ref: 00C34213
                                                      • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00C34265
                                                      • CloseHandle.KERNEL32(00000000), ref: 00C3426E
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CloseControlCreateDeviceFileHandle_memset
                                                      • String ID:
                                                      • API String ID: 1157408455-0
                                                      • Opcode ID: 451a80f47d4d04752c7ea513658f462e815ae658b51886b759783b94b2f0e88b
                                                      • Instruction ID: fb521f7fad92082657f003515a2ac0fdc1131efe507368f2d2e6dd448c2c3547
                                                      • Opcode Fuzzy Hash: 451a80f47d4d04752c7ea513658f462e815ae658b51886b759783b94b2f0e88b
                                                      • Instruction Fuzzy Hash: 9111E7719012287AD7309BA5AC4DFAFBB7CEF45720F10429AF908E7190D2B45F808BA4
                                                      APIs
                                                        • Part of subcall function 00BE402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00C37CBE,?,?,00000000), ref: 00BE4041
                                                        • Part of subcall function 00BE402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00C37CBE,?,?,00000000,?,?), ref: 00BE4065
                                                      • gethostbyname.WSOCK32(?,?,?), ref: 00C46849
                                                      • WSAGetLastError.WSOCK32(00000000), ref: 00C46854
                                                      • _memmove.LIBCMT ref: 00C46881
                                                      • inet_ntoa.WSOCK32(?), ref: 00C4688C
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                      • String ID:
                                                      • API String ID: 1504782959-0
                                                      • Opcode ID: 8ed99334d8780a974a126e9f9ff7bd818d914b73b238bae9ccad79e57f560d4c
                                                      • Instruction ID: 7855caabe1a5a04a8f1c105853fff4ef99739e34ca4e897821977687639e7ebd
                                                      • Opcode Fuzzy Hash: 8ed99334d8780a974a126e9f9ff7bd818d914b73b238bae9ccad79e57f560d4c
                                                      • Instruction Fuzzy Hash: 801151719001099FCB10FFA5DD46DAEB7F9EF08310B1444A5F506A72A2DF30AE04DB61
                                                      APIs
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00C294FC
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00C2950E
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00C29524
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00C2953F
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: 748f8030a45b7793598048653edce2f4014c94874722f279e771f435dd3d6d88
                                                      • Instruction ID: e6eb9f92373cf5f63e4167c8f5036b169f8d4de7406384cc35072d64d8e5131d
                                                      • Opcode Fuzzy Hash: 748f8030a45b7793598048653edce2f4014c94874722f279e771f435dd3d6d88
                                                      • Instruction Fuzzy Hash: 1D115E79A00218FFDB11DF95CC84F9DBB74FB48310F2041A5EA00B7250D671AE10DB90
                                                      APIs
                                                        • Part of subcall function 00BD29E2: GetWindowLongW.USER32(?,000000EB), ref: 00BD29F3
                                                      • DefDlgProcW.USER32(?,00000020,?), ref: 00BD16B4
                                                      • GetClientRect.USER32(?,?), ref: 00C0B86C
                                                      • GetCursorPos.USER32(?), ref: 00C0B876
                                                      • ScreenToClient.USER32(?,?), ref: 00C0B881
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Client$CursorLongProcRectScreenWindow
                                                      • String ID:
                                                      • API String ID: 4127811313-0
                                                      • Opcode ID: 809a41f0a3d08163216d4100e50da30c4d7af7c50f91fd1ccbfccd7effc9ab6c
                                                      • Instruction ID: c6b06e58b820554ae8bcb4ee1a1abff09d55130ba0b7da456a08e2b9294b365d
                                                      • Opcode Fuzzy Hash: 809a41f0a3d08163216d4100e50da30c4d7af7c50f91fd1ccbfccd7effc9ab6c
                                                      • Instruction Fuzzy Hash: 86112879A00119BBCB10EF99D895ABEB7B9FB04301F140896F911E7290D770FA51CBA5
                                                      APIs
                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00BD214F
                                                      • GetStockObject.GDI32(00000011), ref: 00BD2163
                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00BD216D
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CreateMessageObjectSendStockWindow
                                                      • String ID:
                                                      • API String ID: 3970641297-0
                                                      • Opcode ID: ab40697779d5de0db8c8847056b804fd1cbc5edcc160e279c88704f57ff2120e
                                                      • Instruction ID: 7913726512bbedad385cabad99832334dfed11e854d03c93cb89b69a6b9a4e51
                                                      • Opcode Fuzzy Hash: ab40697779d5de0db8c8847056b804fd1cbc5edcc160e279c88704f57ff2120e
                                                      • Instruction Fuzzy Hash: 7C118B72501289BFDB128F90DC84FEBBBA9EF68354F144152FB0462260D771DC60ABA0
                                                      APIs
                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00C30358,?,00C313AB,?,00008000), ref: 00C317CA
                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00C30358,?,00C313AB,?,00008000), ref: 00C317EF
                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00C30358,?,00C313AB,?,00008000), ref: 00C317F9
                                                      • Sleep.KERNEL32(?,?,?,?,?,?,?,00C30358,?,00C313AB,?,00008000), ref: 00C3182C
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CounterPerformanceQuerySleep
                                                      • String ID:
                                                      • API String ID: 2875609808-0
                                                      • Opcode ID: 51cacd13f390b43ce421ef9964860455436bbf6633648c3932c9b884ca9f139e
                                                      • Instruction ID: fb404c68c5d882ebfe208a2efc43b2c5fb6c26ea191e99fbe8012934eb784e77
                                                      • Opcode Fuzzy Hash: 51cacd13f390b43ce421ef9964860455436bbf6633648c3932c9b884ca9f139e
                                                      • Instruction Fuzzy Hash: 7D113C31D1161CDBCF10AFA5D988BEEBBB8FF09711F594456ED41B2180CB3056A1CB96
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                      • String ID:
                                                      • API String ID: 3016257755-0
                                                      • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                      • Instruction ID: 9c1f810d5551df713c4b2ace13d0b8e9dbbc2272e8b84314f4022ff993e32cb8
                                                      • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                      • Instruction Fuzzy Hash: 2301423284414EBBCF1A5E84CC058EE3F26BB19351B548615FA28591B1D336DA72FB81
                                                      APIs
                                                      • GetWindowRect.USER32(?,?), ref: 00C5B6D1
                                                      • ScreenToClient.USER32(?,?), ref: 00C5B6E9
                                                      • ScreenToClient.USER32(?,?), ref: 00C5B70D
                                                      • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00C5B728
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ClientRectScreen$InvalidateWindow
                                                      • String ID:
                                                      • API String ID: 357397906-0
                                                      • Opcode ID: d3a3ae3f7dfc6716b73e0744327eaa1a38b6959dac4c784ca7bdcad98aed27bb
                                                      • Instruction ID: b14277c5935c57436be9f625ef244fe8efaf245bc0e7add2a1635d68fc187468
                                                      • Opcode Fuzzy Hash: d3a3ae3f7dfc6716b73e0744327eaa1a38b6959dac4c784ca7bdcad98aed27bb
                                                      • Instruction Fuzzy Hash: AD1143B9D00209EFDB51CF99C884AEEFBF9FB48311F104156E914E3610D775AA658F50
                                                      APIs
                                                      • _memset.LIBCMT ref: 00C5BA31
                                                      • _memset.LIBCMT ref: 00C5BA40
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00C97F20,00C97F64), ref: 00C5BA6F
                                                      • CloseHandle.KERNEL32 ref: 00C5BA81
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: _memset$CloseCreateHandleProcess
                                                      • String ID:
                                                      • API String ID: 3277943733-0
                                                      • Opcode ID: 38521aeb3a7262b39a20ccc5c0e34fca2c55e599ab11b6607d6014c1147013fc
                                                      • Instruction ID: b442dc4f6c3a65ba2e82044faa57a5f1ea568e10492a8d6ff96817147c10dc14
                                                      • Opcode Fuzzy Hash: 38521aeb3a7262b39a20ccc5c0e34fca2c55e599ab11b6607d6014c1147013fc
                                                      • Instruction Fuzzy Hash: AEF082F25653487BEB1067A1AC4DFBF3A5CEB09751F000161FB08F62A1D7B19C1087A8
                                                      APIs
                                                      • EnterCriticalSection.KERNEL32(?), ref: 00C3700E
                                                        • Part of subcall function 00C37AEC: _memset.LIBCMT ref: 00C37B21
                                                      • _memmove.LIBCMT ref: 00C37031
                                                      • _memset.LIBCMT ref: 00C3703E
                                                      • LeaveCriticalSection.KERNEL32(?), ref: 00C3704E
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection_memset$EnterLeave_memmove
                                                      • String ID:
                                                      • API String ID: 48991266-0
                                                      • Opcode ID: 5f0d803fe1d8370151fa956d9c530e8597584815e969b8431657d38c8e0551c4
                                                      • Instruction ID: c4371021b89bef0257eee151442d4bd93eec47b5f23929e035b3b3c0fdae0a4a
                                                      • Opcode Fuzzy Hash: 5f0d803fe1d8370151fa956d9c530e8597584815e969b8431657d38c8e0551c4
                                                      • Instruction Fuzzy Hash: D8F03076100104ABCF116F55DC85E5ABB69EF45360F0880A5FE085F227C771A915DBB4
                                                      APIs
                                                        • Part of subcall function 00BD16CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00BD1729
                                                        • Part of subcall function 00BD16CF: SelectObject.GDI32(?,00000000), ref: 00BD1738
                                                        • Part of subcall function 00BD16CF: BeginPath.GDI32(?), ref: 00BD174F
                                                        • Part of subcall function 00BD16CF: SelectObject.GDI32(?,00000000), ref: 00BD1778
                                                      • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00C5C163
                                                      • LineTo.GDI32(00000000,?,?), ref: 00C5C170
                                                      • EndPath.GDI32(00000000), ref: 00C5C180
                                                      • StrokePath.GDI32(00000000), ref: 00C5C18E
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                      • String ID:
                                                      • API String ID: 1539411459-0
                                                      • Opcode ID: 5ee956a4f49c4c53e7ebee17b025365c04c893d0654b2366555aa6c1288a3f45
                                                      • Instruction ID: 0682eca2c5605083efaee0e24b80528d66ab9fd45fe0f6d30cc82ca4c8c5b3fa
                                                      • Opcode Fuzzy Hash: 5ee956a4f49c4c53e7ebee17b025365c04c893d0654b2366555aa6c1288a3f45
                                                      • Instruction Fuzzy Hash: FDF0BE31001219BADB222F56AC0DFCF3F99AF06311F144000FA10310E187B54655DBA9
                                                      APIs
                                                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00C2A852
                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00C2A865
                                                      • GetCurrentThreadId.KERNEL32 ref: 00C2A86C
                                                      • AttachThreadInput.USER32(00000000), ref: 00C2A873
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                      • String ID:
                                                      • API String ID: 2710830443-0
                                                      • Opcode ID: afa32624aa3bfc0946cfda4296dc3669a92b67d7cb14c6bec53be5d954cbf3e3
                                                      • Instruction ID: 3b0b74a5109fb470e32299242fef69ce2e8b82ae357715b8b0b7712ffab06645
                                                      • Opcode Fuzzy Hash: afa32624aa3bfc0946cfda4296dc3669a92b67d7cb14c6bec53be5d954cbf3e3
                                                      • Instruction Fuzzy Hash: 1DE0C931545228BBEB215BA3EC0DFEB7F5CEF167A1F108025F909A54A0C6B1CA51CBA1
                                                      APIs
                                                      • GetSysColor.USER32(00000008), ref: 00BD260D
                                                      • SetTextColor.GDI32(?,000000FF), ref: 00BD2617
                                                      • SetBkMode.GDI32(?,00000001), ref: 00BD262C
                                                      • GetStockObject.GDI32(00000005), ref: 00BD2634
                                                      • GetWindowDC.USER32(?,00000000), ref: 00C0C0F4
                                                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 00C0C101
                                                      • GetPixel.GDI32(00000000,?,00000000), ref: 00C0C11A
                                                      • GetPixel.GDI32(00000000,00000000,?), ref: 00C0C133
                                                      • GetPixel.GDI32(00000000,?,?), ref: 00C0C153
                                                      • ReleaseDC.USER32(?,00000000), ref: 00C0C15E
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                      • String ID:
                                                      • API String ID: 1946975507-0
                                                      • Opcode ID: 4e6a0bf5ed1c926328a20820b261803581bb5a0501eccca213d8ef6fe0abeeee
                                                      • Instruction ID: 55c2476d722b41cf8f816a1c2fe64f616a86e0273e5cec00d74ed6ce1a6e7b64
                                                      • Opcode Fuzzy Hash: 4e6a0bf5ed1c926328a20820b261803581bb5a0501eccca213d8ef6fe0abeeee
                                                      • Instruction Fuzzy Hash: E9E06531504244ABDB315F65AC497DD3B20EB16336F1483A6FA79580E187B14690DB12
                                                      APIs
                                                      • GetCurrentThread.KERNEL32 ref: 00C2911C
                                                      • OpenThreadToken.ADVAPI32(00000000,?,?,?,00C28CE7), ref: 00C29123
                                                      • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00C28CE7), ref: 00C29130
                                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,00C28CE7), ref: 00C29137
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CurrentOpenProcessThreadToken
                                                      • String ID:
                                                      • API String ID: 3974789173-0
                                                      • Opcode ID: c303c01a4639d12253b81d1392c9e891a80a7cfdd5f6d28d15aa087c139da735
                                                      • Instruction ID: 132a37e7a2b80ae0afa86262b0a9a086ee98232db2cac722674f97a6d4a214c6
                                                      • Opcode Fuzzy Hash: c303c01a4639d12253b81d1392c9e891a80a7cfdd5f6d28d15aa087c139da735
                                                      • Instruction Fuzzy Hash: C9E08632601222ABD7701FB2BE0CB5F3B6CDF54792F204818F246E9050E6B48545CB50
                                                      APIs
                                                      • GetDesktopWindow.USER32 ref: 00C105A9
                                                      • GetDC.USER32(00000000), ref: 00C105B3
                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00C105D3
                                                      • ReleaseDC.USER32(?), ref: 00C105F4
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                      • String ID:
                                                      • API String ID: 2889604237-0
                                                      • Opcode ID: 5c1bb542814a47e348c9576067bfc1a8bd450803f9c0f752f6b58fff4f55da6c
                                                      • Instruction ID: 9d694370d70fbd5d592324238aeb7307725c5aa7b37decc60950556903f50d5e
                                                      • Opcode Fuzzy Hash: 5c1bb542814a47e348c9576067bfc1a8bd450803f9c0f752f6b58fff4f55da6c
                                                      • Instruction Fuzzy Hash: B6E01A75804204EFCB119F62D908B9EBBF6EF8C310F208016FC5AA7350DBB885919F50
                                                      APIs
                                                      • GetDesktopWindow.USER32 ref: 00C105BD
                                                      • GetDC.USER32(00000000), ref: 00C105C7
                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00C105D3
                                                      • ReleaseDC.USER32(?), ref: 00C105F4
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                      • String ID:
                                                      • API String ID: 2889604237-0
                                                      • Opcode ID: ba4b1628607b1113af10affe6402029cebe938f31a6d09ad3d319d668b01acbb
                                                      • Instruction ID: 7818ff1bddbc373cdf787d6cda839264d4b5e357d646c9d3dcf08a006f60c3f7
                                                      • Opcode Fuzzy Hash: ba4b1628607b1113af10affe6402029cebe938f31a6d09ad3d319d668b01acbb
                                                      • Instruction Fuzzy Hash: 1EE01A75804204AFCB219F61D80879EBBF1AF8C310F208015FD59A7350DBB895518F50
                                                      APIs
                                                      • OleSetContainedObject.OLE32(?,00000001), ref: 00C2BE3A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ContainedObject
                                                      • String ID: AutoIt3GUI$Container
                                                      • API String ID: 3565006973-3941886329
                                                      • Opcode ID: 2d0317a4b93be6e554f2e745b40cd984a0d34aeccfe8a3b3d18f0a341925e735
                                                      • Instruction ID: 0919a1882e993dc3c728263ee2fec8d60d36d21a22882fe1acd68f7d1e9a4c01
                                                      • Opcode Fuzzy Hash: 2d0317a4b93be6e554f2e745b40cd984a0d34aeccfe8a3b3d18f0a341925e735
                                                      • Instruction Fuzzy Hash: 00915970600611AFDB64DF24D884AAABBF8FF48710F10856DF95ACBAA1DB70ED45CB50
                                                      APIs
                                                        • Part of subcall function 00BE436A: _wcscpy.LIBCMT ref: 00BE438D
                                                        • Part of subcall function 00BD4D37: __itow.LIBCMT ref: 00BD4D62
                                                        • Part of subcall function 00BD4D37: __swprintf.LIBCMT ref: 00BD4DAC
                                                      • __wcsnicmp.LIBCMT ref: 00C3B4DD
                                                      • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00C3B5A6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                      • String ID: LPT
                                                      • API String ID: 3222508074-1350329615
                                                      • Opcode ID: a2f8435056b7c36c3a3d4befa4f8293d62bef1aac9fe9153873133af235a1c78
                                                      • Instruction ID: c4e4bae61513045b308543ea2a5b5e4e3898b33667e0f08da92323595ad1a6c6
                                                      • Opcode Fuzzy Hash: a2f8435056b7c36c3a3d4befa4f8293d62bef1aac9fe9153873133af235a1c78
                                                      • Instruction Fuzzy Hash: 50618775A10619EFCB18DF54C895EAEB7F5EF08310F1440A9F516AB391D770AE40CB94
                                                      APIs
                                                      • Sleep.KERNEL32(00000000), ref: 00BDE01E
                                                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 00BDE037
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: GlobalMemorySleepStatus
                                                      • String ID: @
                                                      • API String ID: 2783356886-2766056989
                                                      • Opcode ID: 96337cb335c74db53fe6fe9f7cceb952cd622758aef236629ef886aee599fb3c
                                                      • Instruction ID: 9e0ba46c2dbcdd8c7ed28c74148056413a3b27e541abbef1c59317933ad1c209
                                                      • Opcode Fuzzy Hash: 96337cb335c74db53fe6fe9f7cceb952cd622758aef236629ef886aee599fb3c
                                                      • Instruction Fuzzy Hash: DC5149714087449BE320AF54E886BAFF7F8FF88314F41489EF1D851191EB719969CB16
                                                      APIs
                                                      • _memset.LIBCMT ref: 00C42A4E
                                                      • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00C42A84
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CrackInternet_memset
                                                      • String ID: |
                                                      • API String ID: 1413715105-2343686810
                                                      • Opcode ID: 271da8f13eb8e88f0b85e6e21226b48e8aa2667dca47d169d6b5e0cc24269bdc
                                                      • Instruction ID: 23483c47208d7aec49084a5868b801e6e392a8511819025d232935c1f4ac518d
                                                      • Opcode Fuzzy Hash: 271da8f13eb8e88f0b85e6e21226b48e8aa2667dca47d169d6b5e0cc24269bdc
                                                      • Instruction Fuzzy Hash: 18313C71C00119ABCF11EFA5CC86AEEBFB8FF08304F100069FD15A6262EB315A56DB60
                                                      APIs
                                                      • DestroyWindow.USER32(?,?,?,?), ref: 00C56F04
                                                      • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00C56F40
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Window$DestroyMove
                                                      • String ID: static
                                                      • API String ID: 2139405536-2160076837
                                                      • Opcode ID: d61d34a1d6c5b5c4aa03a1b66d493e33d75fc164ce09b36282e984d7abd52936
                                                      • Instruction ID: f90ed79223bb95eb383c843259439599b3a00041b615894a979b68b6ef137fa4
                                                      • Opcode Fuzzy Hash: d61d34a1d6c5b5c4aa03a1b66d493e33d75fc164ce09b36282e984d7abd52936
                                                      • Instruction Fuzzy Hash: 8B31AB75100604AAEB108F64DC81BBB73A9FF88725F50861AFDA593290DB71AC85DB64
                                                      APIs
                                                      • _memset.LIBCMT ref: 00C32F24
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00C32F5F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: InfoItemMenu_memset
                                                      • String ID: 0
                                                      • API String ID: 2223754486-4108050209
                                                      • Opcode ID: cb566a29109539604d084396ef6b2dee9f7bf22ce88372a077b484178a5b9fd8
                                                      • Instruction ID: 896e80bc4fa5931cffcb8c04a2d41a3ae0f9fc32179714ddf6da8441864d4348
                                                      • Opcode Fuzzy Hash: cb566a29109539604d084396ef6b2dee9f7bf22ce88372a077b484178a5b9fd8
                                                      • Instruction Fuzzy Hash: AD31D632620219AFEF249F99C885BAEBBF8EF09350F140019ED95E72A1D7709B44DF51
                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00C56B4E
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00C56B59
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: Combobox
                                                      • API String ID: 3850602802-2096851135
                                                      • Opcode ID: 07e48bcfae726332cd4280033da92713da10c1ad4a0486d89e14b05af2274ee3
                                                      • Instruction ID: baa758b26dfbf9d0cb160c0df5ad808d19bf37bd37b21dbcacc30a177f109d45
                                                      • Opcode Fuzzy Hash: 07e48bcfae726332cd4280033da92713da10c1ad4a0486d89e14b05af2274ee3
                                                      • Instruction Fuzzy Hash: 851104753002086FEF119F14CC81FFB7B6AEB843A5F604125FD28E7290D6719D90AB64
                                                      APIs
                                                        • Part of subcall function 00BD2111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00BD214F
                                                        • Part of subcall function 00BD2111: GetStockObject.GDI32(00000011), ref: 00BD2163
                                                        • Part of subcall function 00BD2111: SendMessageW.USER32(00000000,00000030,00000000), ref: 00BD216D
                                                      • GetWindowRect.USER32(00000000,?), ref: 00C5705E
                                                      • GetSysColor.USER32(00000012), ref: 00C57078
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                      • String ID: static
                                                      • API String ID: 1983116058-2160076837
                                                      • Opcode ID: 94e8f4bbe948f9d5d1cd75a608dc85bd830de752d7f60d94ddde26c824f0b4f4
                                                      • Instruction ID: 61a2fcdc6a4520ed14394c644e2087d0735099b1f270fef4fe581bb536d9faea
                                                      • Opcode Fuzzy Hash: 94e8f4bbe948f9d5d1cd75a608dc85bd830de752d7f60d94ddde26c824f0b4f4
                                                      • Instruction Fuzzy Hash: 9B21477661420AAFDB04DFB8DC45AEA7BE8EB48305F004619FE55E3280E675E894DB50
                                                      APIs
                                                      • GetWindowTextLengthW.USER32(00000000), ref: 00C56D8F
                                                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00C56D9E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: LengthMessageSendTextWindow
                                                      • String ID: edit
                                                      • API String ID: 2978978980-2167791130
                                                      • Opcode ID: 91ac7eff703da913f5c4e708d485297386c23d963feb90b26851ef0341e76bd9
                                                      • Instruction ID: 75ae7854dc0148b3d0a528163f9a74c8ac8db109a5bc435491952563c68d85a9
                                                      • Opcode Fuzzy Hash: 91ac7eff703da913f5c4e708d485297386c23d963feb90b26851ef0341e76bd9
                                                      • Instruction Fuzzy Hash: E0115B75600108AAEB209E74DC84AEB3A7AEB15369F604B14FD74A72E0C6B19C949B64
                                                      APIs
                                                      • _memset.LIBCMT ref: 00C33036
                                                      • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00C33055
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: InfoItemMenu_memset
                                                      • String ID: 0
                                                      • API String ID: 2223754486-4108050209
                                                      • Opcode ID: 23071452c5e289b71419361905d00684d68668a0bdaa0a724db649a24cb85a18
                                                      • Instruction ID: ff51b7afdea5a8153a28220d35c1b10aef3a1b9e8d63b0c4bc82ed5dc8517f94
                                                      • Opcode Fuzzy Hash: 23071452c5e289b71419361905d00684d68668a0bdaa0a724db649a24cb85a18
                                                      • Instruction Fuzzy Hash: 7511B231A21254ABDB28DB5CDC48BADB7B8EB05714F140066F965A72E0D770AF04D791
                                                      APIs
                                                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00C426DC
                                                      • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00C42705
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Internet$OpenOption
                                                      • String ID: <local>
                                                      • API String ID: 942729171-4266983199
                                                      • Opcode ID: 0de81ce0afa652f9b14c3ce9a82132418a61c35fe314d1450c6cf77fe19e16a5
                                                      • Instruction ID: 23c4b1eadef4485287ea8d876ca1fce0c7cf945d59c98c9e17d80ec66a053004
                                                      • Opcode Fuzzy Hash: 0de81ce0afa652f9b14c3ce9a82132418a61c35fe314d1450c6cf77fe19e16a5
                                                      • Instruction Fuzzy Hash: 1A11A070541225BADB248F528C8AFFBFFACFB16751F51812AF91596040D2B06A94DAF0
                                                      APIs
                                                        • Part of subcall function 00C484A8: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00C48265,?,00000000,?,?), ref: 00C484BF
                                                      • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00C48268
                                                      • htons.WSOCK32(00000000,?,00000000), ref: 00C482A5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWidehtonsinet_addr
                                                      • String ID: 255.255.255.255
                                                      • API String ID: 2496851823-2422070025
                                                      • Opcode ID: 5ac93b3113d8d10affec861e0fbcd507cbf63aa4501edfa7e632462a76426972
                                                      • Instruction ID: 2e58029a0d18057343c85456bfd9af2862658469761971fa1a06bd34aadeeebd
                                                      • Opcode Fuzzy Hash: 5ac93b3113d8d10affec861e0fbcd507cbf63aa4501edfa7e632462a76426972
                                                      • Instruction Fuzzy Hash: 44112630200616ABDB20EFA4DC46FBEB364FF00320F208566F921A73D1DBB1A905DB91
                                                      APIs
                                                        • Part of subcall function 00BE1A36: _memmove.LIBCMT ref: 00BE1A77
                                                        • Part of subcall function 00C2B57D: GetClassNameW.USER32(?,?,000000FF), ref: 00C2B5A0
                                                      • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00C2980E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_memmove
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 372448540-1403004172
                                                      • Opcode ID: cf330593069ae2e97fbf78b3995b485d050de55dd933b6596fcffbec5ad1930a
                                                      • Instruction ID: 8088ef02c46953112998cf4c00c12f59e6d335ad13c11cedc391926253c5f07a
                                                      • Opcode Fuzzy Hash: cf330593069ae2e97fbf78b3995b485d050de55dd933b6596fcffbec5ad1930a
                                                      • Instruction Fuzzy Hash: 6F01F571A41224AB8B14EBA5DC11DFE73A9EF12360F640A29F871977D1DF315908D760
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: __fread_nolock_memmove
                                                      • String ID: EA06
                                                      • API String ID: 1988441806-3962188686
                                                      • Opcode ID: 689e62c0dae0140b667107cc4f52b70a271b5ab76d9b1610463d0eaf95f7de4f
                                                      • Instruction ID: fbbb4ea8327296dec7fcee2a50fd212d7961c93be346f33b8847cf0a5a141c22
                                                      • Opcode Fuzzy Hash: 689e62c0dae0140b667107cc4f52b70a271b5ab76d9b1610463d0eaf95f7de4f
                                                      • Instruction Fuzzy Hash: 9B01F971D0421C6EDF28DBA8CC56EBEBBF8DB01311F00419AF652D3181E4B4A6088B60
                                                      APIs
                                                        • Part of subcall function 00BE1A36: _memmove.LIBCMT ref: 00BE1A77
                                                        • Part of subcall function 00C2B57D: GetClassNameW.USER32(?,?,000000FF), ref: 00C2B5A0
                                                      • SendMessageW.USER32(?,00000180,00000000,?), ref: 00C29706
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_memmove
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 372448540-1403004172
                                                      • Opcode ID: cf6d2fc002544ead6eaec17fc86b36f23627a682d87641274a7d4e06bc504e78
                                                      • Instruction ID: 476838439666e2cfe6aeef8cf64e991af3554d4c971b64ed19c21962b8d65514
                                                      • Opcode Fuzzy Hash: cf6d2fc002544ead6eaec17fc86b36f23627a682d87641274a7d4e06bc504e78
                                                      • Instruction Fuzzy Hash: 3F01F2B1A41118ABCB14EBA5D862EFF73E9DF11340F600029B822A76C1DF705E08D6B1
                                                      APIs
                                                        • Part of subcall function 00BE1A36: _memmove.LIBCMT ref: 00BE1A77
                                                        • Part of subcall function 00C2B57D: GetClassNameW.USER32(?,?,000000FF), ref: 00C2B5A0
                                                      • SendMessageW.USER32(?,00000182,?,00000000), ref: 00C29789
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_memmove
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 372448540-1403004172
                                                      • Opcode ID: ad7d92ec642a34f6d14a265c4d36a3420cd0799a15b0153e0ce95d2c02cdcac5
                                                      • Instruction ID: baeac048a11e04349660135c603b1b5b3827a2f07bbe28a7af6f7efb358d390a
                                                      • Opcode Fuzzy Hash: ad7d92ec642a34f6d14a265c4d36a3420cd0799a15b0153e0ce95d2c02cdcac5
                                                      • Instruction Fuzzy Hash: F301A2B1A51124ABDB10EBA5D952EFFB3ECDF11740F600525B825A76C1DB314F08A671
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: ClassName_wcscmp
                                                      • String ID: #32770
                                                      • API String ID: 2292705959-463685578
                                                      • Opcode ID: 369ec19be479d2f0090fdbf81ef749cd1abfe7b6e94d5b5b03b371bd0ba8240e
                                                      • Instruction ID: 3303e6263c0f657fa5cc6eda7e2cba86253eca731c5d5f6f6f08858cf2a7a73f
                                                      • Opcode Fuzzy Hash: 369ec19be479d2f0090fdbf81ef749cd1abfe7b6e94d5b5b03b371bd0ba8240e
                                                      • Instruction Fuzzy Hash: 35E09B7250422826D720A655AC09BABF7ECDB55761F010167F904D3151D5B0AA458BD5
                                                      APIs
                                                      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00C28683
                                                        • Part of subcall function 00BF34BA: _doexit.LIBCMT ref: 00BF34C4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Message_doexit
                                                      • String ID: AutoIt$Error allocating memory.
                                                      • API String ID: 1993061046-4017498283
                                                      • Opcode ID: 144bef4da3f01c453f503e916a0a051168c766264e5a98a80adf65272d6f22d1
                                                      • Instruction ID: 4ec064bfb1dcf409c44feb3e4abfbacd7825f85cdfca6568538503b21ffab5cf
                                                      • Opcode Fuzzy Hash: 144bef4da3f01c453f503e916a0a051168c766264e5a98a80adf65272d6f22d1
                                                      • Instruction Fuzzy Hash: CBD05B3138535C36E2253695EC07FDE7AC84B05B52F1044B5FB04A65D34FE9859442E9
                                                      APIs
                                                        • Part of subcall function 00C0B474: _memset.LIBCMT ref: 00C0B481
                                                        • Part of subcall function 00BF0A9F: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00C0B450,?,?,?,00BD100A), ref: 00BF0AA4
                                                      • IsDebuggerPresent.KERNEL32(?,?,?,00BD100A), ref: 00C0B454
                                                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00BD100A), ref: 00C0B463
                                                      Strings
                                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00C0B45E
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                      • API String ID: 3158253471-631824599
                                                      • Opcode ID: c528314de469c91a0640ef909d246c077e32357f5ae9e953d746938303b5a1fd
                                                      • Instruction ID: f3dfe9195792adb73ea45dcd6d9ca8eb7246ded758512e96fadb2da99eafc86d
                                                      • Opcode Fuzzy Hash: c528314de469c91a0640ef909d246c077e32357f5ae9e953d746938303b5a1fd
                                                      • Instruction Fuzzy Hash: AEE06DB02107528BD330EF75D808706BAE4AF04344F00896EE499C2392E7B4DA44CB51
                                                      APIs
                                                      • GetSystemDirectoryW.KERNEL32(?), ref: 00C0FFC1
                                                        • Part of subcall function 00C4C4A1: LoadLibraryA.KERNEL32(kernel32.dll,?,00C101AA,?), ref: 00C4C4AF
                                                        • Part of subcall function 00C4C4A1: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00C4C4C1
                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00C101B9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000C.00000002.2579265983.0000000000BD1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00BD0000, based on PE: true
                                                      • Associated: 0000000C.00000002.2579229303.0000000000BD0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C60000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579332329.0000000000C85000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579400632.0000000000C8F000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000C.00000002.2579430489.0000000000C98000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_12_2_bd0000_Origin.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                      • String ID: WIN_XPe
                                                      • API String ID: 582185067-3257408948
                                                      • Opcode ID: da15e867f112eb015bd8c86eb8736980e087adfe44d7d30de0b9e320a45e7f6b
                                                      • Instruction ID: fa057b90942a9816bb5b00a1bd3c0537343d0aa737812c2990ebbbc31fb28d22
                                                      • Opcode Fuzzy Hash: da15e867f112eb015bd8c86eb8736980e087adfe44d7d30de0b9e320a45e7f6b
                                                      • Instruction Fuzzy Hash: 1AF0ED7180511ADFCB25DB91CAA8BEDBBF8AB09340F24009AE102B25E1D7B15F85DF61